Time
9 hours 47 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:02
Hi. Welcome back to the course. In the last video, we talked about a tool called PS Info.
00:06
In this video, we're gonna use a tool called Finger. So Finger works in Lenox. So let's go ahead and get started. Now, make sure you connect to the Windows 10 desktop soapy Lan Win 10 is gonna be the machine you want, and then we're gonna access to Cali desktops. If you remember, we double click on the VSC viewer.
00:25
It's gonna take a second or so, but it's gonna launch to Cali desktop for us,
00:29
and then we're just gonna log into that.
00:32
All right, so we get our i p address there, we say connect,
00:35
and then we're gonna type in your password. So capital P lower case pest. Excuse me. Lower case A s S W zero lower case R D and then just say okay. And that's gonna launch the Kelly desktop. And then the next step here is we're gonna double click to open up our terminal window.
00:52
All right, so double click on that route terminal.
00:58
All rights, go back for a lab here.
01:02
So the next thing we're gonna do once the terminal launches we're gonna type in finger space Dash s
01:08
space dash route.
01:11
So finger space, Dash s space route. This is gonna display information about all the users that are available on that particular system.
01:22
So we're gonna tie finger
01:23
space
01:26
Dash s
01:30
space route.
01:34
Silicon information would get back. So looks like we only have the route user on here, which is correct. That's all we have set up here. But if we have several years, is in with list their information on there as well. So we might be ableto see on this particular machine of Okay, you know, we can I have a password for Suzy q's account and she's listed right here. So
01:53
I know this machine I can log in is hurt,
01:56
so just keep that in mind.
01:57
That's really what we're trying to go with. It is, how can we exploit this to our benefit?
02:01
So, question number one, do we see other users logged in? Yes, of course. And we see that that user that slug in his route, which is us, actually, but
02:10
we're just gonna go and type that in there.
02:15
So in this video we wrapped up our discussion on the numerator in tools.
02:20
And in the next module, we're gonna actually go over some system hacking.
02:23
So things like password cracking and various attacks.

Up Next

Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor