Time
19 hours 55 minutes
Difficulty
Intermediate
CEU/CPE
23

Video Transcription

00:02
Hi. Welcome back to the course. In the last lab, we went over Tool called TCP View, which allows us to get some visuals on monitoring ports that are currently open on a machine. Now the aspect of cyber security penetration testing. Why that's important is because if we're trying to analyze metal, where a lot of times malware will use unknown ports or
00:21
uncommon ports on a machine, so it might help us narrow down,
00:24
especially if we know that particular Mauer strains commonly used a certain port number. So if we see that poor number might be a trigger saying, Hey, you know what, this probably Now we're somewhere on this machine. Let's figure out where it's at.
00:36
So in this video, we're gonna use a tool called What's Running Utility? Now that's gonna give us visibility on the different processes running on the particular machine.
00:44
So let's go ahead and get started. So you should still be connected to the Windows 10 machine. If you're not, just click up on P Lab Winton and get connected
00:52
our next step here, we're gonna open up Internet Explorer to the Intranet page, and then we're gonna select tools and then hacking tools. So let's go ahead and do that with scrolled on to the bottom and then just launch Internet Explorer from the task part.
01:06
Now we're gonna go to tools,
01:07
and then we're gonna scroll down a little bit, and we're gonna look for hacking tools. So
01:12
right here, go ahead and click on that.
01:15
Let's go back to our lab document. Not we want to look for a file called What's Running 30 set up dot e x c. So basically, version three point off what's running. So we're gonna click back on our Internet page here and just scroll down till we see what's running.
01:30
All right, so we see it right here. What's running? Three underscore zero underscore setup, daddy. Etc. So go ahead and click on that.
01:38
You're gonna get it. Prompted the bottom of your screen and we're just gonna say, run to that problem.
01:42
All right, so while that's opening up, there s we've selected Run.
01:46
And now we're going to get the what you see in the background here. I've got the user account control pop up box. We're just gonna click Yes to that. That way we can get installing with the Wizard. So just say yes to that
01:57
you'll see in a launch. T What's running setup wizard for us.
02:00
So that's our next step in the lab here and then basically wouldn't click next. And then we're going to select the license agreement,
02:06
and we're gonna accept it
02:07
now. We're also gonna keep all the default settings
02:10
and just click next all the way through, and then finally will culminate with clicking the install button. So we're gonna combine a few steps here as we go through it.
02:20
So let's go back to our wizard. We're just going to say next
02:23
and then we're gonna accept the license agreement again. You could read through it if you want to. I'm not going to
02:27
just say next
02:29
next year
02:30
is gonna put the path there. We're just going to say next we want to keep the default. We're going to use normal installation. Just default. That and I'm just gonna leave this alone. You can create a quick lunch icon if you want to you, but I'm gonna leave this alone and just say next
02:44
it's gonna summarizing install, and then we're just gonna say install
02:47
just takes a second or soda. Install it. Let's go back to our lab documents. And now it's installed.
02:52
Our next appears Toe de Selector, uninsulated the launch. What's running check box. And then we're gonna click the finish button. So let's go ahead and do that.
03:00
So we see that check box right there, so it's uncheck it
03:02
and then just click on finish.
03:06
Now we want to either minimize recon, disclose Internet Explorer. We're not gonna need it again. This lab. I'm gonna go ahead and close it to get it out of the way.
03:13
Let's go back to our lab document now.
03:15
So we've minimized her clothes. Internet Explorer again. You don't need it again in this particular lab.
03:20
I don't extend peers were going to right click on the what's running application on our desktop here. And then we're gonna run it as an administrator.
03:29
After we do that is gonna give us that user account control Papa box again. We're just going to say yes to that. So we're gonna click on our icon here, right? Click and then run his administrator.
03:38
It's gonna give us that user account control. We're just going to say yes to that, Papa,
03:44
and it's going to start launching the Wizard. The excuse me, the tool for us.
03:47
So once it launches, so you see Step 15 here. It's launched for us in the background there. It's gonna default us into the processes tab.
03:54
That basically just shows us an overview of any processes that are currently running on the system.
04:00
Now we're gonna look for a particular process. So we're gonna look in steps 16 here for one dr dot e x e.
04:05
So let's go ahead to look for that.
04:08
So we look through here
04:10
all the way down here and right there, we see one dr dot t x c. So go ahead, just click on that
04:15
and I'm gonna
04:15
go down here. There we go.
04:17
So what you're gonna notice is on the right side here. Once we click on that, it gives us a little bit of information about that particular process so we can click here, see some information. We can open all these expanding or close them as we deem fit. Would you see the memory is using
04:31
We could see the file version ING
04:35
input output is showing the operations there.
04:39
Well, you see the time when it wasn't created, etcetera, etcetera. So a lot of different things there. Now we're not gonna touch on those at all. We actually just want to do something with one drive. So let's go back to our lab document here. So we found the one Dr. So no one steps 17. We're actually gonna right click on it, and we're gonna go ahead and stop the process.
04:57
All right, so let's go ahead and do that.
04:59
So we're gonna right click on one dr dot t x c
05:01
and then stop the process. It's top option here. Now it's gonna open up this terminating process. Papa box for us.
05:06
Let's go back to our lab document and we'll see what we need to do for that.
05:15
All right, so
05:15
that box open for us, And now we're gonna say, Okay, now what? You're gonna notice as soon as we say OK,
05:20
keep an eye on the one dr dot t x c You're gonna see that it disappears off the list. And that's how you know you were successful in doing it.
05:29
All right, so let's click. Okay, Here. So keep an eye down here on one Dr Don t x c and see what happens to it.
05:36
All right. Poof. Like magic. It disappeared on us, so we know we were successful in stopping that process.
05:42
Okay, let's go back to our lab document.
05:45
So now that the process window, we noticed that the processes are running in a tree structure view. So let's take a look at what that means. Basically, we see here that I can I can click the minus sign there, and it hides that particular process. Brian, check it. It puts it back on there. So the difference between them when we're about to go to is the one we're about to change it to
06:04
just list everything. So let's go back to our lab documents. So
06:08
on the left side, we want a clicker says show processes in tree. And then now what that's gonna do is change it to a flat Hiroki, you'll notice a difference here. So again, just keep an eye. On this year, we're gonna click right here. The show processes in tree.
06:21
We're gonna select that and you'll see it just basically list everything now so we don't have any plus reminded science toa kind of like a windows full, but we don't have any. Plus or minus is to explore the different processes. We just haven't all listed out here.
06:35
So I'm gonna click back on in a just cause I like this view a lot better. So let's move on to the next step in our lab.
06:41
So on the left side, we're gonna click on the expand The service's column. So we're gonna click here.
06:46
You'll see here. It shows us a lot of different service is now
06:51
it will expand out that window a little bit here.
06:56
So let's go back to our lab document
06:58
now in the center, we're gonna click on the product name. What that's gonna do is sort all these service is by the product names. Let's go and do that. So here at the top left, just click on product name.
07:06
You'll see it's gonna sort him all by different products. Win and explore markets off windows or dot net framework down the way There will see ah viene see viewer
07:15
here, etcetera, etcetera. So it's gonna list them all by product name.
07:21
All right, so our next step here, we're gonna click the current State column header. So that's going to sort the service's by the current state that they are in.
07:30
Okay, so it's gonna be this one right here, so it's gonna sort of basically by Are they running? Are they stopped? So once we click it once, it's gonna show us all the stop ones. And then if we scroll all the way down, we could see all the running ones.
07:41
So if we scroll down here, you'll see eventually we see all the ones running.
07:45
Now, if we just click that same box again, it's gonna put all that weren't running ones at the beginning. And then we could scroll on to see all the stop one. So a couple ways, you could just sort it just to get a different view on it.
