Time
1 hour 14 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
Hey, everyone, welcome back to the course. So in the last video, we just wrapped up a brief discussion on what sets in. Hijacking is is, well, some ways that we can help prevent against it, including things like encryption
00:10
in this video where you go ahead and start our lab. So you will need access to the cyber lab environment to be ableto actually do the hands on lap here. And I also want to mention that this step by step guide is available in the resource is section of the course. So be sure to download that you can follow along. That way, if you feel I go too fast or too slow in this video, you can go ahead and follow along at your own pace
00:30
to perform the lab.
00:32
So all we need do is make sure we're logged into the cyber, a site which you should be if you're watching this course and there would be searching for the company a pen test plus bundle lab. So we're just gonna type in pen tests plus
00:45
and that will go ahead and pull it up for us. It'll be this one right here. The practice labs virtual lab. Now, we're not gonna be doing all the labs in this bundle, but the lab that we're looking for is actually inside of this bundle. So go ahead and click on it.
00:58
And then at the screen here, you'll select a launch button, and then finally, the launch item button actually launched a lab environment.
01:07
Now, it may take a few minutes for it to go ahead and launch the lab there
01:11
and you'll see we have several options on the left side here.
01:14
If we scroll down our step by step guide here, Step five, we're gonna be looking for the exploiting network vulnerability. So that's the lab we want to use
01:23
and what is going to select that one right there
01:25
and then select the start button to start the lab?
01:29
The next thing we need to do is boot up all of our virtual machines. So the way we do that is we just cover our mouths over top and select the power on option for all of these.
01:38
And it's gonna take a few minutes to boot all those steps. I'm gonna briefly pause the video and come back once all of my machines are booted up.
01:46
All right, so once all your virtual machines are booted up, you'll see it says on right here. And that's how you know all of them are up for you. So let's go back to the step by step lab guide here. So we've grown ahead, and we selected the exploding network vulnerabilities lab inside of the pen test plus lab bundle. We selected the start button, actually start the lab. We booted up those virtual machines,
02:04
and now we're gonna connect to the Cali Lennox machine. You'll see by default, I'm actually connected to it already.
02:07
But if you're not, go ahead and connect to the P Lab K L I 01 machine. So it'll be this one right here in the center.
02:15
Won't you connected that
02:17
you're gonna select applications here at the top,
02:23
you're going to select sniffing
02:25
right here, sniffing and spoofing. And then finally, you're gonna select theater cap option.
02:30
Now, just keep in mind that sometimes a lab goes a little bit slow. So you may just want to be patient with your mouse cursor here to make sure that it's selecting the appropriate menu options.
02:43
All right, so we've connected to enter Cap. Not what we're going to do is we're gonna select the Windows eight machine, so it's gonna be his P lab. When 810 grand. Select that one there.
02:54
And then we're just gonna open a command prompt once we've gone over to this machine here.
03:00
So following along here were down here at step number 11. So we've connected to the P lab. When? 810 machine. We're going to right click on the start menu here, select Iran, and they just run the command prompt. Open a command prompt window, and we're gonna be performing. Some are poisoning.
03:16
So just right. Click down here at the bottom left,
03:20
select run and then type in cmd and just hit. Okay.
03:24
Arsenal were at the command prompt. Here. We're just gonna type in art face, Dash A.
03:31
All right, so that's just going to show us the I P addresses along with the Mac addresses for our table. So let's go back to our Kelly Lennix machine. Where to select a P lab.
03:42
Kelly 01 again.
03:44
And now we're back at her cap. So if we go back to our step by step lab guide. You'll see we're down here
03:50
in step number 15.
03:53
So what we're going to do now is we're gonna select sniff and then unified sniffing
03:58
so a sniff and then unified Sniffing this top option right here.
04:01
And we just want to verify that E T. H zero is the interface and it should be by defaults. We're just going to say okay to that.
04:10
Next, we're going to select the host option here at the top
04:14
and then select the scan for host option down here in the center.
04:23
All right, so it's gonna go ahead and scan for our hosts. Let's go back to our lab guide here.
04:28
So now where we're going to do is we're going to be here it Step 18 were to select host and then host list.
04:34
So it's going to do that. So, host of the top again and then host list
04:39
I'm just gonna list all the host available for us.
04:42
I wouldn't want to do is we're gonna go ahead and go to the targets menu, so select targets
04:46
and then current targets.
04:49
And this is where we can specify the different target I p addresses that we want to use.
04:55
So in this example, we're gonna use Target number one. We're gonna select our first I p address here, so we're gonna be typing in 1 92.1680 dot five.
05:04
So let's go ahead and do that.
05:08
So we're gonna select the add button here,
05:10
and we're gonna type in 1 92.168
05:14
0.0 dot five and then just select the okay button there to add target number one,
05:19
and we're gonna follow a similar process here for a target number two, We're going to select the add button here. On this time, we're gonna type in an I P address of 100 to 168.0 dot 10 So you can type it all in again if you want to where you can just remove the five and type in 10 there
05:34
and then the same thing here to say OK,
05:39
let's go back to our lab guide.
05:41
So we've gone ahead and added in our targets, the next I'm going to do is actually perform the are poisoning. So down here in step number 24 we're gonna go ahead and select men in the middle and then are poisoning from the menu options here.
05:54
So let's go ahead and do that will select man in the middle
05:57
and then our poisoning.
06:00
All right, so the next thing we want to do is just make sure that
06:03
we check the box to the left of sniff remote connection. So go ahead. Just make sure that is actually checked
06:10
and what you've done that select the okay button there.
06:15
So now where we're going to do is we're gonna connect back to the Windows eight machine. So we're gonna connect to the P lab when 810 machine.
06:23
And if we go back to our lab guide here, you'll see we're down here in step number 26.
06:29
So we're gonna clear here at the command, prompt. And then we're gonna do our dash again.
06:35
So type CLS to clear that and select Enter That'll clear the command prompt there on, then just type in art space. Dash lower case A.
06:45
Let us show us our table again.
06:48
All right, so, neckwear. Next, we're going to connect back to our Callie Lennox machine
06:55
and we'll go back to our step by step lab guide here.
06:59
So now we're here it step number 30.
07:01
So let's select plug ins and then manage plug ins at the top here,
07:10
and then we're going to select the check poison option. So this one right here, we're just gonna go ahead and double check that
07:16
parts. Let's go ahead and close a plug INS tab here.
07:20
And the next thing we're going to do is we're gonna go back to the P lab when, 810 machine.
07:28
And this time we're gonna go to a website, and we're gonna actually enter in some user name, user name and password to see if we can go ahead and capture that information over in our Callie machine.
07:38
So let's go ahead and open Internet Explorer by clicking the icon here. The task part
07:42
And in this you are ill. You go back to our lab guy. We're typing in this u R l Right here. So, http colon forts last ford slash more 92.168 dot 0.104 slash b wap Let's go ahead and type that in.
07:57
So, http Colon, Ford's last ford slash r I p address 1 92.168
08:05
0.0 dot 10
08:07
and then four slash b
08:11
and that should take us to our log in page here and in the log in page. We're gonna be using the user name of B and the password of Bug. So let's go ahead and type that in. So be Haulover case
08:24
and then bug bu GI all lower case
08:28
and we'll go ahead and log in.
08:31
All right, so you'll see It goes ahead and logs. It's in there.
08:35
Now, before we move on now with our lab guy, we're gonna go ahead and stop the video here and we'll pick things back up in the next video. So studio to recap in this video we went ahead and launched our labs. We loved into the pen test plus lab. We went ahead and chose Theo exploiting the network vulnerabilities lab. And then we went ahead and launched our various virtual machines.
08:54
We also went in and we've poison the AARP cash.
08:56
And now we just went ahead and loved in. And the goal here is to try to get thes user credentials to pull through on her cap.
09:03
So in the next video word and go ahead and take a look at our results and see if we've been able to successfully capture those user credentials.

Up Next

Session Hijacking

This course covers session hijacking, where an attacker takes over a legitimately established session between a user and host. This is normally seen between a user and a Web server, but can occur with a Telnet session or other TCP-based connection.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor