All language subtitles for 4. Gathering More Sensitive Info (Running Services, Operating System....etc)

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 1 00:00:00,720 --> 00:00:04,880 Now, in the previous lecture we had a quick look on Zenmap 2 2 00:00:04,880 --> 00:00:07,780 and how it can be used to gather information. 3 3 00:00:07,780 --> 00:00:10,560 So in this lecture we'll build up on that, 4 4 00:00:10,560 --> 00:00:13,950 and the main scan that I wanna show you right now 5 5 00:00:13,950 --> 00:00:15,883 is the quick scan plus. 6 6 00:00:17,570 --> 00:00:21,480 This scan takes the quick scan one step further. 7 7 00:00:21,480 --> 00:00:23,960 So first of all it'll be slower, 8 8 00:00:23,960 --> 00:00:27,870 but it's going to show us even more information. 9 9 00:00:27,870 --> 00:00:32,060 So first we're gonna be able to see the operating system 10 10 00:00:32,060 --> 00:00:35,140 running on the discovered devices. 11 11 00:00:35,140 --> 00:00:38,250 We will also be able to see the device type, 12 12 00:00:38,250 --> 00:00:41,660 whether it's a phone or a laptop or a router, 13 13 00:00:41,660 --> 00:00:45,290 and we'll be able to discover the program, 14 14 00:00:45,290 --> 00:00:49,470 and the program version running on the discovered ports. 15 15 00:00:49,470 --> 00:00:51,010 So before for example, 16 16 00:00:51,010 --> 00:00:53,950 we were able to discover port 80 is open, 17 17 00:00:53,950 --> 00:00:57,740 but we didn't know what program is running on this port 18 18 00:00:57,740 --> 00:01:00,000 or what version of this program. 19 19 00:01:00,000 --> 00:01:03,460 Getting the exact program version is really helpful 20 20 00:01:03,460 --> 00:01:06,090 when we get to the gaining access section, 21 21 00:01:06,090 --> 00:01:08,570 and you'll see then how we can use that 22 22 00:01:08,570 --> 00:01:11,220 to exploit vulnerable services 23 23 00:01:11,220 --> 00:01:14,640 and gain full control over the computers 24 24 00:01:14,640 --> 00:01:17,023 that have these services installed. 25 25 00:01:18,960 --> 00:01:21,270 Now straight away when you look at the results, 26 26 00:01:21,270 --> 00:01:23,790 you'll se that we got much more information 27 27 00:01:23,790 --> 00:01:26,950 than all of the scans we ran so far. 28 28 00:01:26,950 --> 00:01:29,240 So the first thing you'll notice is the icons 29 29 00:01:29,240 --> 00:01:33,070 beside the IPs of the discovered devices. 30 30 00:01:33,070 --> 00:01:35,870 These icons represent the operating system 31 31 00:01:35,870 --> 00:01:38,040 running on these devices. 32 32 00:01:38,040 --> 00:01:39,980 So right now we have the operating system 33 33 00:01:39,980 --> 00:01:42,360 for all of the connected devices, 34 34 00:01:42,360 --> 00:01:45,240 and now it's shown us the programs running 35 35 00:01:45,240 --> 00:01:47,530 on each of the discovered ports 36 36 00:01:47,530 --> 00:01:50,360 and the versions of these programs. 37 37 00:01:50,360 --> 00:01:53,850 So for example if we look at the 191.168.1.12, 38 38 00:01:53,850 --> 00:01:55,090 the Apple device, 39 39 00:01:55,090 --> 00:01:57,460 on the last scan we knew that port 22 open 40 40 00:01:57,460 --> 00:01:59,690 and we knew that SSH is running on it, 41 41 00:01:59,690 --> 00:02:03,220 but we didn't know what version of SSH was running. 42 42 00:02:03,220 --> 00:02:07,083 Right now we can see that it's running open SSH version 6.1, 43 43 00:02:08,360 --> 00:02:10,880 so we can go on Google and look for exploits 44 44 00:02:10,880 --> 00:02:14,430 and vulnerabilities in this specific version, 45 45 00:02:14,430 --> 00:02:16,740 and we might actually find something. 46 46 00:02:16,740 --> 00:02:18,490 We'll actually talk more about that 47 47 00:02:18,490 --> 00:02:20,203 in the "gaining access" section. 48 48 00:02:21,240 --> 00:02:23,430 Now if you look at the device type, 49 49 00:02:23,430 --> 00:02:26,960 you can see that it's a media device; it's a phone. 50 50 00:02:26,960 --> 00:02:29,500 So before we knew this is an Apple device 51 51 00:02:29,500 --> 00:02:31,450 but we didn't know whether it's a tablet, 52 52 00:02:31,450 --> 00:02:33,570 a phone, or a MacBook. 53 53 00:02:33,570 --> 00:02:36,380 Right now we know that it is a phone. 