hello and welcome to post exploitation, hacking, persistence and continued access. This is part two gathering information.
This is specifically the Electra portion of the class. It's designed to be a companion to the actual practical portion,
a CZ well, as, of course,
its own stand alone information. For those of you who simply want to read and then try yourself rather than watch someone else run commands.
this video is going to discussing our goals in part to as well a CZ give a quick overview of the tools they're going to be examining
goals right here are understand what information gathering is and how it's done
gain an understanding of and familiarity with tools which will be commonly used in this process.
I know what to look for in a target machine
in terms of later on. After you've gone through all of this, when you're doing the exploit phase again
to target a new machine or to kind of work your way through the network, knowing which one you should target and why
prepare for data? Exfiltration
uh, which is sort of ah half step in between this and creating persistence
and, as always, avoid notice avoiding notices. Sort of gonna be primary goal of every section because it's a primary goal of post exploitation in general, whatever you want to do, you want to do it in such a manner is to not get caught.
Things we're going to explore going to be i f config
the N s switched out con file the resolve dot com file
pings Let's trace route Just general ICMP
Tools and map Prof TCP Dump and T Shark.
That's obviously for Lennox for Windows. We're going to explore I Peek and Pig Net stat are the net suite, which is different from Net stat. And there's a lot to it.
Quick glands it and let's look up
trace rt, which is again icmp Bay stuff. And then ah, more net sweet because really, this this is just a ton of stuff for that.
as I mentioned to slides ago, we won't understand what what information gathering actually is and how it's done.
So the biggest thing
about information gathering is that it's it's the point. It's why you're here as a pen tester or whatever you might be doing,
which again, you know, none of my business. But
keep in mind the whole Computer Fried Abuse Act. I would recommend doing this legitimately for the right reasons.
Ah, but information gathering is the point.
You break into a network to gather information to gain data.
There may be outside of the tools. I'm going to demonstrate there may be specific data you're after. It's your pen testing against a giant company like target or people or whatever you may be looking for, where they store credit card files or something to that effect.
you may be just looking for passwords to get root access to a source code server. If your pen testing a tech company,
um, to roll out information for new products, whatever
information gathering is
the most important phase
in that no matter how will you cover your tracks or how persistent your backdoor is, if you're not actually gathering good information, those two things are sort of a waste of your time.
It was going to be the largest portion of this class,
partially because, as I mentioned, it's of great importance and partially just because there are a ton of tools and there's a ton of information we're gonna look at most of the information about the way a computer can be configured,
and we're going to hopefully learn,
uh, what to look for and what's there.
So when it comes to information gathering Maur is always better. If there's a command you know of that will give you information That's not in this program, by all means. Run it.
as long as, obviously, it doesn't make too much noise.
the more information the better,
So with no further ado, we're gonna go ahead and end this video, and we can jump into the actual information that video is going to be current machine information gathering specifically in linen.