1 00:00:01,020 --> 00:00:04,010 So in this room, we're going to see this map. 2 00:00:04,890 --> 00:00:10,920 This is by default and starting this car next to whatever installation and this is like this army knife 3 00:00:11,310 --> 00:00:13,770 pulls out for testing. 4 00:00:13,800 --> 00:00:16,800 So this contains a lot of functionality. 5 00:00:16,800 --> 00:00:23,430 And you can enumerate and, uh, you can brute force and you can also do the post expedition with this 6 00:00:23,430 --> 00:00:23,630 tool. 7 00:00:24,180 --> 00:00:28,160 So let's go grab my bag. 8 00:00:28,680 --> 00:00:32,110 So if you don't, it will display the options. 9 00:00:32,730 --> 00:00:34,080 So these are the protocols. 10 00:00:34,350 --> 00:00:41,730 If the Windows Server is running as some shares, then you can use this as somebody to enumerate or 11 00:00:41,730 --> 00:00:43,620 brute force the passwords. 12 00:00:44,250 --> 00:00:49,440 If it's using a school, you can use this as a score, are we not a message? 13 00:00:50,340 --> 00:00:57,450 So these four protocols are the main and of course, normal, accurate assumption. 14 00:00:57,630 --> 00:01:06,750 So we will use this as a protocol to brute force the passwords so you can take the same beat, minus 15 00:01:06,750 --> 00:01:10,480 it for the help of this assembly protocol. 16 00:01:11,160 --> 00:01:18,150 So the basic thing is you need to specify what type of information you need to get like a new redshifts, 17 00:01:18,150 --> 00:01:20,580 sessions, logged on users, etc.. 18 00:01:24,040 --> 00:01:26,890 So we'll be using this tool in the future with your son. 19 00:01:26,940 --> 00:01:28,990 So, I mean, you just said the domain. 20 00:01:29,470 --> 00:01:33,710 And first, this is very simple to use. 21 00:01:34,090 --> 00:01:34,500 You need to. 22 00:01:34,630 --> 00:01:34,830 Sure. 23 00:01:34,840 --> 00:01:39,340 The username password, if you know otherwise, we need to put. 24 00:01:40,210 --> 00:01:46,960 So it's so much of complex options, but let's stick for the passwords. 25 00:01:48,760 --> 00:02:01,030 So before enumerating, uh, assumptions, let's set up some [REMOVED], because in any network organization 26 00:02:01,060 --> 00:02:11,010 there will be some wi fi, uh, because anyone want to access, uh, files so that it's OK for collaboration. 27 00:02:11,260 --> 00:02:15,320 So you open this support manager and click on these financial services. 28 00:02:15,880 --> 00:02:20,380 So now you can use the servers, the server pool and volumes, etc.. 29 00:02:20,380 --> 00:02:21,660 Now click on the shares. 30 00:02:22,760 --> 00:02:25,240 Now here, these are the default shares. 31 00:02:25,450 --> 00:02:29,450 And what you want to do is you need to say, right, click and newsier. 32 00:02:30,640 --> 00:02:32,920 Now, these are some of these options you can use. 33 00:02:33,280 --> 00:02:34,260 We are nervous. 34 00:02:34,570 --> 00:02:37,720 So let's stick with this SMB share click. 35 00:02:37,960 --> 00:02:44,350 And if you put that one, you can, uh, set some of configuration here. 36 00:02:44,770 --> 00:02:48,580 But let's just make this quick and click on next. 37 00:02:49,320 --> 00:02:57,040 Now, uh, you can see this is the wrong name and it's asking for volume to set up, but we do not want 38 00:02:57,040 --> 00:02:58,430 and trying to be sure. 39 00:02:58,450 --> 00:03:03,660 So that's why we need to discussion apart and browse for the folder we want to share. 40 00:03:04,070 --> 00:03:06,010 I'm going to share the desktop folder. 41 00:03:06,250 --> 00:03:15,880 That's just for demonstration users, administrator and desktop for click on Next. 42 00:03:16,310 --> 00:03:18,160 And you can see the remote part to the. 43 00:03:19,180 --> 00:03:26,860 So on the other windows on what you can on that machine and you can just go to this address and ask 44 00:03:26,860 --> 00:03:27,790 for authentication. 45 00:03:28,180 --> 00:03:29,380 So click on next. 46 00:03:29,740 --> 00:03:32,980 And you can see here and I will access basic enumeration. 47 00:03:33,340 --> 00:03:37,860 So whenever you have access to the shed, then only it will be displayed for that user. 48 00:03:38,110 --> 00:03:40,690 So you can also, uh, take that one. 49 00:03:40,990 --> 00:03:42,070 Let's click on next. 50 00:03:42,370 --> 00:03:46,780 And now, uh, here there is the user one. 51 00:03:47,470 --> 00:03:52,960 Also, you can customize permissions and you can add and you can select options. 52 00:03:53,260 --> 00:03:55,240 And here you can start this user one. 53 00:03:57,270 --> 00:04:04,710 Took names so you can click on OK, and then you can edit the permissions here, so it's already there 54 00:04:05,520 --> 00:04:12,420 for further access, can see user and excerpt so we can only talk about azy adding the another user. 55 00:04:12,450 --> 00:04:14,730 So click on OK, click on next. 56 00:04:15,710 --> 00:04:23,770 Now you can see it's about to create the ship that's concrete, so it has been created. 57 00:04:23,820 --> 00:04:24,740 Let's cross. 58 00:04:25,430 --> 00:04:32,630 So as you can see, the desktop here, this desktop here has been a for administrative and user one 59 00:04:32,630 --> 00:04:32,850 user. 60 00:04:33,440 --> 00:04:35,690 So now let's go to Koenigs Machine. 61 00:04:37,720 --> 00:04:39,950 I have already made this possible. 62 00:04:41,840 --> 00:04:45,020 So as you can see, the user, one and 300 are. 63 00:04:46,610 --> 00:04:50,720 Now, that's sort of correct. 64 00:04:50,750 --> 00:04:51,050 My. 65 00:04:54,650 --> 00:04:59,420 And with the protocol, I submit, and the IP address. 66 00:05:04,900 --> 00:05:08,410 So now we need to switch to the dominant, which is home server. 67 00:05:12,200 --> 00:05:16,060 And username of you can say user one. 68 00:05:17,570 --> 00:05:22,260 So, of course, a nod to be admitted, that's compulsory. 69 00:05:22,490 --> 00:05:29,480 So let me assure you that will be set up when after installation of these windows so that you can get 70 00:05:29,540 --> 00:05:34,370 it through brute force, the password of administrator if administrator put the password. 71 00:05:34,400 --> 00:05:41,060 Then if you are lucky, you'll get the password and you'll punch you will on the Internet. 72 00:05:42,050 --> 00:05:49,400 But if let's assume that we have found another user that is the user on the network and we need to specify 73 00:05:49,400 --> 00:05:56,810 password that is on my home, uh, and desktop. 74 00:05:59,850 --> 00:06:05,940 So I have made this text for this to demonstrate that we can prove was the password, but in general 75 00:06:06,450 --> 00:06:10,810 you can give the regular text or some other word to action. 76 00:06:12,030 --> 00:06:13,950 So you dissociates. 77 00:06:16,040 --> 00:06:24,420 So first, we in the protocol and IP address I put, this is wrong to now 92, not 1992. 78 00:06:25,790 --> 00:06:30,680 So IP address and a domain username and password and we are attacking the ships. 79 00:06:30,980 --> 00:06:32,060 So let's hit enter. 80 00:06:34,130 --> 00:06:42,450 So as you can see, first, it has been retrieved the basic information about this six point nine six 81 00:06:42,500 --> 00:06:48,110 00 a.m. watching on these files and you guys can see here, log on for user. 82 00:06:48,110 --> 00:06:50,990 One user name has been tried with hi. 83 00:06:51,080 --> 00:06:51,450 Hello. 84 00:06:51,470 --> 00:06:52,490 Use the Internet. 85 00:06:53,420 --> 00:06:54,460 These are the passwords. 86 00:06:54,710 --> 00:07:00,630 So far it has been correct and it has also distributorships considered desktop. 87 00:07:01,520 --> 00:07:07,550 So this is a basic user of this crack map except for posting the passwords. 88 00:07:07,970 --> 00:07:08,480 So let's. 89 00:07:08,690 --> 00:07:09,530 For administrator. 90 00:07:09,530 --> 00:07:09,890 User. 91 00:07:16,310 --> 00:07:18,790 So they will be compensated for that. 92 00:07:19,140 --> 00:07:23,720 So you can just add the username and password. 93 00:07:23,960 --> 00:07:25,190 So now let's try to forget. 94 00:07:27,980 --> 00:07:33,620 And you guys can see here a new Latricia's and password we have got here. 95 00:07:33,650 --> 00:07:35,500 You start on the dot and it is open. 96 00:07:35,690 --> 00:07:41,810 So whenever this does happen, that means with those credentials, you can own the Internet. 97 00:07:42,480 --> 00:07:50,690 So this map exec has some post expectation and we will see in the future videos when we are using this 98 00:07:50,690 --> 00:07:51,910 pool, much, much more. 99 00:07:52,430 --> 00:08:00,120 So if it is anything, any credentials as a point, then that means, oh, it has the highest bidder. 100 00:08:00,140 --> 00:08:05,540 These are the places that can be used on the Internet. 101 00:08:05,920 --> 00:08:08,480 So that's all for this video. 102 00:08:08,510 --> 00:08:10,460 I hope you are understood in the same way. 103 00:08:10,460 --> 00:08:17,840 If there is a missing school database is running on the server, you can enumerate are forced with that 104 00:08:17,840 --> 00:08:18,320 also. 105 00:08:19,400 --> 00:08:22,250 So this is by using that as ambitious.