Search for question
Question

Alright, so when we scan a device, we're trying to look out for vulnerabilities and it could be a server, it could be a phone, it could be any of these devices that you're trying to go after. Number two, what we're trying to do here is to find a vulnerability inside the system that we can take advantage of. So once we find a loophole, we will be able to gain complete control of the device and once we're in, the question mark is going to be what else can we do? So once you're in, what is it can we can do in terms of post- exploitation? What can we do to elevate our privileges, to be able to gain complete control of the system, to even break the password of the computer? So as you can see right here, on the left side, we have the hacker computer. Alright, so this is hacker and what the hacker want to do is then to be able to first scan and then lose down all of those services. For example, do they have a file transfer protocol server? Do they have a secure shell being opened up? Do they have a website running so that we can take advantage of those weaknesses within it and so on and so forth. And once we're able to list down all of this, we can get the version and then from there we can determine all right what are the different attack methods that we can go after. So right here, this is the place where we'll be thinking and deciding about what are the different types of attack methods that we can use and then after which we can launch a target against say the website, get launched an attack against into the FTP server, into secure shell, whichever the case is, once we have uncovered exploit to use. And once we're in right here into the system, right, what we want to do then is to elevate our privileges so that from a normal user, we now have the ability to get root access, meaning that we can literally do anything we want with the device. Remember to smash the like button and turn on notifications so that you don't get hacked. So right in front of us, we're in colonics and the first thing we want to do is go ahead and open up terminal. And once you're in terminal, what you want to do right here is to have the ability to begin scanning the device or the server or the system, however you want to call it. So the first thing you want to do is enter nmap. So nmap is going to be the tool that we'll use to help us scan the target device. So here when you enter nmap, you can see all the options are available for us to scan the device to look out for all the services. So literally like knocking door on the house, trying to scan a house, looking out for openings that we can then, of course, be able to jump into the house and take out, for example, the cash and the valuables and the jewelry, right? So this is exactly what we'll be doing as part of launching the attack. So the first thing we want to do is to scan the IP address, all the host name, all the domain name. The goal is that now you have a target in mind. So you can enter, for example, the following which is nmap. 03:08 And what we want to do now is to enter, say, one, I two, one, six, eight, zero, one, one, four. So this is going to be target device that we're going after. So in this case, I can enter dash as followed by V. So this is for the service version that we're going after dash capital O for the operating system version. So we want to know whether it is a Linux, one version of Linux is it, if it is a Windows computer, what version of Windows computer is it running on and then after which we want to target the ports. So ports are the services that can be made available from the target device. So in this case, we can target, say from port one, all the way to 65535. So once you're done with that, hit enter. And of course, we ask to enter super user due because it requires root privileges. So enter on that, enter your password, hit enter. And now we're scanning the device to look up for all these different services that are running on a server. And now the scan is completed. So right here, you can see the following. All right, we have all this different port numbers, all right, followed by the protocol. So in this case, there could be protocols like transmission control protocol, and the state is of course open. And you can see at the same time, what kind of services are running on? Is it a file transfer protocol, secure shell, or HTTP, IPP, and all of that. 04:15 All right, so all of their services, as well as the version on the most right side. So this is a really wonderful way to quickly identify all right, all of these different services, all of the different versions. And once you have the version, you can then determine what kind of exploit you want to use to go after all those different types of services, so that you can have access into the system. And for today's case, we will be targeting on Apache. And so you can see right here, we have HTTP 2.4.7. So we'll be targeting the following. So as part of the device, all we got to do is just go ahead and enter the domain name of the IP address here. And you can see right here, this is the directory listing. So you can see all of the directories, the files within it.