4 hours 17 minutes
Hey, everyone, welcome back to the course. So in the last video, we wrapped up our lab of just analyzing malware. So we went ahead and created a malicious execute herbal. We then analyzed it through different means, and we finalize the lab by doing a hash calculation on our particular file. So in the future, if we were analyzing files, we could compare that hash
to future Mauer that we might experience and see if it's the same thing
in this video, where to go ahead and start our root kit lab. So again, I want to stress that we're using an older root kit here to learn the fundamentals.
So this step by step lab guide is available in the resource Is section. If you haven't downloaded those already, be sure to download those for the course, and this allows you to pause the video and go through the lab at your own pace.
Now you should already be logged into the Cyber re website. If you're not, make sure you're logged in. But if you're watching this course in most cases you should be logged onto the site already. The first thing we're going to do is search for root kit in the catalogue here.
And then we'll give us this root kit lab right here. So let's go ahead and select that will select a launch button
and then at the next screen will select the launch item button to actually launch the lab. Now, it might take a few minutes to go ahead and launch the lab all the way up. So we're gonna go ahead and positive video until it fully launches and then I'll restart once the lab is up.
All right, So once the lab boots up, it should actually take you directly into this window's X P desktop. And in this lab, we're gonna be using a tool called Root Kit revealing which is also an older tool. And hence the reason why we're using the Windows X P desktop. But again, I want to stress we're just going over the basic fundamentals in this particular lab.
So let's go back to our step by step lab guide here.
First thing we're going to do down here is step number six. We're gonna go ahead and launch the rocket, reveal er, and they just run a scan with it Now it may take a few minutes to run the skin, and you might also get some prompts around licensing, so just agree to the any license terms that you get. So go ahead and double click this shortcut icon here on the desktop
that's gonna launch a tool for us. You see, I get a license agreement. Just agree to that. If you get it
and you might get a couple of them there we go and then you'll be taken inside the tool, and we're just gonna go ahead and run the skin. It has mentioned it might take us a couple of minutes to run the first scan.
All right, So once the scan's complete, you'll see that it's actually gonna list out a couple of registered files and say that this is potentially malware. These air, actually false positives. So don't worry about that, but you should see a couple of results on this initial skin from your side.
So let's go ahead and close a root kit, reveal er here, there's gonna x out of that, and we're not gonna go to the command line so that when we do that in Windows expert, if you're not familiar. Just go to start menu and you can go to run and then cmd
and just enter. And that'll bring you up a command prompt.
So let's go back to our step by step lab guide.
So we just ran the skin with Rukia. Reveal er we went ahead and we've launched our command prompt window. So now we're here. It's step number 11. So are we going to do is type in task list. Now we want to just see what kind of task are running on this particular device. So this task list
all lower case and this press enter on your keyboard there.
All right, So you see, we got several task running now in this lab we're going to do is we're gonna be mimicking these various processes so specifically this a LG, Dottie FC. We're gonna be creating one called a one g dot e x c, which is going to be our malicious process. In that way, we can mimic that, and a lot of times malware would
be doing that right. It'll be
trying to look similar to this, so the the average person wouldn't be able to go through and actually say, Oh, that's a malicious file.
So the next thing we're going to do is we're gonna check for open ports.
So the way we do that is worth a type of command called net stats were type net stat.
And then we're gonna put a space and dash lower case A N,
and we're just gonna see if we have any ports open on this particular device. And of course, we do.
Now, for our purposes on this lab, we're gonna be using port number 1901 So you'll see here down a step 13. I've got that notated here. Just make a note of that. You don't have to memorize that. You'll see that in later commands in this lab. We I actually just list that same port number, and there would just be mindful that that's what
we're going to be doing. You don't see 90 no one listed here.
What we want to do what we're using a malicious porter sees me setting are malicious process to a specific port. We wantto try to increments by a small number to an existing port that's open. So that was somebody analyzing this may not notice the difference or may not notice.
They may think that that 90 no one is something legitimate, right? Because we've listed it right near
these other numbers here. These other active, poor numbers.
So the next thing we're going to do at the command prompt Here's just change the directory. So we're gonna do it here now. One thing I want to stress before we continue in this lab. If you want to get credit for actually doing this lab, what you want to do is you want to make sure that you,
ah specify these percentage task complete. You notice I don't do that in these labs. I just go through it. But just to make sure you check these boxes here that I'll go ahead and actually track your progress in this particular lap. So just make sure you do that to get full credit for this lab.
So going back to our step by step lab guide here, we're gonna use this command here to change our directory.
So we're just gonna go ahead and type in
space, and then we're gonna type in the path so capital C, colon backwards slash and then documents and settings
and then we're gonna put a backward slash again. We're gonna go to admin
backward slash desktop
and then a backward slash
h x d is and dog
and then the number 084
And then we're gonna put a space in the files and a backward slash
s. So go ahead and run that there and you'll see that will change our directory to this path right here.
All right, So now if we go back to our step by step lab guide, what we're going to do is we're gonna rename a couple of files here. So steps 17 and 18 we're just gonna do together. So well, First type in this command here and press enter. And then we're gonna type in this command here and press enter to rename that file as well.
So at the command prompt. Just type in rename
Space. And then our first file name, which is a TSH x d e
dot e x e and we're gonna rename that to a one g dot He exceeds Who if you recall when we looked at the processes we noticed, one was a L. G dot t x c. And so that's why we're naming this a one g Dottie XY because of lower case L in the number one. Ah, lot of times will look very similar.
So we'll go ahead, rename that, and we're gonna go again to step 18 and rename that file as well.
So we'll do rename. And now you know what you can do on your end. You just press the up Barrow and I'll back out of that. You see, you could press the up barrel there if you want to, and that will allow you to quickly put the change in there. I'm gonna go ahead and I'm just going to lead all that out. And I'm gonna type it in manually just to show you the entire thing again. So rename.
And then this time it's going to be a checks D e
f 084 But now the file extension is going to be dot
two and then dot i and I for the file extension.
And we're gonna change that to a one g dot ionized or initialization file.
We'll change out there.
All right, so we go back to our step by step lab guide.
The next thing we're going to do is we're actually gonna open that file and note pad, but we're gonna stop the video there, and we'll pick that up in the next video. So in this video, we just went ahead and
got into the lab itself. We went through and we looked for processes, running along with the port numbers. And then we've gone ahead and changed our directory. And now we just rename the files to different file names. So that way they hopefully blend in a little bit. And in the next video, whereto go ahead and finish our lab. So we're gonna open the
the a one g dot I and I file inside of no pattern were to make some specific changes, so definitely make sure that you follow along
with lab guide and make sure you're making the correct changes. So this actually works for you
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
Introduction to IT & Cybersecurity
In this course, We will cover several cybersecurity career roles - Network Administrator, Incident Responder, ...
2 CEU/CPE Hours Available
Certificate of Completion Offered