Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
in the last video I showed you everything you'll need in order to participate in the lab
00:04
in the next few videos will be building are attacking its and Windows 10 machine using an everyday flash drive.
00:10
This Tak will have a text file that trick the victim and going to the down the link on the flash drive and downloading the harmless batch file.
00:19
Okay, so let's get started and writing our batch file. So in this attack, what we're gonna do is we're going to make a Google Dr Link to this patch file, so it's not going to actually be on the flash drive.
00:34
What we are gonna have is a link to it, and we'll put in another,
00:39
um,
00:41
text file that basically says it's social engineer, someone to actually download that that, uh, that file from the link and run it.
00:52
So first, let's let's just start by by actually making the match file, then we'll upload it to Google drive.
00:59
So I got my flash drive here and you could you could make this anywhere. Since we're gonna blow that, I'm just gonna make it here, So let's go ahead. Open no pet plus plus,
01:08
and this is going to be very similar. Thio the previous lab
01:14
be slightly different. So first, let's do the at Echo Command again. Echo basically echoes anything you type after it. So we're gonna say,
01:26
Why are
01:29
you're trying?
01:32
Look at I
01:36
credit card info and I'm saying this because we're gonna have a five. This is gonna be a file that says credit card information. So the person opening this will think, Hey, there's someone's credit card information.
01:49
So now we're gonna say, now you will pay.
01:57
All right, so let's do a new line again. We want to do that echo off. So by default back, it was off.
02:04
And so now we'll do the timeout Command again. The time out, Come in,
02:08
stops the bad file so the victim can see what's going on. Otherwise it'll just run through and not really show the victim what's going on? So we'll do time out, and this will stop it. Basically, posit will do it for,
02:28
uh, stupid two seconds and then we'll do this. Command No break and again that no break makes it so they can escape out of the command window unless they press control, See?
02:40
And they will see that it will ask them or tell them if you want to break out, press control C And to hide that from them with you
02:49
greater than no. And that'll just hide that completely. So all they'll see is this this first line so far?
02:57
Okay, so now it's two.
03:00
Something similar. We did the last one
03:04
Echo Virus activated.
03:07
Hacking in progress.
03:13
That that
03:15
And again, we'll do the time outcome and
03:20
timeout slash teal for two seconds.
03:23
No break again. So they don't see that they can escape out of it. And the knoll?
03:30
I'm sorry. The no break ins. So they have to press control seat escape in the Noles so they don't see it.
03:36
Okay? And okay. And I want to do the echo.
03:40
Make sure
03:43
to new line
03:45
on. Okay, looking,
03:46
let's say looking for, uh, say financial.
03:53
And so
03:54
to steal. Let's get more
03:59
specific what we're looking for again, we got to be polite, So we'll say Please wait.
04:04
Then we'll need on their time out
04:08
so they can see what's going on on.
04:12
Uh, let's let's do three seconds.
04:15
No break has to be together. No, brakes so they can't break out of unless they best control see
04:23
greater than old. They don't see they have that option.
04:27
Now we're going to change the directory again. We'll choose the C drive just because again that majority of wonders machines will have the C drive and just keep this more simple.
04:42
Then we'll do our directory command So little. Show the folders
04:47
and do another time out just so they could see what's going on. Let's do it for five seconds.
04:56
No break
04:59
way. Need our goal.
05:02
Okay, so now let's let's clear the screen. Just tow. Give more space for the other echo commands
05:11
So
05:13
we'll do another echo and we'll say Sensitive
05:16
Fine and short
05:19
files found
05:24
and they're happy about it. Slave Exclamation point again. We'll do another time out.
05:29
So
05:30
let's do this. Let's do too. I don't want a last Make it last too long.
05:36
Type to another. No break.
05:43
I can't see it.
05:46
Okay, And let's say we're exporting files. Exporting
05:53
pile to hackers.
05:57
Can this be polite? Say please wait
06:01
another time out.
06:04
He is two for two. Another no break
06:10
on Greater didn't also they can't see it
06:15
all right. And let's say
06:18
now let's say that it was a success. So
06:23
and then we'll say something like
06:27
free
06:28
in progress.
06:30
Stolen the information. They're going on a spending spree
06:34
and another time out.
06:36
Oh, they don't.
06:39
Can I see what's going on?
06:42
Break.
06:46
Okay,
06:48
on. And
06:50
let's be polite. Will say thank you.
06:54
Then we'll do one last time out.
06:58
Make it wait there for about 20 seconds. But the mold out over
07:05
on one last man is exits. Exits the match mine. Okay, so let's see, It's make sure we didn't make any mistakes here.
07:15
That looks good.
07:18
Yeah, that looks good,
07:21
case. Now we're gonna go ahead and save this.
07:26
Well, save it as
07:28
let's go back to that.
07:30
Here we go.
07:31
So let's save this as, um
07:35
let's say, credit card.
07:39
And so with no money card there
07:45
and this is a
07:46
batch files, we're gonna do a dot bat.
07:48
Um,
07:49
Well, go ahead and say that their last drive for now and again when a you save as a bad file note pad plus person was that shows you the commands in blue.
08:03
So it looks like we're good there, So I'm gonna go ahead
08:07
and let's let's just test this. So we know it works.
08:11
No, I think in order to do that would have to switch screens so you can see what's going on.
08:16
So I think we're good there.
08:20
So
08:22
let's go ahead and run this.
08:24
Oh, hacking a progress. Looking for financial information?
08:31
I was looking through my files. Oh,
08:35
since the files found that's not good,
08:37
I don't know
08:41
at least their plates and now we know that it works.

Up Next

USB Drop Attack

Malicious devices are everywhere these days, whether you can see them or not.

Instructed By

Instructor Profile Image
Shawn Briere
Information Security Analyst
Instructor