54 54 00:02:36,380 --> 00:02:38,180 It's also discovering that it's running 55 55 00:02:38,180 --> 00:02:40,750 Apple iOS four, five or six. 56 56 00:02:40,750 --> 00:02:43,270 Now it's actually running a newer version of iOS, 57 57 00:02:43,270 --> 00:02:45,900 I'm not entirely sure, I think nine or 10, 58 58 00:02:45,900 --> 00:02:48,410 but still, it's close enough it's getting me. 59 59 00:02:48,410 --> 00:02:50,300 It's telling me it's an Apple. 60 60 00:02:50,300 --> 00:02:53,330 It's telling me that it's a phone, it's running iOS. 61 61 00:02:53,330 --> 00:02:55,113 So this is really really good. 62 62 00:02:56,610 --> 00:03:00,840 Now if we go to the next device here, the 192.168.1.20. 63 63 00:03:00,840 --> 00:03:05,520 This is a Linux device and when we run the quick scan 64 64 00:03:05,520 --> 00:03:10,410 we are able to identify port 80 and port 49152 open, 65 65 00:03:10,410 --> 00:03:12,780 but again, we didn't know the program running 66 66 00:03:12,780 --> 00:03:16,010 or the service version running on this port. 67 67 00:03:16,010 --> 00:03:21,010 So right now we know it's a Apache httpd 2.2.22, 68 68 00:03:21,600 --> 00:03:23,360 it's running on Ubuntu so again 69 69 00:03:23,360 --> 00:03:25,330 now we have the operating system, 70 70 00:03:25,330 --> 00:03:28,520 the exact version of the service running 71 71 00:03:28,520 --> 00:03:31,200 so we can go and look for weaknesses and exploits 72 72 00:03:31,200 --> 00:03:33,730 in this specific version. 73 73 00:03:33,730 --> 00:03:35,540 And this port, we didn't even know 74 74 00:03:35,540 --> 00:03:37,440 what service was running on it. 75 75 00:03:37,440 --> 00:03:40,450 Right now we know it's a UPnP service 76 76 00:03:40,450 --> 00:03:43,480 and the server is MediaTomb UPnP. 77 77 00:03:43,480 --> 00:03:45,640 We have the exact version again 78 78 00:03:45,640 --> 00:03:48,290 so again we can go ahead and look for exploits 79 79 00:03:48,290 --> 00:03:50,290 in these specific versions, 80 80 00:03:50,290 --> 00:03:52,550 and if we discover any we'll be able 81 81 00:03:52,550 --> 00:03:56,400 to gain full control on this computer. 82 82 00:03:56,400 --> 00:04:01,210 Again if we go down to the 192.168.1.22 machine we can see 83 83 00:04:01,210 --> 00:04:06,040 that it's running a Microsoft HTTPAPI, on port 5357. 84 84 00:04:09,220 --> 00:04:11,640 You can also browse by the services. 85 85 00:04:11,640 --> 00:04:14,950 So from here on the left if you click on services 86 86 00:04:14,950 --> 00:04:19,250 you'll be able to categorize the discovered clients 87 87 00:04:19,250 --> 00:04:20,540 based on the services. 88 88 00:04:20,540 --> 00:04:23,570 So if we click on http we'll see all the clients 89 89 00:04:23,570 --> 00:04:25,940 that have a http service running. 90 90 00:04:25,940 --> 00:04:29,450 If you click on ssh we can see the Apple device here. 91 91 00:04:29,450 --> 00:04:32,743 It's the only device that has a ssh service running. 92 92 00:04:33,990 --> 00:04:37,090 So let me actually show you a quick and fun example. 93 93 00:04:37,090 --> 00:04:38,860 If we go back here to the hosts 94 94 00:04:38,860 --> 00:04:43,780 and go back to the apple device, the 192.168.1.12. 95 95 00:04:43,780 --> 00:04:46,470 As we see and as I said we know it's a phone, 96 96 00:04:46,470 --> 00:04:47,890 we know it's an Apple phone, 97 97 00:04:47,890 --> 00:04:51,340 we know that it has an ssh service installed on it 98 98 00:04:51,340 --> 00:04:56,070 running on port 22, and we know that ssh is a service 99 99 00:04:56,070 --> 00:05:00,700 that allows you to remotely execute system commands 100 100 00:05:00,700 --> 00:05:05,700 on the computer that has the ssh service installed. 101 101 00:05:05,820 --> 00:05:08,680 Now obviously before you can use this service 102 102 00:05:08,680 --> 00:05:11,170 you have to use a username and a password. 103 103 00:05:11,170 --> 00:05:14,440 Once you authenticate it will allow you to execute 104 104 00:05:14,440 --> 00:05:18,883 system commands remotely on that computer or on that phone. 105 105 00:05:19,720 --> 00:05:24,720 Now by default iOS devices do not have an ssh server. 106 106 00:05:24,880 --> 00:05:28,380 Usually when you jailbreak the phone or the device 107 107 00:05:28,380 --> 00:05:31,880 it will automatically install an ssh server 108 108 00:05:31,880 --> 00:05:34,470 and the password for that server 109 109 00:05:34,470 --> 00:05:37,320 is set to "alpine", by default. 110 110 00:05:37,320 --> 00:05:39,920 That's A-L-P-I-N-E. 111 111 00:05:39,920 --> 00:05:41,950 Now since we know that this is an iPhone 112 112 00:05:41,950 --> 00:05:45,440 and it has port 22 open with open ssh server, 113 113 00:05:45,440 --> 00:05:48,200 we know that that this phone has been jailbroken. 114 114 00:05:48,200 --> 00:05:49,920 Now since the phone is jailbroken, 115 115 00:05:49,920 --> 00:05:53,580 we know the password to log into ssh is "alpine" 116 116 00:05:53,580 --> 00:05:55,850 unless the user changed it. 117 117 00:05:55,850 --> 00:05:58,730 Now most users do not even know about this, 118 118 00:05:58,730 --> 00:06:00,640 and even the ones that know about this, 119 119 00:06:00,640 --> 00:06:03,760 like myself, are too lazy to change it. 120 120 00:06:03,760 --> 00:06:06,150 So it's always worth a try if you discover 121 121 00:06:06,150 --> 00:06:08,770 a phone like this in the same network. 122 122 00:06:08,770 --> 00:06:10,700 It's always worth a try to go and try 123 123 00:06:10,700 --> 00:06:13,760 to connect to it with the default password. 124 124 00:06:13,760 --> 00:06:15,940 So I'm just gonna go to my terminal 125 125 00:06:15,940 --> 00:06:19,097 and I'm gonna try to connect to this phone using ssh. 126 126 00:06:20,050 --> 00:06:23,200 So I'm gonna type "ssh root", 127 127 00:06:23,200 --> 00:06:26,944 which is the username for the admin in Linux, 128 128 00:06:26,944 --> 00:06:31,944 "@192.168.1.12". This is the IP of the phone. 129 129 00:06:32,420 --> 00:06:33,630 I'm gonna hit enter. 130 130 00:06:33,630 --> 00:06:35,890 It's asking me if I should trust this connection, 131 131 00:06:35,890 --> 00:06:39,810 I'm gonna say yes, and now it's asking me for the password. 132 132 00:06:39,810 --> 00:06:42,310 And like I said, when the phone is jailbroken 133 133 00:06:42,310 --> 00:06:44,980 the password is set to "alpine". 134 134 00:06:44,980 --> 00:06:48,750 So I'm gonna type A-L-P-I-N-E. 135 135 00:06:48,750 --> 00:06:50,143 I'm gonna hit enter. 136 136 00:06:51,140 --> 00:06:54,570 And as you can see, I logged in as root. 137 137 00:06:54,570 --> 00:06:57,880 So right now I have the highest privileges on the phone 138 138 00:06:57,880 --> 00:07:01,700 and I can do whatever I want on the system. 139 139 00:07:01,700 --> 00:07:03,820 And now we can use system commands 140 140 00:07:03,820 --> 00:07:06,003 to completely control the phone. 141 141 00:07:07,370 --> 00:07:09,720 Now this is a little bit ahead of time, 142 142 00:07:09,720 --> 00:07:12,080 we are still in the "network hacking" section, 143 143 00:07:12,080 --> 00:07:13,730 so don't worry too much about this, 144 144 00:07:13,730 --> 00:07:17,480 we'll talk more about it in the "gaining access" section, 145 145 00:07:17,480 --> 00:07:20,520 but it's just a quick example that I wanted to show you 146 146 00:07:20,520 --> 00:07:23,590 of how powerful information gathering is, 147 147 00:07:23,590 --> 00:07:26,860 because we literally did not exploit anything right here, 148 148 00:07:26,860 --> 00:07:29,860 we just relied on the information we gathered 149 149 00:07:29,860 --> 00:07:32,200 and we were able to hack an iPhone 150 150 00:07:32,200 --> 00:07:34,623 that is connected to the same network as us. 151 151 00:07:36,610 --> 00:07:39,960 Now like I said Nmap is a huge tool. 152 152 00:07:39,960 --> 00:07:41,420 I highly recommend you go ahead 153 153 00:07:41,420 --> 00:07:43,900 and try the other profiles in here, 154 154 00:07:43,900 --> 00:07:45,970 and like I said, once done with the course, 155 155 00:07:45,970 --> 00:07:49,940 I think the Nmap book would be a really really good read. 156 156 00:07:49,940 --> 00:07:52,067 We'll also use Nmap much more in the 157 157 00:07:52,067 --> 00:07:54,540 "gaining access" section and we'll see how we can use 158 158 00:07:54,540 --> 00:07:58,170 this information to gain full control over the computers 159 159 00:07:58,170 --> 00:08:01,840 using code execution vulnerabilities and so on. 160 160 00:08:01,840 --> 00:08:03,950 But in this lecture I just wanted to give you 161 161 00:08:03,950 --> 00:08:06,670 a quick overview and we'll build up on this 162 162 00:08:06,670 --> 00:08:08,353 as we go through the course. 14418

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.