Time
5 hours 21 minutes
Difficulty
Beginner
CEU/CPE
6

Video Transcription

00:00
Hello and welcome to command line basics. This video, we're gonna learn windows that were taken commands three. I'm Christopher Handler, and let's begin,
00:08
we're learning objectives for this video. We're gonna learn the nets that command, understand the FTP command and learn the SS H command
00:16
Pre assessment. You need to access the command line for another terminal. What is the best command for this? Said a telnet.
00:23
Be ftp
00:25
C S s each or d net.
00:29
The answer is C S S H. As we learned in the links videos. The SS H is the secure shell, and it will automatically encrypt access to a terminal. And this is what we need to use if we are accessing a terminal over the wire over the network so
00:46
you know, automatically encrypted and it will not allow anybody to just listen to the session so they can't hear everything that's going on.
00:52
The telling that command is insecure by default and it should not be used on production systems. FTP is insecure by default as well, but it is not even access to the command line. It is, ah, file transfer protocol so you can transfer files back and forth,
01:07
and the Net command is used for a whole slew of different Windows commands, but not necessarily command line for another terminal.
01:17
That's a net step. This is network statistics very similar to the Lenox at step, where it will display all the active connections on the machine.
01:26
And with that, it can be used to effectively identify malware as well. Where if we have a specific connection to some crazy Chinese I p address that, you know, over a poor that we've never used. That's usually a very strong indication that there may be some malware on the machine
01:45
and it would be worth investigation.
01:47
So let's go over to my command prompt, and I'm going to type in. That's that.
01:53
And I wouldn't be too alarmed if you see a whole slew of connections, because it's not uncommon for, you know, a lot of programs to be talking out on a lot of different addresses
02:06
as we can see out of one for an address. Coming across is using the TCP Protocol,
02:10
and this is my local machine. This is the port, the high number ephemeral port,
02:16
and is going to this 50 to 1 41 to 17 1 25 i p address over https, which is poured 443 We see it is established. So it is up and running.
02:30
All right, we have the FTP protocol, and this is usedto list download upload files from the command line, and it's very useful to transfer these files between two separate machines over the network,
02:44
and it is worth noting that is insecure by default. So if you do need thio, run FTP and transfer files over the command line, I highly highly recommend using either sftp for secure file transfer protocol or tunnel the FTP.
03:00
That way it stays protected. And nobody can just kind of
03:04
sniff the packets fromthe wire and steal the information that you're transferred.
03:10
Let's go on my command Prompt. I have my, uh, sift workstation up, and I have hey, ftp and sshh, Right.
03:19
So I'm gonna go up until I find this
03:22
and we're gonna do ftp and for the user do Sands forensics
03:28
and then the password
03:30
and we could see it were logged in. Now we got the FTP command prompt some type help to see what kind of different information we can do. We were to see what is available. We have the L s command. So that's the Lenox list. And then we can either put or get files from the server.
03:47
And what put does is it will put files from your local machine
03:52
onto the remote, sir, and get will get the remote files from the remote server and put him on your local machine.
04:00
So if I do l s really quick, You can see I have all these different files on this remote machine that I can use, but I just want to quit,
04:08
and we're gonna learn about the SS H from the Windows Command line as well.
04:13
So S H Secure shell. Same exact miracle. As for Lennox, it is just used to securely access. A terminal across a network is using encrypted communications, and it does he certificates for these very strong types of encryption to protect any kind of network access.
04:32
So it is worth mentioning that you should use as a sage and then the user name that you're going to connect as with the and then the I P address or the computer name that you're connecting to.
04:44
So let's go back to my command prompt,
04:46
and I am going to use
04:48
sssh! San's forensics at the I p address of my sift workstation
04:55
It enter is gonna ask me for my password.
04:58
You already know my password from those previous videos of 12 and I am ss aged into this machine so I could do l s. And we can see all of the information from my Lennox machine that I'm connected to right now.
05:14
And we can do just like anything else where you're doing. Do you name?
05:18
See all the information about the system and it's almost exactly like if we were sitting directly there at the command prompt at that physical Michigan.
05:30
All right, post assessment. What is f t p stand for a free trade protocol B file transfer protocol. See Field, take proctor or D file Trading protocol.
05:42
The answer is B file transfer protocol have to be is a very used for protocol to transfer these files across the network between two machines and the is something you should be familiar with and should be exposed to. It is not free trade protocol field. Take proctor or file. Trading protocol
06:00
is simply the file transfer protocol
06:03
All right. So in this video, we learned the nets that command and how we can use it, Identify any processes that should not be speaking across The network understood the FTP command and how it can use to transfer information. And we learned the SS H command and how similar it is to the clinics command and how we can use it from the Windows Command line.
06:23
And I hope to see you in the next video.

Up Next

Command Line Basics

In this course you will learn the fundamentals of Command Line, a fundamental tool for any user of Windows and Linux machines. Command line allows developers to manipulate files easily and quickly. Learning command line saves developers time and resources.

Instructed By

Instructor Profile Image
Christopher Haller
Senior Intelligence Operations Analyst at Centripetal
Instructor