Hi. Welcome back to the course. In the last video, we talked about a tool called Dig that we can use for D. N s own transfers
and this video. We're gonna talk about a tool called PS info.
So let's go ahead and get started.
First, you want to connect to the P lab, win 801 machine, which is the bottom machine over here.
And I've already done so
once we connected that, we're gonna see a PS Tools folder on the desktop. Go ahead and double click on that. That's gonna open it up for us.
And then the next step is we want to right click on this file here the ps info dot e x e file.
We're best. Were you just gonna copy and paste it
to the desktop here? So let's go ahead and do that. So ps info dot e x e file.
So this one right here, go ahead. Right. Click
And then just right click on your desktop and pasty.
All right. So our next step here, we want to open a command problem. So we're gonna type in CMG in the search box here. And once we start typing that and it's gonna pull up the command prompt for us.
So let's go ahead. Do that. We're gonna right click on the start menu.
We're gonna say search
and they're just gonna pull up command prompt for us.
All right, so now we have our window open there.
So we selected a command prompt. Now we're gonna change our directory to the desktop. So we're gonna do seedy Space Capital D and then desktop with Capital D.
space desktop with a capital D. That's gonna change your directory. Did the desktop, and you'll see here now our path
ends in desktops. We know we're in the right spot.
Okay, So what? Now that we've done that, we're actually gonna take this command next. So the dash H flag is gonna display listing of installed hot fixes
for us, and then dash lower case D is gonna display information related to the disc volume.
The other thing I want to mention is if we see any type of license agreement for PS info, we're just gonna say yes to that so we can continue working with you.
So let's go ahead and get started.
We'll go back to our command prompt window here, and we're gonna type in Capital P
in the lower case s I
in f po dot e x g space
backwards last backward slash 1 92.168 dot 0.1 Space dash h space Dash D
All right, then, just press enter on your keyboard there.
Um, you'll see here we get that licensing agreement I mentioned. Just agree to that,
and then you're gonna see it's gonna start to query information on that particular target machine.
So question number one from our lab, Do you see any information about the target? And if yes, right, some of the output here in the lab. So let's go ahead and take a look back here. So we do see several data points. Come back here.
So up here's our command. We ran. So what we see here is this looks like it's running windows on, and it looks like Windows Server 2012.
Um, and it's only been on for, you know, 30 so minutes, which is actually tagging me in the lab since we're running a virtual here,
but basically We're the information we want right here. His Windows Server 2012 r two. That's gonna let us know if there's any exploits that we might be able to use later on. So
do we see in information about the target? Yes, of course we do. And then we'll definitely want to mention the operating system that it's running.
So in this lab, we just went over P s info
in the next lab. We're gonna talk about a tool called Finger that's used in Lennox to do a similar thing. Is Pia sinful where we can get information about our target machine?