4.3 System Hacking Plant backdoor EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
Hi. Welcome back to the course. In the last video, we went ahead and configure it R T FTP server. So if you haven't done that yet, just go ahead, pause this video, go back and walk through that previous video because you will need to configure to be able to do this part of the lab.
So in this video, we're gonna go ahead and actually plant the backdoor on our target machine.
So you should still be logged into the P lab When, 801 machine here And if not, go ahead, get connected to that, then our next step here is we're gonna double click on the P S Tools folder on your desktop. So this photo right here,
we're gonna see it's gonna open the file Explorer for us. So we'll see that right here in step number three. And now we wantto basically, we're gonna copy this, execute execute to our desktop.
So we're gonna locate the P S e x e c.
So the application So they executable
and we're gonna right click on it. And then we're gonna copy it,
and then we're gonna right click and paste it into our desktop
and then what we should see. And step seven, we should see that that file now shows on her desktop. So let's go ahead and do that. So
we're looking for P S E X C c.
All right. So it's gonna be this, uh, this one right up near the top here. Just go ahead and click on it. Now we want a copy and paste it to our desktops. We can right click
and then say copy.
And then you could either right click and paste it on the desktop here. Or you can just click the desktop. Won't hear. Right. Click and paste it in. There
are. Either way is fine. You'll see. It'll create the document on the desktop force.
Okay, so we see in step seven. Yes. It does show on the desktop for us now. So our next step here, we're gonna open the command prompt so we could do the rest of our lab.
So we're gonna click on starts, we're gonna scroll down, and you can go ahead and close this, uh, explorer window out. We're not gonna need that again for this lap.
So we're gonna right click and then a couple ways you can do it. You can just click on run and do si m d, But we're gonna take the long way. So we're gonna go search,
and I just type cmd
at the search box and it'll pull up the command prompt for us. Let's go ahead and click on that.
All right, so let's go back to our lab document here. So the command prompt it did open. So next we want to change our directory to the desktop. So we're gonna use this command here, the lower case CD for change directory, and then we're gonna type desktop so we can change your desktop.
So let's go ahead and do that. So lower case C D space and then does stop with a capital D So d capitalized on, then. Oliver case E s K T o p. And then just press see a tricky and your keyboard.
All right, so you'll see here that it's got us now. Our directory is the desktop.
All right, so let's move on with our lab. So now we're gonna go ahead, actually plant the door on our windows 10 machines. Soapy lab. Winton.
So at the command prompt. We're gonna type in this command here. This p x e x c c dot etc. So that's that file name that execute herbal. We're gonna type our target machine than CND for the command. So basically, we're gonna be entering or, you know, opening a command shell availability on the target machine
and what that allows us to do with the command shell. As we talked about the very first video, it does allow us to run a lot of different types of actions against a Windows machine. Or even if we're attacking a limits machine, were able to use the shells to run
the code and everything that we want to do to hopefully exploit to get whatever information we're trying to get off the target.
So that's kind of the value of planting backdoors or, you know, opening command shells on target advice. It allows us to do a lot of different things.
All right, so let's go and type this command in here,
so write his command line. Capital P lower case s Capital E. On the lower case, x p c dot g xy.
We're gonna put a space and then a backward slash backwards slash
And then all capitalize P l A b o w i n and then the number 10.
So that's our Windows 10 machine on, then cmd and then just press enter.
Okay? It's gonna take a second or so. What you're gonna notice is not now. We see that this says, See Windows system 32. So let's check. Now, let's go back to our lab document, but we're gonna basically check to see Are we even connected to the Windows 10 machine? So
Step 15. We did. We've gone ahead and connected. Now, step 16 we're gonna tie post game at the prompt. And if we see P lab when? 10. As the output. We know we're successful that this went successfully for us.
All right, let's go ahead, check it out. So we're gonna type post name
and then just press enter any keyboard
and all right, so you see there that we do have p lab win 10 So we are successfully connected here,
So let's move on to the next step of her lab.
So now we're to go ahead and enable t ftp client on the witness 10 machine. So that way we can connect to our server.
So we're gonna do that with this command here. So it's type it in. So d I s m all over. Case a space forward slash in an online
space four slash capital E on the lower case and a b l e dash capital f their case e a T u r E so enabled dash feature again with capital in capital F
another Stace the four slash again and then wanted to feature name So feature with a capital F
and that name. So no dashing between these ones.
