Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
in the last video, I showed you everything you need in order to participate in the lab
00:05
in the next few videos will be building our attack within every day. Flash drive.
00:09
This will target at Windows 10. Machine.
00:11
This Tak will run a harmless batch. File has only intended to scare a victim.
00:18
So let's, uh let's get started. First thing we really want to do is to make sure we can see hidden files since we'll be working with and we want to make sure we can see them. Another them.
00:29
So you plug in my flash, right?
00:31
There we go. So I were I'm working on a Windows 10 machine,
00:36
so it would be slightly different in, like, say, 1 to 7, but pretty much the same,
00:42
uh, so we're gonna do is once we have the folks for open,
00:45
we want to go on the top here and go to view,
00:48
and then we'll go over here options
00:52
and what's that pops up. We're gonna go to this few tab here
00:57
and ah, default. It's set to don't show him the files, folders or drives. I've changed that here to show hidden files, folders and drives so go ahead. Okay.
01:07
Okay. So let's let's go ahead and make our batch file. Now. Batch files run commands to your command problem that is Show. You hear this little guy here?
01:21
So what we're gonna do is this open are no pad plus Plus,
01:26
Now, this isn't going to be a malicious bat file. It's just going to scare whoever opened that.
01:34
So first, let's do the echo command. And what this command does
01:42
is it basically echoes whatever you type.
01:45
So I go echo this.
01:48
It'll type this, and it won't
01:51
do the echo, so we'll just say that.
01:53
So
01:56
let's do something like
02:00
my wrist
02:01
activated. That explanation, point
02:06
packing and
02:08
program
02:12
humps. Of course, when you're attacking someone, you have to tell them you're hacking,
02:15
and that's a joke. So case you didn't catch that? Uh, now we're going to say
02:22
the reason we do that is basically now, throughout the rest of the batch file, we won't
02:28
we want that goes to be off by default.
02:30
Um,
02:32
we don't want him to see basically what we're gonna type out for the commands. So, uh,
02:40
now we're gonna do, uh, this command timeout slash t two. And now with this does is so unless, um, you you put these commands that I'm typing here, the batch miles is gonna run very quickly in the victim's not going to see what's going on.
02:59
So we want to slow it down
03:00
s so they could see exactly what it's typing. So by doing the time out, it's basically pausing the batch file. So for two seconds, so the twos, So this will be in seconds to be two seconds
03:15
now, Uh, what we want to do next is to slash no break. Now, the reason we do this is because the person could actually stop the batch file by pressing any key. Now, if we do this, they have to press a certain keys and that's control. See, if we do that,
03:34
they won't. They won't be able to break out of it unless they press control. See,
03:38
now they'll actually still see this line are something similar. So we want to do is do,
03:46
um, this greater than No. So that way they won't see to break out of this command. Press control, see, so they'll see nothing. And that's what we want. So
03:57
got that so deposit so they won't be able to break out of it. I don't see what's going on.
04:02
Now, let's echo.
04:04
Let's echo. That's looking
04:08
files to steal,
04:14
Please. Wait.
04:15
So this will. So what we're gonna do is pretend like we're going through the victim's directories.
04:24
So we're gonna say, Hey, we're now we're gonna start looking for your files to steal,
04:29
and then we want to do the same time out command, because way wanna deposit so they could read. This will do the same thing.
04:36
No break?
04:41
No.
04:44
Okay, so now we're gonna do is we're gonna change directories.
04:48
And the reason why we're gonna do that, Because we're gonna do next. After that, Director Kranz will let the list actually list the files on the computer. So it sort of looks like this fake viruses is actually looking for files to steal.
05:04
Uh, so in order to change directories, we're gonna do a CD which stands for change directory slash D, and then we're going to see now the D. If you don't do that, it will basically just look through the directory on a flash drive and we don't want that. We want to look through the directory on the computer itself
05:25
and keep it simple will just do si, I would say the vast majority of machines are going to have C on them
05:35
for Windows machines. So we'll just keep it simple and say, See, See? So we'll do the C call in there.
05:43
So that'll change structuring to the C drive.
05:45
Then we're gonna do a director command. Now this directory command will just display.
05:50
It'll just display what's What's what's on the C drive. So
05:56
if I could show you that real quick just to a dirk hand
06:00
boom, it's just going to show everything that's currently on that drive. I man
06:05
clear of that
06:10
so that I don't play that.
06:12
And
06:15
what do you want? Thio?
06:16
Of course. We want them to see what's going on So again, Well,
06:20
well, uh,
06:21
posit flash t and let's do it for five seconds. No, break again.
06:30
Do another. No command. So they can't see this.
06:33
And so with them, let them see that for about five seconds. Then we're going to do
06:40
this, Command. Uh, sorry. See less. What see less does is it clears the screen like you saw before. So If I do on a dirt command,
06:48
do you see less clear the screen? I think the reason we want to do that is just so it kind of clears the clutter so we could see the next Echo commands. We're gonna do our so they can see the next Echo commands.
07:03
So after five seconds, we're gonna clear the screen
07:08
and then let's do another echo. Let's a sensitive
07:14
miles.
07:18
I'll be
07:21
be happy about us. Put some explanation points. So after we do that, of course, we want them to see what's going on. Do another timeout slash t.
07:33
Um, you have five. Should be fine and then do another no break
07:43
and then the knoll so they don't see the to escape press control. See,
07:47
we'll do it for five. Just
07:49
what? The mold out over.
07:51
Now we'll say
07:56
exporting
07:58
Isles to Akers.
08:05
Please wait.
08:07
Of course, you got to be polite
08:09
and we'll do another time out. Command.
08:16
Do you know five seconds? Another? No break
08:22
greater than all.
08:26
Okay,
08:28
so let us do Let's
08:33
miles. It's OK and let's let's say that was successful, that the exporting was successful. So export
08:43
uh, he's successful
08:46
and We're happy about it. Upon Exclamation point,
08:50
Do another time out. Command Simon out slashed tea for five seconds.
08:58
No break.
09:01
I can't type today
09:03
now. Hopefully, don't see the command.
09:07
And
09:09
let's thank them for their
09:13
personal data line.
09:16
Let's be polite again and thank them,
09:28
and we're happy about it. So now let's let's do a longer time out. Just tow.
09:35
I just just get him thinking.
09:43
And once we have,
09:48
once we have that, we're gonna hit exit that will close the bat trial.

Up Next

USB Drop Attack

Malicious devices are everywhere these days, whether you can see them or not.

Instructed By

Instructor Profile Image
Shawn Briere
Information Security Analyst
Instructor