alright so when we scan a device we re trying to look out for vulnerab
Search for question
Question
Alright, so when we scan a device, we're trying to look out for vulnerabilities and it could be a server, it
could be a phone, it could be any of these devices that you're trying to go after. Number two, what we're
trying to do here is to find a vulnerability inside the system that we can take advantage of. So once we
find a loophole, we will be able to gain complete control of the device and once we're in, the question
mark is going to be what else can we do? So once you're in, what is it can we can do in terms of post-
exploitation? What can we do to elevate our privileges, to be able to gain complete control of the
system, to even break the password of the computer? So as you can see right here, on the left side, we
have the hacker computer. Alright, so this is hacker and what the hacker want to do is then to be able to
first scan and then lose down all of those services. For example, do they have a file transfer protocol
server? Do they have a secure shell being opened up? Do they have a website running so that we can
take advantage of those weaknesses within it and so on and so forth. And once we're able to list down
all of this, we can get the version and then from there we can determine all right what are the different
attack methods that we can go after. So right here, this is the place where we'll be thinking and
deciding about what are the different types of attack methods that we can use and then after which
we can launch a target against say the website, get launched an attack against into the FTP server, into
secure shell, whichever the case is, once we have uncovered exploit to use. And once we're in right here
into the system, right, what we want to do then is to elevate our privileges so that from a normal user,
we now have the ability to get root access, meaning that we can literally do anything we want with the
device. Remember to smash the like button and turn on notifications so that you don't get hacked. So
right in front of us, we're in colonics and the first thing we want to do is go ahead and open up terminal.
And once you're in terminal, what you want to do right here is to have the ability to begin scanning the
device or the server or the system, however you want to call it. So the first thing you want to do is enter
nmap. So nmap is going to be the tool that we'll use to help us scan the target device. So here when you
enter nmap, you can see all the options are available for us to scan the device to look out for all the
services. So literally like knocking door on the house, trying to scan a house, looking out for openings
that we can then, of course, be able to jump into the house and take out, for example, the cash and the
valuables and the jewelry, right? So this is exactly what we'll be doing as part of launching the attack. So
the first thing we want to do is to scan the IP address, all the host name, all the domain name. The goal is
that now you have a target in mind. So you can enter, for example, the following which is nmap.
03:08
And what we want to do now is to enter, say, one, I two, one, six, eight, zero, one, one, four. So this is
going to be target device that we're going after. So in this case, I can enter dash as followed by V. So this
is for the service version that we're going after dash capital O for the operating system version. So we
want to know whether it is a Linux, one version of Linux is it, if it is a Windows computer, what version of
Windows computer is it running on and then after which we want to target the ports. So ports are the
services that can be made available from the target device. So in this case, we can target, say from port
one, all the way to 65535. So once you're done with that, hit enter. And of course, we ask to enter super
user due because it requires root privileges. So enter on that, enter your password, hit enter. And now
we're scanning the device to look up for all these different services that are running on a server. And
now the scan is completed. So right here, you can see the following. All right, we have all this different
port numbers, all right, followed by the protocol. So in this case, there could be protocols like
transmission control protocol, and the state is of course open. And you can see at the same time, what
kind of services are running on? Is it a file transfer protocol, secure shell, or HTTP, IPP, and all of that. 04:15
All right, so all of their services, as well as the version on the most right side. So this is a really wonderful
way to quickly identify all right, all of these different services, all of the different versions. And once you
have the version, you can then determine what kind of exploit you want to use to go after all those
different types of services, so that you can have access into the system. And for today's case, we will be
targeting on Apache. And so you can see right here, we have HTTP 2.4.7. So we'll be targeting the
following. So as part of the device, all we got to do is just go ahead and enter the domain name of the IP
address here. And you can see right here, this is the directory listing. So you can see all of the directories,
the files within it.