And then we're gonna do the colon and then t f t p
so D I s m
space forward slash online
space forward slash Enable
dash feature
space forward slash feature name
Cole and T f T P. And then just press the enter key on your keyboard.
So it's gonna take a moment of soda run,
so come back to our lab document here.
So now we're right here. We're just going ahead, and we're enabling the TF. Petey client. So we've pressed, entered here. So now we're gonna go ahead and get our back door. So you see, we're back at the command prompt. They're so next we're gonna type in this command. Here. The tea FTP space 100 to 16805 which is the I p of our target.
And then we're used to get command and then end cat don t x c, which is our
backdoor for this particular lab.
All right, so what we're gonna do with that command is going to save the back door onto our target machine.
All right, so let's go ahead and enter that in now.
we have t f t p
192.168 dot 0.5
and then get
all capitalized, and then we're gonna do are executed.
All right, let's go in tight. That s o t F t p 1 92.168 dot 0.5. Again, that's our target.
But then get so space and then get all capitalized A space in an Oliver case and cap
dot e x e.
And we'll go ahead just his enter there. So you don't really see any action here, But what is going to do is move that particular back door onto the target machine for us.
All right. So you see here, that s a is the back door onto into the wisdoms. Windows assistant 32 on our target machines of the P Lab. Win 10.
So step 23 here. We're gonna let that run for a second or so. Here. It should
almost be done,
but basically, it's going to save it on the Windows 10 machine for us. So let's look at question number one. So what is one of the benefits? If you think back to our initial video for this lab that where we kind of went over different copies like T F, T P and we and I explained what back doors were and why we would use those. Think back to all that on. So
So it looks like the connection request failed there. So we're gonna try that command again real quick before we go over Question one. So
let's try that again here. Sochi FTP.
And I'm gonna double check myself. Make sure I'm typing it incorrectly. So T e f p t t p.
I wanted to 16805 get and cat Dottie XY So
we'll be typed here so we're just gonna type it again and see how we do so T f p T p 1 92
that 168.0 dot five
space Get all capitalized space and cat dot T x c.
All right, so we're gonna see if that goes through or not. If it's still failing on my end but is going through on your end and that's perfectly fine. All we're trying to do here is just basically save the back door so re technically shouldn't get any real output. If we're saving the back door on there, it should just take us back to the command prompt awaiting our next command. So we're just gonna move on to question number one here. So
think back to the initial video there.
So think about what, At least one of the benefits and think on the simplistic level here, the very high level.
What's one of the benefits of having the back door on the target machine?
So if you guessed and my my answer here would be, well, it allows us to maintain access on the target machine and and with maintaining access, then we can launch whatever else we want to do, we could steal data. We can corrupt the mission, the data on the machine. We can do different things on that. So
something along those lines that's basically our goal with the back door's allows us to maintain access. And that's probably biggest thing. If you decide to ever take the certified ethical hacker Exam three C Council Just always remember in your head that back door allows you to maintain access.
So in this portion of the lab, we just went over planting our back door. You'll see here that I got a couple of failed requests for connections there. For some reason, it could just be the lab that I'm using here. That's fine. If yours is working, that's that's all I really care about. But essentially, we're just trying to plant the back door. We're not gonna actually execute it and do anything with it.
And this particular lab.
So this lab overall, what we did is we did our T FTP server configuration, got that going, and then we went ahead and used some different commands to plant the backdoor on our target machine. So we established a command shell and then we used a few commands basically to move the file over to our target machine.
So in the next section of the course, we're gonna go ahead and take a little deeper dive in tow. Malware. So we're gonna talk about a lot of different things, like viruses, Trojans, and we're gonna also talk about a lot of the more more current ones. Now, if you are starting for the surf in ethical hacker examination, which you will notice
depending on
how current Theo exam is, there may be slim like older viruses and worms discussed there. And that's fine. It's fine to know that stuff, but we're gonna focus primarily this this next section is gonna be focused on Magic Module five's gonna be focused on newer threats. So a lot of the banking Trojans, that sort of stuff. We're gonna go over those as well.
Just you stay current with your skill level.
If, after this course or goals to tryto either workers a penetration tester or just improve your knowledge in cybersecurity as an entire industry
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By