Time
23 hours 21 minutes
Difficulty
Intermediate
CEU/CPE
23

Video Transcription

00:02
I welcome back to the course. In the last video, we talked about things like art and man in the middle.
00:07
If you haven't watched an introduction video yet, go ahead and pauses. Video. Go back to it. It's gonna cover a lot of things we're talking about in this lab.
00:15
So in this lab, we're gonna use a tool called Enter Cap, which is in Cali. Lennox. And we're gonna use that to do to a couple of things. We're gonna use it to poison the art cache of our target machine's on. What that's gonna do is allow us to perform a man in the middle attacks, and we could see the network traffic.
00:28
And then we're also gonna due in part to the lab is captured some lugging credentials.
00:34
So let's go ahead and get started. Now I'm gonna use in the cyber lapin farmer for this lab, and you're welcome to use this tool in your own environment. But we're not gonna cover that particular type of setup in this lab.
00:43
So we're gonna go ahead and get loved into the cyber labs. If you're not familiar. How to do that? Just logged into your cyber account. You'll see a little search box here, and we're just gonna search for certified ethical hacker so certified
00:54
ethical hacker and they just press the enter key. That's gonna pull up all the results for us. The last result option here is gonna be our lab. So once you pull that up, just click on the start. Now option.
01:07
It's gonna take you to a page where you'll see a big old launch button and go ahead and click on that. Now, I've already got this launched, so I'm just gonna click on the tab. I have open here.
01:15
So once it launches, its gonna take you into the practice laps. Ethical hacker. Now, for some reason, it doesn't. If it takes you into this main area where you've got python programming, Oracle will be a stuffy M where etcetera just go ahead and look for the practice labs ethical hacker and click on that. That will be the one we want.
01:32
Okay, so the next thing we want to do is we want to actually select our
01:36
type of lab we're gonna do here. So that's the implementing network level session hijacking. So it's about halfway down on the page here. It's this one right here. Just go ahead and click on that and click that start button that's gonna launch the lab for us.
01:49
Okay. And then our next step here is just turning on all our virtual machines. You just have your mouse overtopping click. Turn on. Now, all of minor on already.
01:57
Step four here. Once you've got all your virtual machines turned on, we're gonna can connect to the server. Soapy Lab s a 01 which I've already actually got pulled up here.
02:06
And then if we see the server manager window, we're gonna go ahead and close that. So I have it popped up here. I'm just gonna click the X to close out out.
02:14
All right, so move on to the next step of her lab. So Step number six. We're gonna click on the exam pie Khan from the taskbar. So let's go and do that. Now
02:21
we'll stroll down to the task bar, and it's gonna be this orange colored icon right here.
02:27
Once we click on that is gonna open the exam
02:30
window for us. We'll give that a second Might take a moment or so. There we go.
02:34
And what that's gonna do is that's gonna enable Apache Web service is with the N v A. That's running on port 80.
02:40
So one of the thing I found with this particular lab is I've had two. On my end of things, I've had to also start file Zillah for some reason to keep it from throwing an error message. So I would recommend Just go ahead and click. Start There is not gonna hamper anything we're doing in this lab. The only thing you could do is help, just in case you're getting the same issue as I had.
03:00
All right, so now we can move on to the next part of her lab.
03:04
So we've really got the exam. We've got all that initialized. Now we're gonna connect to our Windows 10 device, So let's go ahead and do that. We'll click on the Windows 10 right here. The people AB win 10.
03:13
So I've got a message here device not connected. So if you get that, just go ahead and click the refresh button.
03:19
And what that should do is refresh it with the demand controller here and establish a connection again. So while that's doing that. It might take a moment or so. We'll talk about the rest of this part One of the lab. So once we get into the Windows 10 we're gonna double cook on the V NC viewer because we want to open up our Callie Desta.
03:35
And then once we open that up, the DNC viewer, we're going to see the i p. Address for that Callie desktop. And then we're gonna click, connect and put in our password.
03:44
So you see here it was pretty quick about refreshing. So that's all you have to do if you get a little weird, our messages like that, and then just double click here on the V NC viewer. That's our next step.
03:53
What? You'll see her in a second herself, which should pull up. It's gonna initialize a few things first,
03:57
but once it pulls up, we're going to see that I p address off. The Cali machines are right there.
04:01
And then we're just gonna click that connect, but
04:04
