Sniffing

Course
Time
1 hour 12 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:01
Hi, everyone. Welcome back to the core. So in the last video, we went ahead and wrapped up our lab on a wire. Sheriff. So again, we did some introductory type of commands on captured some information. Now, in this video, we're gonna cover wire shark again. This is actually a little shorter lab. We're gonna basically be capturing some more information, actually, in the hopes of capturing a user name and password
00:20
that we enter in,
00:21
I don't see how we do.
00:23
Now. I want to mention again that all the step by step guides are available in the supplemental resource is sections we haven't downloaded those yet. Be sure to do that. Do so. It makes your life a lot easier. As you're trying to follow along with these labs.
00:35
I also want to mention the supplement of Resource is we have a lot of other information that's very beneficial to you. Specifically, information created by some of our awesome teaching assistants that helped create
00:46
specific stuff wire shark and TCP dumped and give you a lot more background on those particular tools s a really cool stuff I've looked through. It is really, really awesome. Um, I'm actually a little jealous. I was like, Man, they create some good stuff of it anyways, uh, digressing a bit there. But Michelle, you down with that stuff? That's what we
01:03
created for. That's why we put it in the course so you can actually use it.
01:07
We don't want to collect us, so use it, study it. If you're gonna be a pen tester, you definitely want to know Wire shark in depth. And also TCB dump as well, depending on if you want to use a gooey or command line tool. So again, just make sure you download the resource is and use it.
01:23
So all die aggression aside, Let's go ahead and get started with our lab. Now we're gonna go ahead and actually go into the ethical hacking lab environment. Let's specifically where this particular lab I want to use is so here in cyber, you should be loving already. And then just type in the search box here certified ethical hat.
01:38
And actually, as you start typing it, you'll see it'll start pulling it up so you don't have to type all of that in there. It's gonna be this certified ethical hacker, c e H one right there. So they go and click on that and then select it Launch button there.
01:49
It's gonna prompt us like it normally does open it and basically a new tab, so just launched the item there. Click on the launch item button and it's your launch. It for us usually doesn't take too long. The law to launch this particular environment and you'll see it's hard launched for us
02:04
are. So let's go back to our lab documents. So where we want to go to is we actually want to go down to the packet sniffing laughs. If you come here and we go down just a little bit on the left side here,
02:14
you'll see that we have our packet sniffing lab now. Mine, of course, is in progress because I've messed with these labs before. Your should just say Pakistani thing on.
02:22
Once you find it, just go ahead and click on it and then click the start button. There.
02:25
You'll notice all your virtual machines on the side. Here. We want to go ahead and get all those turned on by default. Usually the server one, usually top one, starts booting up for us but everything else we normally have to do ourselves. So the way we do that is we just cover our mouths over top of each one's and just cover it over top like that
02:43
and then select the power on option. It's it really? Is that simple?
02:46
All right, so just do that for all that. It's gonna take a moment of self doubt about 10 to 20 seconds, usually in most cases, to boot all of them up. I'm gonna pause the video and wait to mind come up and even his posit video as well on your end and wait until years come up so we can all start the lap together.
03:04
Everyone, welcome back. So it looks like mine have all booted up for me. If your virtual machines have not booted all the way up yet, then go ahead. Just pause a video again and wait on two years all show this little green pretty color and say on
03:15
now one of the things I wanted note in this particular lab environment. So with this this ethical hacking lab and the and also the capstone, when you go ahead and do that as well, it's the same type of environment
03:25
down here near the bottom left. You notice it has this auto love out things. So basically, if you aren't doing anything for a period of time, it's gonna love you out. After basically an hour, all you have to do to give yourself more time, just click on that and you'll see it kicks it back up to 60 minutes. So if you're doing these labs on your own, if you pause the videos or anything like that, you don't want to take a little longer.
03:45
Then just make sure you're keeping an eye on this timer here
03:47
and that you just click it to kind of give yourself more time. Um, I have yet to find a limit on that. I can. I've clicked it literally and and just kind of took my time, like for hours in labs before just playing around to see what I could potentially break. So just keep that in mind. Just make sure are mindful of time, and that doesn't seem to be any limitation on, like how many times you can click it, so
04:06
ah,
04:08
please don't use that for nefarious purposes. I'm not sure how you would, but potentially maybe, I guess. Probably not, really, But it's all good.
04:15
All right, back to our lab doctor. Let's stop digressing again there.
04:18
So we put up all our virtual machines. Now, now we're gonna click on the P Lab d M 01 So it's a second machine there, So let's go ahead and click on that.
04:27
So just go and click on the name. They're gonna take a second or so to establish a connection. We may also see a server management window open up, and we see it's gonna open up there just x out of that. We don't actually need that to this x out of that, and it should take a second or so and then it should clothes clothes for us.
04:43
Let's go back to our lab, Dr.
04:46
All right, so the next thing we want to do is we're gonna launch wire shark in this particular area. So step nine. Here's just launching wire Shark. It's down on the toolbar there. It's a blue colored little shark's fin icon here. So it's this one right here, down near the kind of in the center or the bottom, right?
05:00
So once you click on that there.
05:03
We want to select the Ethernet three. So just go ahead and click on that. That's when we want.
05:10
All right. And once we select that, we're just gonna double click on that. And then we're gonna go over to the windows 10 machines. So just double click on Ethernet three is going to start that wire shark up for us, and now we're gonna click on the windows 10 machines. So this P lab win 10 machine,
05:25
Go and click on that again and I take a moment of soda, initialize everything and pull it the desktop for us.
05:30
Once it pulls up for us there, we're gonna double click on the Putty shortcut icon. So this one right here looks like two computers communicating with with each other. And that's what we're trying to do here. We're gonna stop try to establish a lease that telling that connection.
05:44
So let's go ahead and do that now. So we're in a double click on Putty,
05:47
and then we're gonna select a telnet radio button. So it's just basically the circle if you're not familiar with what a radio button is,
05:54
so just click the button next to tell Net to make sure we select that
05:59
in the host named Field here on Steph 14 were to type in this I p address.
06:04
So let's go and type that now. So here in this host and fuel, we're gonna type in 1 92
06:11
0.168 dot 0.1
06:15
and we're gonna leave that as poor 23 again. We want to do tell meant. So that's that by default, that's a port number four telnet.
06:21
The next were Next thing we're gonna do is click the open button at the bottom. So we want to see if we notice any air messages so they cook the open button there and we should get another message here, and we do. The connection is refused. So basically, what that could tell us is that maybe tell that's not actually running on that particular device, or
06:38
it may not be listening. Maybe they figured it not to listen for pork 20 on on Port 23
06:44
are Sisko and try our other server now. So again, it's the one. We were just at the P lab d M 01 So we're just gonna basically type in the I p address for that one there as well.
06:56
So let's just say OK there. And I always like to just close out party. It makes life easier. So just x out of that. And then we're just gonna double click on putting again to launch it.
07:04
And when I say next life easier just on this particular lab, it will work more efficiently if you just do it like that.
07:13
All right, so we're back at our little papa box here. Same thing. We're just gonna select telling it. And now we're gonna type in the I P address. Once have listed here for you for the P lab, D M 01 machine. So here in step 19 we're gonna type in this I p address were basically the same thing we're exchanging the last number to be to instead of a one.
07:30
Then we're gonna do the same thing where the selected open button and we're gonna see if we get a connection established with server.
07:35
Now, once we do that, we're gonna type in this user name and password here. So we're gonna happen, administrator and then password with a capital P and then that's actually a zero and not a capital O.
07:46
So we'll go ahead and we'll do that in just a moment. Here. Let's start off first things first here and step 19 and type in our I p address and select open to establish our connection.
07:55
So again, we're we're gonna type in here in the host and box. We're gonna type in one under 2.168 dot zero up to this time, and then just click the open button right there.
08:05
You're gonna see it's gonna take a second. Nobody's gonna establish a connection for us.
08:11
And then once it establishes that will enter our using password. I'm gonna pause a video there while establishes a connection. It takes a few seconds or so. And as I was talking, it looks like it did that. So we'll continue on here. Got a few minutes left.
08:22
So let's talk to an administrator
08:24
for for our user name. Excuse me? Hit the enter key on your keyboard again. Password is gonna be the word password with Capital P and then zero instead of a no. So capital P, then lower case A s s w. The number zero lower case R D and then just press enter into Cuba.
08:41
You notice it doesn't actually show you, as you're typing in the commit on the keyboard there for the password, that's, you know, to be expected. So just f y I on that. So just make sure typing things correctly,
08:52
all right? Once you tuck that in in in the hit, enter the keyboard, it's gonna establish a connection for us. So I'm gonna go and posit video there will pick the video, back up in the next video and continue on with the lab.

Up Next

Sniffing

This course covers basic sniffing as part of a penetration test. Attackers and penetration testers use sniffing to analyze network packets for information.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor