1 hour 41 minutes
Welcome back to the cyber Celtic course. This is other than the name and today we recover exploitation and insulation.
going back to the cyber guilty and we started with reconnaissance were we gathered as much information as we can about the target of the attack.
Then we decided doing reconnaissance
we'll attack a wonders machine
and it seemed like
the best way to deliver this is through social engineering.
So we move to phase two organization and an organization. Now that we know that we're going to attack you Windows machine, We created a weapon using MSF venom and then we created another one just for the for, for to show you how to evade protection tools using unicorn.
And then we moved to delivery where a we we went through social doing, took it and sending an email using social Jing took it.
And now an exploitation.
So the assumption is were attacking owned this machine, the windows machine, the payload that we're going to share or going to send
ah will be delivered using a human weakness or human vulnerable to using a social engineering
and to exploit that weakness and then move on to instigation. So today we're going to cover a face four and five cause in our example, that kind of integrated.
Okay, so an exploitation and I like to call the step that the hacking begin. A lot of people disagree, but
all this is speaking when you talk about hacking you, the first thing you think about his exploitation.
So it's just something that I like to call, but it's not really ah
agreed upon in these type of security and Issy
so an exploitation. The goal is to exploit weaknesses in the victim's security.
And the idea can. The idea here, or what we're doing here is we're we're targeting the weakest link in any security chain, which is the human weakness that you human weakness, eyes often triggered, is often
used during attacks. Social engineering and
fishing is one of the most famous ways to exploit a system.
So what we're going to do is we're going to send the Lincoln and again we're not going through the technicality of sending an ink that was covered during ah
delivery and using the search engine took it. It's one of the documents that are available. Resource is However, the assumption is a link is being sent. A ah
a and e mails being sent a link is malicious. In this link, there's an eye frame, the automatically downloads the payload.
that's why I said, it's kind of in our example. Expectation on insulation are working hand in hand. However, it's not, uh,
for hikers to go to face 56 and go back to fire his five times two immortals go back to six. And so on the news this mellower that we installed at the beginning, Tunes told more and more example. Moron. More tools on example is installing that cat,
which we're going to do through ah, before the end of
the tour before the end of the course, to extract data out of the ah, the victim's machine.
So let's jump light into our example.
as I said, we're going to use I myself Council, which is meat exploit.
And our goal is to, ah to utilize the pillow that we did together in the previous and face to video and organization.
So we're going to do is we're going to create that it's not all,
uh, here, which is exploit
And here we're going to create our payload.
So we said we're going to use Windows
So reverse Underscore TCP
the host is one and two. The only 68. That 121
It's going to be triple for
And just to verify, Let's show options.
So there you go. You have
your host, your
airport and our
on our model.
starts start the listener.
So the listener is now waiting for connectivity.
What we're going to do is we're going to jump to our Windows machine,
already has the link,
which is basically hosted on the same machine
for the purpose of
the, uh, course
again, as you saw Biscuit, as soon as I enter, I got this doing to solve this payload, Doc.
Uh, e x c obviously a
It's more successful. Attack would be at least now call it Kayla.
So I'm gonna learn it
again for the purpose off off, uh,
to achieve the objective off the example.
if you and now we go back
and that's all we want from the victim's machine doing does
machine. If we go back,
you can see it changed a bit.
we have one session open. So now I successfully
exploited on Dhe installed
a payload on the victim's side.
Okay, so we went through insulation and exploitation in one session. I know there's a lot of information here. I try to make that simple. It's possible, however, to make sure that we covered the whole thing. What is the difference between exploitation and installation?
As I said, exploitation were trying to exploit the system to get beyond the skirt controls. An installation. What we're trying to do is tune saw install
am L A. Or a factor that would allow us to communicate with the victim or the machine that we used during the exploitation to get inside the victim's network.
Second is true or false and exploitation. The purpose is to find a vulnerability to exploit. Actually, this is not really true because finding the vulnerability and discovering the vulnerability happens earlier. Doing
organization s Are we doing reconnaissance on an organization we create the
tool or the application of the payload that would exploit that vulnerability.
Finally, why is installation an important step? As I said from insulation were in the network. We need to have a successful installation to be able to move on to the following steps.
and the following two steps, we're going to use the same tool. We're going to use the same basically the mature, bitter ah session that we have. And then we're going to run a number of commands on the victim's machine to make sure that
it is a successful attack.
So today we covered exploitation and installation. We're on a victim's a quote on the victim's machine. On dhe. We received a collectivity session with
the Attackers machine
and the next video we'll cover. We will cover command and control.
See you then.
Manage Software with YUM in Linux
IT Pro Challenges, lab trains learners to install, gather information about, and remove software packages ...
Learn On Demand
Cyber Security test is designed to check the application and various cyber security skills. Topics ...