and now it's gonna prompt us for a password. So let's go back to our lab documents. So you'll see here and step 11. I've got the password there for you. So it's gonna be the word password with a Capital P. But instead of a nowhere, that's gonna be a zero right there. So we're gonna type capital P
04:18
lower case A S S W zero,
04:23
and then lower case R D. And then you could either hit, enter or just click. Okay,
04:28
Gonna take a second or so, but it's gonna launch to Kelly desktop for us. You'll see it's launching there in the background.
04:32
So our next up here with a click the start icon on the Kelly desktop, and then we're going to select sniffing and spoofing and then the Etter cap graphic ALS. Let's go ahead and do that. So the start icon is this very bottom left one here. Now, if you get this pop up for some reason about a no session P i d just go and say okay to that, we don't care about that.
04:49
So back here, this is our start icon here. Just click on the very bottom left there,
04:57
and we're gonna cloak are we're gonna have our mouths over top of the sniffing and spoofing option here.
05:01
But it's taking a second or so to get all the way to it.
05:04
And now we're gonna click on Enter Cap Graphical about halfway down here,
05:08
and then just go ahead and click on that.
05:11
All right, I'm gonna take a moment or so to pull up. You'll see it launches enter Cat four. So we see that it's launching the other category or graphical user interface for us.
05:17
Our next appears to click sniff at the top and then unified sniffing.
05:21
So let's go ahead and do that. We're gonna click, sniff, appear at the top
05:25
and then choose the top option there, the unified sniffing.
05:30
It's gonna ask us for Ethernet interface here. So let's go and click on the lab document here and see which one we should choose. So Step 18 we should choose the e th zero. So let's go and do that and we see that's the one that's already in here. So we just say Okay to that.
05:46
Go back to allow Dr You see the background is starting to run Unified sniffing.
05:50
So now we're gonna do a scan for hosts were to select host at the top and then click the scan for host option.
05:57
So host at the top here and then scan for host about halfway down.
06:00
Go ahead and click on that. So what is gonna do is it's going to scan for host. And then what is also gonna do is it's gonna add the identify host to the host list. So we see it already finish the scan there. So now we're gonna click host at the top and then host list to see what kind of I p addresses or who those hosts are. So click on host and that host list the top choice.
06:20
All right, we see a couple I p addresses here. So the 100 to you once they say 04 that's our Windows 10 and then the top one there, the 0.1 is our server.
06:29
So let's go back to our lab documents to a kind of things we need to do next.
06:32
So step 25 year, we're gonna now we're gonna select and set our target host, so target number one is gonna be our Windows 10 machine, and then target number two is gonna be our server.
06:42
So let's go ahead and set those up. So all we have to do,
06:45
let's click on the I P address. So we'll start with the Windows 10. So that's that 1 98 Excuse me. The 102.168 dot zero doubt for. So once we click on it, we're just gonna click. Add to target one. So we want to make that target one,
06:57
and then you'll see at the bottom. Here. It's added that host to target one.
07:00
Okay, send thing with the server one
07:02
100 to 16801 We're just gonna click. Add to target two. We want to make that target too. So they've been at it. Now let's go back to our lab documents.
07:14
All right, so now we're gonna click on.
07:15
We've already clicked on both of those. We've added those targets.
07:18
Now we're gonna click on man in the middle of step 28 at the top window, and then we're in a select are poisoning. So let's go ahead and do that now. So we're gonna select men in the middle right here in the center
07:28
and then are poisoning the very top choice there.
07:30
That's gonna open a little window for us. It gives us few options here So let's go back to our lab and see what we need to do.
07:36
So step number 30 here under the optional parameters. We wantto check the boxes. Says sniff, remote connections.
07:43
So let's go ahead and do that. Now
07:45
we're gonna check this box here, and then we're just going to say, OK,
07:51
all right. So
07:54
you see here on a screen, it's poisoning the victims there. So it's poisoning. Target one target tubes with Windows 10 machine and also served.
08:03
All right, So in this lab, we just set up our poisoning of the art poisoning between the two machines. Now, in the next video, we're gonna go ahead and actually grab some user credentials from the machines.

Up Next

Penetration Testing and Ethical Hacking

Do you like breaking things or figuring out how things work? Join thousands of professionals who’ve entered the information security field by taking this class. Taking this ethical hacking course will give you the skills needed to become a professional penetration tester and prepare you for industry certifications, like the CEH.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor