1 00:00:00,870 --> 00:00:07,740 Before performances are finished, you need to make sure that you need your computer can what are the 2 00:00:07,740 --> 00:00:08,280 packets? 3 00:00:08,400 --> 00:00:16,820 So to do that, you need to keep proc and the practices in the system. 4 00:00:16,830 --> 00:00:18,030 You need to go next. 5 00:00:19,590 --> 00:00:21,780 And I'll be watching for. 6 00:00:22,140 --> 00:00:25,190 So here you have the file called IP Underscore for. 7 00:00:29,000 --> 00:00:37,590 So in that effort, it will be easier to change the to a one that's a no no, I b underscore for. 8 00:00:40,810 --> 00:00:42,110 That's the password. 9 00:00:42,850 --> 00:00:52,180 So you need to change to one of contracts and then now we can move forward to this upswell thing at 10 00:00:53,440 --> 00:00:56,340 six a.m., we're going to see this Arpels moving. 11 00:00:56,620 --> 00:00:58,660 So we have seen this protocol. 12 00:00:58,670 --> 00:01:01,960 So I'll just explain it briefly. 13 00:01:02,350 --> 00:01:06,160 So these are protocol transfers, the IP address to the megadoses. 14 00:01:06,160 --> 00:01:06,400 Right. 15 00:01:06,640 --> 00:01:12,580 So this is the current extension and you'd have the Mac address and this is the machine. 16 00:01:12,950 --> 00:01:16,090 Let me open the CMB and type IP config. 17 00:01:17,570 --> 00:01:22,670 So as you can see, guess they'll be watching for at risk, Anderson, is one or two and. 18 00:01:24,410 --> 00:01:34,040 We do not have the Mac address, so that type are our slip to get on the list, as you can see, this 19 00:01:34,040 --> 00:01:35,630 is the road to do that. 20 00:01:36,470 --> 00:01:40,790 So what you should one is a road that it has C4 and whatnot. 21 00:01:41,030 --> 00:01:44,770 This is a card machine and it has this effort. 22 00:01:44,960 --> 00:01:48,170 So these are the two occurrences of two devices. 23 00:01:49,110 --> 00:01:56,420 So what we're going to do is we are going to run the Sudar or minus on our colonics machine. 24 00:01:56,720 --> 00:01:57,970 Didn't see one or two is there? 25 00:01:58,550 --> 00:02:01,280 And it has the Mercatus Eighty-eight. 26 00:02:02,420 --> 00:02:04,660 So there's no need to remember this. 27 00:02:04,850 --> 00:02:11,750 I know what they're going to do is we are going to poison these people by sending the our responses. 28 00:02:11,990 --> 00:02:22,040 So what it means is we need to change this or this rotas IP address so that we change the Mac address 29 00:02:22,430 --> 00:02:28,010 so that the Democrats will be our Mac address. 30 00:02:28,010 --> 00:02:29,120 That is this one. 31 00:02:30,140 --> 00:02:30,880 This is a fake. 32 00:02:31,790 --> 00:02:42,500 So when we pisin the articles, then this zero one point will be shown by our colonics machine and this 33 00:02:43,640 --> 00:02:49,190 Wintersun machine will get our card in the next room at this router. 34 00:02:49,190 --> 00:02:51,140 So it will be discarded. 35 00:02:51,140 --> 00:02:54,930 Next will be like a middleman between the router and these Windows seven. 36 00:02:55,250 --> 00:03:01,340 So with this one, we think that this colonics machine is a router and it was sent to this one because 37 00:03:01,340 --> 00:03:04,360 we have copied the Rocha's Mac address to us. 38 00:03:04,550 --> 00:03:06,440 So we are impersonating as a router. 39 00:03:06,710 --> 00:03:11,800 So for the router, we are impersonating as well, the song machine. 40 00:03:11,810 --> 00:03:15,360 So it is like Man in the Mirror takes this, are you? 41 00:03:16,730 --> 00:03:21,830 And we can see the traffic going to and from this computer. 42 00:03:21,950 --> 00:03:26,030 So so we are going to do this further. 43 00:03:26,040 --> 00:03:33,860 We are going to use it to cut, cap and pseudo Ataka minus. 44 00:03:34,220 --> 00:03:38,810 So it will bring up the graphical user interface, which is very nice one. 45 00:03:39,440 --> 00:03:41,480 So you can see there is no finger shot up. 46 00:03:41,780 --> 00:03:44,750 So on this uh, sorry. 47 00:03:45,380 --> 00:03:46,370 So non-literary. 48 00:03:46,370 --> 00:03:47,750 What is click on except. 49 00:03:49,220 --> 00:03:55,130 So it's already started something, but we do not know what our targets or what we want is, we want 50 00:03:55,130 --> 00:03:57,530 to see a horse and scan for horse. 51 00:04:00,560 --> 00:04:02,210 So it has gone for the horse. 52 00:04:03,050 --> 00:04:05,220 Now that's a horse race. 53 00:04:05,660 --> 00:04:07,870 So these are the horse. 54 00:04:07,880 --> 00:04:12,050 So 018 is not only to lose, right? 55 00:04:12,080 --> 00:04:17,600 Click on this Akutagawa and what not to read, click on this ad to target two. 56 00:04:18,170 --> 00:04:20,570 So now our targets have been added. 57 00:04:20,660 --> 00:04:28,910 Now let's go and choose this one might be a bit menu and choose are poisoning so you can also perform 58 00:04:28,910 --> 00:04:30,050 other attacks as well. 59 00:04:30,080 --> 00:04:32,270 So let's find out which ones are positive. 60 00:04:32,810 --> 00:04:36,750 So let's click on this and it will ask question of human connections. 61 00:04:36,770 --> 00:04:37,250 Yes. 62 00:04:38,500 --> 00:04:41,060 So now the marketplaces have been changed. 63 00:04:41,870 --> 00:04:45,610 So let's go ahead and sit sudo. 64 00:04:49,970 --> 00:04:51,260 So that my necip. 65 00:04:56,900 --> 00:05:01,730 So I think it did not change for us, so let us give this one. 66 00:05:01,760 --> 00:05:04,280 So as you can see, there's not rotas. 67 00:05:04,280 --> 00:05:08,450 Mercado's has been displayed as our mascot, as you can see. 68 00:05:08,450 --> 00:05:12,470 Why not fight is ours and also rotas is also ours. 69 00:05:12,770 --> 00:05:21,830 So this will send the packet any packet to one nine one zero zero one, but it will be received by this 70 00:05:21,830 --> 00:05:22,150 maggot. 71 00:05:22,400 --> 00:05:23,970 That is our current next mission. 72 00:05:24,620 --> 00:05:32,910 So let's go ahead and run the whale shark Azula to see the traffic that is coming to and fro from Windows 73 00:05:32,910 --> 00:05:33,500 Phone Machine. 74 00:05:37,440 --> 00:05:38,580 So let's. 75 00:05:39,680 --> 00:05:49,040 Let's click on any let's go ahead and so Google dot com guru.com. 76 00:05:51,930 --> 00:05:58,710 Now, you can see there are so many packets going on, so let's see one Web site that has to be plugged 77 00:05:58,710 --> 00:06:00,120 in and also. 78 00:06:03,330 --> 00:06:11,060 So that is the are this does the UDP protocol and what we want to do is I want to set up an. 79 00:06:12,790 --> 00:06:15,850 So, so good, no. 80 00:06:16,900 --> 00:06:22,390 So it has been, uh, there is a push request and it is in very prestrike. 81 00:06:22,870 --> 00:06:29,950 So now let's stop this and we need to find the IP addresses, IP address of these courses that are registered. 82 00:06:30,580 --> 00:06:32,020 So let's go and find this. 83 00:06:39,910 --> 00:06:43,780 So this is the purpose of the website that has been 84 00:06:47,230 --> 00:06:48,440 created, has been done. 85 00:06:48,530 --> 00:06:54,590 Now I can type not easy to post here now if I hadn't. 86 00:06:54,640 --> 00:06:58,720 But you can see here, this is the second request. 87 00:06:58,810 --> 00:07:01,360 You can see here the Sin Sinak Act. 88 00:07:01,390 --> 00:07:03,330 This is the TCBY prevention. 89 00:07:03,330 --> 00:07:08,160 You know, what I can do is I can just scroll through all these brackets. 90 00:07:08,170 --> 00:07:09,770 I can see the posted cost. 91 00:07:11,610 --> 00:07:16,640 And short of that, I just write on Facebook and follow BCBG. 92 00:07:20,220 --> 00:07:26,940 Now, as you can see, first we have got the model in, so we have visited the website and then we got 93 00:07:26,940 --> 00:07:30,150 the responses GDP to under 200 local response. 94 00:07:30,930 --> 00:07:32,600 So it's been wrong. 95 00:07:35,460 --> 00:07:36,690 So there is no question. 96 00:07:37,110 --> 00:07:41,280 OK, let's go ahead and see the post request has been there or not. 97 00:07:51,870 --> 00:07:54,010 So there will be a post request. 98 00:07:55,380 --> 00:07:58,490 OK, we have got the response here, let's see. 99 00:07:58,930 --> 00:08:08,790 Um, OK, so this one so you can see there is a post you can also apply to, but I do not have it rhetorically 100 00:08:08,910 --> 00:08:10,190 and for discussion. 101 00:08:11,160 --> 00:08:18,080 As you can see, post model Nexrad, which we and you can see here, username and password is ghostwritten 102 00:08:18,360 --> 00:08:20,730 and if you have an equal school district. 103 00:08:21,150 --> 00:08:29,960 So we have successfully captured the, uh, these requests from this one machine. 104 00:08:30,000 --> 00:08:34,560 So that is how you perform the ah, spoofing using the Ataka. 105 00:08:35,100 --> 00:08:39,330 So I hope you can also explore the menu here. 106 00:08:39,660 --> 00:08:44,220 There are some modules for this kandice and plugins. 107 00:08:44,400 --> 00:08:47,690 Managed plugins like these are the parents. 108 00:08:47,700 --> 00:08:57,300 You can perform this song, which can also be a spoof and you can send you can modify the horseshit 109 00:08:57,360 --> 00:09:05,150 file of this Wintersun machine so that if any, if we lessoned machine user hierarch browser, Tokura 110 00:09:05,200 --> 00:09:07,900 Company can display your own fake being paid. 111 00:09:08,340 --> 00:09:12,320 So that is a social engineering we do not discuss. 112 00:09:12,660 --> 00:09:13,890 So that's all for this. 113 00:09:13,890 --> 00:09:15,390 Otsu spoofy. 114 00:09:16,590 --> 00:09:17,970 I hope you have understood this.