Time
9 hours 47 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:01
I welcome back to the course in the last video. We just enabled Web service is on her server
00:06
and this video we're gonna use telling it to see if what kind of information we can get back from our target machine.
00:12
So let's get started.
00:13
You want to make sure you connect to the Windows 10 desktops of the P Lab Winton
00:17
and then just double click on the DNC viewers. So we want a long shot Kelly desktop. So let's double click on that.
00:23
You'll see no default. The i p. Address for us. We just say connect.
00:26
And then the password here is gonna be the same one who we've been used until Capital P
00:30
on the lower case A s S W
00:33
the number zero
00:35
and that lower case r d not just click on. Okay. And that will launch the Kelly desktop for us.
00:43
So what's it launches? We want a double click on the route terminal icon. So we just wanted basically open the command line terminal line here for us.
00:52
It might take a second or soda launch here. And there we go. I was gonna double click it again, but it worked that time
00:57
s. So now that the prompt, we want to go ahead and enter our telnet command. So we're going to tell. Net
01:03
space 102.168 dot 0.1. Space 80.
01:10
All right,
01:11
Telnet
01:14
1 92.168 dot 0.1
01:18
another space and then the number 84 http. Support 80 and they just hit the enter key
01:23
Could take in a second or so to get connected here
01:29
and now the next thing we want to enter, let's go back to our lab document. The next thing we want to enter here
01:34
is gonna be this command here. So capital g e t a space and then afford slash DV w a forward slash than another space and then capital H t t p forward slash 1.1.
01:49
So the get command is going to obtain the data from the web server on That's more specifying the port. Excuse me? The protocol to connect with which again you see here is port, eh?
02:00
All right, so let's go ahead and type that in. So we're gonna just go and typing and still get
02:06
space forward slash DV w a forward slash and then another space than http forward slash 1.1.
02:15
Let's go ahead and run that command there.
02:20
Now, you probably want to hit enter a couple of times here.
02:23
We're gonna give it a second to run here.
02:28
All right?
02:29
So next, the next thing we want to do is just type in another command here. So host
02:35
Colon one night, a few 10.1680 dot one. So I'm right here on our lab document.
02:40
Step number 10 Host
02:44
colon space 1 92.168 dot 0.1. And then we want to press the enter key a couple of times to get the results to spit out to it. So
02:53
let's go ahead and do that.
02:57
Then again, just needed a couple of times here and you'll see it'll start spitting back from some information on this.
03:02
Now, what we notice here is that we're getting information about the wooden what the server is running. So we see it's running Apache. So that's kind of our main goal here. We want to see what
03:13
information you know, what's what's that system we're going after? What's it really running here. So now, once we know this, we can go see. Okay. Well, what kind of vulnerabilities might there be for this version of Apache, You know, Is that the latest one, Is it not,
03:28
um, you know, what kind of very excuse me vulnerabilities are out there. They're for that particular piece of software.
03:36
So this video we just used tell Net to accomplish some banner grabbing here and again, banner grabbing all that is just getting some information from the target. Particularly about what type of operating system that might be running.
03:47
And the next video, we're gonna use a tool called N Cat to do a similar thing.

Up Next

Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor