2 hours 25 minutes
in the last video, I showed you everything you need in order to participate in the lab
in the next few videos will be building our attack within every day. Flash drive.
This will target at Windows 10. Machine.
This Tak will run a harmless batch. File has only intended to scare a victim.
So let's, uh let's get started. First thing we really want to do is to make sure we can see hidden files since we'll be working with and we want to make sure we can see them. Another them.
So you plug in my flash, right?
There we go. So I were I'm working on a Windows 10 machine,
so it would be slightly different in, like, say, 1 to 7, but pretty much the same,
uh, so we're gonna do is once we have the folks for open,
we want to go on the top here and go to view,
and then we'll go over here options
and what's that pops up. We're gonna go to this few tab here
and ah, default. It's set to don't show him the files, folders or drives. I've changed that here to show hidden files, folders and drives so go ahead. Okay.
Okay. So let's let's go ahead and make our batch file. Now. Batch files run commands to your command problem that is Show. You hear this little guy here?
So what we're gonna do is this open are no pad plus Plus,
Now, this isn't going to be a malicious bat file. It's just going to scare whoever opened that.
So first, let's do the echo command. And what this command does
is it basically echoes whatever you type.
So I go echo this.
It'll type this, and it won't
do the echo, so we'll just say that.
let's do something like
activated. That explanation, point
humps. Of course, when you're attacking someone, you have to tell them you're hacking,
and that's a joke. So case you didn't catch that? Uh, now we're going to say
the reason we do that is basically now, throughout the rest of the batch file, we won't
we want that goes to be off by default.
we don't want him to see basically what we're gonna type out for the commands. So, uh,
now we're gonna do, uh, this command timeout slash t two. And now with this does is so unless, um, you you put these commands that I'm typing here, the batch miles is gonna run very quickly in the victim's not going to see what's going on.
So we want to slow it down
s so they could see exactly what it's typing. So by doing the time out, it's basically pausing the batch file. So for two seconds, so the twos, So this will be in seconds to be two seconds
now, Uh, what we want to do next is to slash no break. Now, the reason we do this is because the person could actually stop the batch file by pressing any key. Now, if we do this, they have to press a certain keys and that's control. See, if we do that,
they won't. They won't be able to break out of it unless they press control. See,
now they'll actually still see this line are something similar. So we want to do is do,
um, this greater than No. So that way they won't see to break out of this command. Press control, see, so they'll see nothing. And that's what we want. So
got that so deposit so they won't be able to break out of it. I don't see what's going on.
Now, let's echo.
Let's echo. That's looking
files to steal,
So this will. So what we're gonna do is pretend like we're going through the victim's directories.
So we're gonna say, Hey, we're now we're gonna start looking for your files to steal,
and then we want to do the same time out command, because way wanna deposit so they could read. This will do the same thing.
Okay, so now we're gonna do is we're gonna change directories.
And the reason why we're gonna do that, Because we're gonna do next. After that, Director Kranz will let the list actually list the files on the computer. So it sort of looks like this fake viruses is actually looking for files to steal.
Uh, so in order to change directories, we're gonna do a CD which stands for change directory slash D, and then we're going to see now the D. If you don't do that, it will basically just look through the directory on a flash drive and we don't want that. We want to look through the directory on the computer itself
and keep it simple will just do si, I would say the vast majority of machines are going to have C on them
for Windows machines. So we'll just keep it simple and say, See, See? So we'll do the C call in there.
So that'll change structuring to the C drive.
Then we're gonna do a director command. Now this directory command will just display.
It'll just display what's What's what's on the C drive. So
if I could show you that real quick just to a dirk hand
boom, it's just going to show everything that's currently on that drive. I man
clear of that
so that I don't play that.
what do you want? Thio?
Of course. We want them to see what's going on So again, Well,
posit flash t and let's do it for five seconds. No, break again.
Do another. No command. So they can't see this.
And so with them, let them see that for about five seconds. Then we're going to do
this, Command. Uh, sorry. See less. What see less does is it clears the screen like you saw before. So If I do on a dirt command,
do you see less clear the screen? I think the reason we want to do that is just so it kind of clears the clutter so we could see the next Echo commands. We're gonna do our so they can see the next Echo commands.
So after five seconds, we're gonna clear the screen
and then let's do another echo. Let's a sensitive
be happy about us. Put some explanation points. So after we do that, of course, we want them to see what's going on. Do another timeout slash t.
Um, you have five. Should be fine and then do another no break
and then the knoll so they don't see the to escape press control. See,
we'll do it for five. Just
what? The mold out over.
Now we'll say
Isles to Akers.
Of course, you got to be polite
and we'll do another time out. Command.
Do you know five seconds? Another? No break
greater than all.
so let us do Let's
miles. It's OK and let's let's say that was successful, that the exporting was successful. So export
uh, he's successful
and We're happy about it. Upon Exclamation point,
Do another time out. Command Simon out slashed tea for five seconds.
I can't type today
now. Hopefully, don't see the command.
let's thank them for their
personal data line.
Let's be polite again and thank them,
and we're happy about it. So now let's let's do a longer time out. Just tow.
I just just get him thinking.
And once we have,
once we have that, we're gonna hit exit that will close the bat trial.
Kali Linux Fundamentals
In this Kali Linux course you will learn about the industry standard tool for penetration ...
1 CEU/CPE Hours Available
Certificate of Completion Offered
Attacks and Persistence for Incident Handlers
Attacks and Persistence for Incident Handlers covers several different types of attacks, with a focus ...
1 CEU/CPE Hours Available
Certificate of Completion Offered