I welcome back to the course in the last video. We just enabled Web service is on her server
and this video we're gonna use telling it to see if what kind of information we can get back from our target machine.
So let's get started.
You want to make sure you connect to the Windows 10 desktops of the P Lab Winton
and then just double click on the DNC viewers. So we want a long shot Kelly desktop. So let's double click on that.
You'll see no default. The i p. Address for us. We just say connect.
And then the password here is gonna be the same one who we've been used until Capital P
on the lower case A s S W
and that lower case r d not just click on. Okay. And that will launch the Kelly desktop for us.
So what's it launches? We want a double click on the route terminal icon. So we just wanted basically open the command line terminal line here for us.
It might take a second or soda launch here. And there we go. I was gonna double click it again, but it worked that time
s. So now that the prompt, we want to go ahead and enter our telnet command. So we're going to tell. Net
space 102.168 dot 0.1. Space 80.
another space and then the number 84 http. Support 80 and they just hit the enter key
Could take in a second or so to get connected here
and now the next thing we want to enter, let's go back to our lab document. The next thing we want to enter here
is gonna be this command here. So capital g e t a space and then afford slash DV w a forward slash than another space and then capital H t t p forward slash 1.1.
So the get command is going to obtain the data from the web server on That's more specifying the port. Excuse me? The protocol to connect with which again you see here is port, eh?
All right, so let's go ahead and type that in. So we're gonna just go and typing and still get
space forward slash DV w a forward slash and then another space than http forward slash 1.1.
Let's go ahead and run that command there.
Now, you probably want to hit enter a couple of times here.
We're gonna give it a second to run here.
So next, the next thing we want to do is just type in another command here. So host
Colon one night, a few 10.1680 dot one. So I'm right here on our lab document.
colon space 1 92.168 dot 0.1. And then we want to press the enter key a couple of times to get the results to spit out to it. So
let's go ahead and do that.
Then again, just needed a couple of times here and you'll see it'll start spitting back from some information on this.
Now, what we notice here is that we're getting information about the wooden what the server is running. So we see it's running Apache. So that's kind of our main goal here. We want to see what
information you know, what's what's that system we're going after? What's it really running here. So now, once we know this, we can go see. Okay. Well, what kind of vulnerabilities might there be for this version of Apache, You know, Is that the latest one, Is it not,
um, you know, what kind of very excuse me vulnerabilities are out there. They're for that particular piece of software.
So this video we just used tell Net to accomplish some banner grabbing here and again, banner grabbing all that is just getting some information from the target. Particularly about what type of operating system that might be running.
And the next video, we're gonna use a tool called N Cat to do a similar thing.