07:55
Let's go back to our lab document here. We're gonna go down to step number 25. So on the left side here, we're gonna select the I P Connections column.
08:03
So go ahead and click on that there.
08:07
And now we're just gonna take a look and see what kind of I p options we could have for our different columns were gonna click on the select I P column on the left side here. So right here, we're gonna click on that option.
08:18
I just pulls it up. So you see here we can choose pick and choose which ones we will actually want to see over here. Now, I'm not gonna just any of these at all, But if you want to play around and just see what your view looks like, that's perfectly fine. I'm just gonna say okay to that. And if you make a change here to say Okay,
08:33
All right, let's move on with our lab.
08:37
So now on the left side of step 27 we're gonna click on where says drivers,
08:41
So let's go ahead and do that. So about halfway down here, we're just gonna click on drivers
08:46
you're gonna notice it's gonna show us the driver's right here in this column.
08:50
All right, so we see a list of installed drivers. That is correct. Now, step 29. We want to look for this win USB driver. So let's go ahead and see if we notice that anywhere. So we're gonna look in the driver column and we're gonna go down to the sea when USB, so we see it right there.
09:05
All right, so go ahead and click on it. Now, you see some information in the right pain here again, again, we can look alike file version and stuff like that.
09:13
So let's go back to our lab document.
09:15
So we see that it is displayed for us. And in the right box there, on this around the right side, we could see details of the driver.
09:22
So next we're gonna click the startup tab. So click back on here and then click to start a tab here at the top. Right?
09:30
So now let's go back to our lab documents. So we're gonna uncheck the box. That's to the left of one drive. So we see the one dr here, we're just gonna unchecked this box to the left of that.
09:41
All right, let's move on to the next step of her lab.
09:43
So now we're gonna actually take a snapshot. So we're gonna select the take snapshot option and that's located at the top left here in this snapshot section.
09:52
So take snapshot going to click on that.
09:56
So our next step here is we actually want to save the snapshot so the window opened up for us. We had already seen that. Now we're gonna save a snapshot, and we're gonna name it P Lab Win 10
10:09
Grace were to click on Snoehvit. Snapshot.
10:11
It's gonna open up basically a file saving thing for us,
10:13
and we're gonna type in here P lab dash when?
10:18
10.
10:20
Okay, you just click on the save option there.
10:24
All right, so it's safe to snapshot for us.
10:28
All right, so that was the final step in our lab. So we went ahead and save the snapshot. So we're gonna close to snapshot in all over other windows
10:35
now, thinking back to the vory introduction video where we talked about these different tools. And we talked about how each component here that we're looking at, whether it's port or process, monitoring file integrity with the Haskell tool, or even using a tool like stinger for assessing If there's now we're infecting our machine.
10:54
Um, thinking back to that, why do you think that we need to monitor what ports and processes are running on a particular machine,
11:01
and I kind of gave you the answer already?
11:07
You're correct. If you guess that it's religious and malware. So it allows us if we know what ports should be well, operating on what processes should be operating, we can quickly see Hey, this looks out of place and, you know, maybe there's malware on this machine. In most cases, we can see type of some type of activity
11:24
now, different things like, you know, rats, a room on a remote Access Trojan, and stuff like that may or may not be something that we can visually see in like a process monitor. You know, it may be something that we're not able to see, so it is important to look at the ports as well because that might help us narrow down
11:41
if there's an affectionate all on that particular machine.
11:45
So in this video, we covered the tool called What's Running Utility? Essentially, and we went ahead and looked at some different processes, is and listed a mile for us. Now, in the next video, we're gonna go over hash coke. As I mentioned, that one could be used for checking file integrity. Now we're just gonna go over in the next lab
12:03
about using hash coke and some of the different features it has
12:05
and we'll do a couple of hashes. But just know that you can always take any file and check the integrity of it by, you know, getting the original file and then also performing a hash on the file that you have to make sure they match up.

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor