Time
19 hours 55 minutes
Difficulty
Intermediate
CEU/CPE
23

Video Transcription

00:02
Hi. Welcome back to the course. In the last video, we talked about a tool called Dig that we can use for D. N s own transfers
00:08
and this video. We're gonna talk about a tool called PS info.
00:11
So let's go ahead and get started.
00:13
First, you want to connect to the P lab, win 801 machine, which is the bottom machine over here.
00:19
And I've already done so
00:21
once we connected that, we're gonna see a PS Tools folder on the desktop. Go ahead and double click on that. That's gonna open it up for us.
00:28
And then the next step is we want to right click on this file here the ps info dot e x e file.
00:33
We're best. Were you just gonna copy and paste it
00:36
to the desktop here? So let's go ahead and do that. So ps info dot e x e file.
00:45
So this one right here, go ahead. Right. Click
00:48
copy.
00:49
And then just right click on your desktop and pasty.
00:52
And there you go.
00:54
All right. So our next step here, we want to open a command problem. So we're gonna type in CMG in the search box here. And once we start typing that and it's gonna pull up the command prompt for us.
01:04
So let's go ahead. Do that. We're gonna right click on the start menu.
01:07
We're gonna say search
01:10
and they're just gonna pull up command prompt for us.
01:15
All right, so now we have our window open there.
01:19
So we selected a command prompt. Now we're gonna change our directory to the desktop. So we're gonna do seedy Space Capital D and then desktop with Capital D.
01:30
All right, So seedy
01:33
space desktop with a capital D. That's gonna change your directory. Did the desktop, and you'll see here now our path
01:42
ends in desktops. We know we're in the right spot.
01:47
Okay, So what? Now that we've done that, we're actually gonna take this command next. So the dash H flag is gonna display listing of installed hot fixes
01:56
for us, and then dash lower case D is gonna display information related to the disc volume.
02:01
The other thing I want to mention is if we see any type of license agreement for PS info, we're just gonna say yes to that so we can continue working with you.
02:08
So let's go ahead and get started.
02:13
We'll go back to our command prompt window here, and we're gonna type in Capital P
02:16
in the lower case s I
02:21
in f po dot e x g space
02:25
backwards last backward slash 1 92.168 dot 0.1 Space dash h space Dash D
02:37
All right, then, just press enter on your keyboard there.
02:38
Um, you'll see here we get that licensing agreement I mentioned. Just agree to that,
02:44
and then you're gonna see it's gonna start to query information on that particular target machine.
02:51
So question number one from our lab, Do you see any information about the target? And if yes, right, some of the output here in the lab. So let's go ahead and take a look back here. So we do see several data points. Come back here.
03:05
So up here's our command. We ran. So what we see here is this looks like it's running windows on, and it looks like Windows Server 2012.
03:14
Um, and it's only been on for, you know, 30 so minutes, which is actually tagging me in the lab since we're running a virtual here,
03:22
but basically We're the information we want right here. His Windows Server 2012 r two. That's gonna let us know if there's any exploits that we might be able to use later on. So
03:32
do we see in information about the target? Yes, of course we do. And then we'll definitely want to mention the operating system that it's running.
03:40
So in this lab, we just went over P s info
03:44
in the next lab. We're gonna talk about a tool called Finger that's used in Lennox to do a similar thing. Is Pia sinful where we can get information about our target machine?

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor