5 videos 📅 2025-08-01 09:00:00 America/New_York
1:43
2025-08-01 09:20:57
3:21:34
2025-08-01 09:23:06
3:24:40
2025-08-01 13:02:23
52:46
2025-08-02 09:03:25
4:52:32
2025-08-02 09:56:41

Visit the Kali Linux Intermediate course recordings page

                WEBVTT

00:00:00.210 --> 00:00:09.650
yes and no what I see is you're on death the desktop I still see you on the

00:00:09.650 --> 00:00:31.460
desktop I am about to share my screen fantastic you are going to get there um

00:00:31.460 --> 00:01:24.290
have you done NCL before yeah you need a really good study buddy can you hear me

00:01:24.290 --> 00:01:45.400
I'm here can you hear me so far oh good you can hear me we're doing we're

00:01:45.400 --> 00:02:10.090
cooking with grease I want to share my screen okay I'm gonna do it on my my

00:02:10.090 --> 00:02:39.520
virtual box here one other happening one of the requirements need to restart my

00:02:39.520 --> 00:02:45.280
virtual box or something I'm clicking on the button I have it open but I don't

00:02:45.280 --> 00:03:03.330
see it close window hey you see it by virtual box yeah i do not see it it's running

00:03:05.970 --> 00:03:21.230
that it is i'm trying to okay i got it i found it okay let's close let's go

00:03:21.230 --> 00:03:31.300
oh it's not responding that's what's happening let me close this close the program start it up

00:03:31.300 --> 00:03:52.220
again and maybe it'll work it was probably open since yesterday okay virtual bodies in the task

00:03:53.420 --> 00:03:59.740
all right then what else do i want to task let's end this task save me some resources

00:03:59.740 --> 00:04:09.640
and I have all this open point okay Microsoft okay close that I'm gonna go

00:04:09.640 --> 00:04:17.680
back to my virtual box and see if I can open it make some stuff work Linux going

00:04:17.680 --> 00:04:41.180
to the Cali machine yeah dog or cat got two dogs myself you had a couple of kids

00:04:41.180 --> 00:04:47.500
running around there too yeah i have a handsome young man i saw him yesterday in the background

00:04:47.500 --> 00:04:54.780
thank you i have our five grand babies and um four of them are here right now

00:05:11.100 --> 00:05:21.630
okay i'm opening up my stuff okay um um i know you know this but i'm gonna do my um

00:05:21.630 --> 00:05:34.360
my updates yeah let that roll through um I seem to be good to go clear the screen okay I'm gonna

00:05:34.360 --> 00:05:53.000
come to my Firefox and I want to open up my Pico CTF login I am human logging in and I'm doing all

00:05:53.000 --> 00:06:03.850
that's inside my virtual box okay yeah all right let's see in your virtual box I get it so they

00:06:03.850 --> 00:06:13.090
have two wireshark things here let's click on this first one um any and every time use you know

00:06:13.090 --> 00:06:22.320
what a pcap is in the pcap ng yes or no i know it's a wireless file so no okay i can lock it up

00:06:22.320 --> 00:06:28.100
there we go that's what we're going to do it's just the research i am going to click on this

00:06:28.100 --> 00:06:34.520
and it's going to start the download it's coming up at shark one two pcap ng which i guess i've

00:06:34.520 --> 00:06:42.250
done this before and it's going to download in which folder in my Cali can

00:06:42.250 --> 00:06:52.820
you tell me the box that you're on I'm sorry what you're downloading something

00:06:52.820 --> 00:06:57.740
and you're asking me which folder it's in the terminal that you're on okay so

00:06:57.740 --> 00:07:04.420
what do I type to see what's here would you want to list the what's in the file

00:07:04.420 --> 00:07:20.560
ls ls enter enter okay do you see that it was it was it was a shark it was be specific

00:07:21.440 --> 00:07:30.400
shark1.png so when you download stuff it goes into the downloads folder you understand

00:07:31.120 --> 00:07:36.000
and we need to know that as pentester right so i'm gonna change directory to downloads

00:07:36.000 --> 00:07:50.880
do a list and look here's ncl spring um and then it's um alphabetical order i have three sharks

00:07:50.880 --> 00:08:00.480
right i only need one so i'm going to remove the other ones rm to remove sharp tab that over

00:08:01.040 --> 00:08:08.000
do that like that and that then i'm going to remove the second one come over here

00:08:10.240 --> 00:08:19.200
uh do that like that and do that then i'll do a list again and i have the one shark one p cap ng

00:08:20.720 --> 00:08:23.920
did you find out what p cap and p cap ng mean yet

00:08:23.920 --> 00:08:30.880
packet capture it's a file format for network traffic it's a packet capture

00:08:31.520 --> 00:08:39.680
and what's inside of it is headers payloads and sources right and then what does pcap ng mean

00:08:43.950 --> 00:08:54.670
g mm-hmm we want to always quickly know or if we don't know we want to always find out

00:09:01.970 --> 00:09:04.450
we're going to do two things here too as a matter of fact because uh

00:09:04.450 --> 00:09:37.950
i want to answer all of your questions thinking you can't benji come on so here we go google work

00:09:47.870 --> 00:10:09.340
you see it did you say yes it's generation yes next generation now you know

00:10:12.030 --> 00:10:15.310
and all i did was type this question into google and they gave me the answer

00:10:15.310 --> 00:10:24.750
So it's a replacement file for an old payload file for wireless, which was the Wireshark

00:10:24.750 --> 00:10:28.230
one that we were always looking at, which was something else.

00:10:29.910 --> 00:10:37.930
So PCAP is the new one that we will see forever going forward until they come up with a new

00:10:37.930 --> 00:10:38.190
one.

00:10:38.790 --> 00:10:40.230
This is what we're using.

00:10:40.810 --> 00:10:42.210
They're using PCAP-NG.

00:10:42.210 --> 00:10:45.010
You may find PCAPs or PCAP-NG, right?

00:10:45.310 --> 00:10:53.890
dot pcap ng's capture file format overcome limitations of the original lib pcat so that's

00:10:53.890 --> 00:11:04.490
the brief history of it and then of course we have wireshark alternatives right so look at all

00:11:04.490 --> 00:11:10.270
these different tools that you probably heard of that you can use tcp dump in the command line

00:11:10.270 --> 00:11:19.710
eat the rape header cap is even better cap all right 15 more these are all packet capture type

00:11:19.710 --> 00:11:25.310
like tools you can do it in the gooey you can do it in the command line there's also a t shark i

00:11:25.310 --> 00:11:32.830
don't know if it's written here but i saw it somewhere um these are two cloud shark these

00:11:32.830 --> 00:11:39.870
are tools that you can easily learn how to do on your own especially since you do well

00:11:39.870 --> 00:11:47.390
doing stuff on your own how do you do that okay we're gonna discuss that in a minute but

00:11:48.190 --> 00:11:58.590
i downloaded this i'm in my terminal do you know how to open this dot p cap ng in the terminal

00:12:00.590 --> 00:12:09.120
okay so i'm gonna type the word wireshark start one dot p cap ng you got it

00:12:09.120 --> 00:12:20.850
press enter it opens up that particular packet file now opens up in wireshark now i'm gonna go

00:12:20.850 --> 00:12:30.610
back over here to this can you find the flag right the flag represents some sort of investigation

00:12:30.610 --> 00:12:37.050
as a supervisor i will come to you and i will say hey can you tell me everything that you can

00:12:37.050 --> 00:12:49.690
about this particular PCAP and G5 and I need you to say, okay, and simply open it up and go into it.

00:12:50.010 --> 00:12:58.330
What do we see? Number, time, source, destination, you know, source IP, destination IP,

00:12:58.890 --> 00:13:06.270
the different protocols, the length, the info, and you have all this information up here

00:13:06.270 --> 00:13:14.510
and how do you learn it? How you learn it is you go to Wireshark.org, I think it is.

00:13:20.090 --> 00:13:25.950
Okay. Official certification from Wireshark is available. Did you know that there's a

00:13:25.950 --> 00:13:34.750
Wireshark certification course? No idea. Okay. This is good. And here it is right here.

00:13:35.690 --> 00:13:42.240
I actually clicked on to open it. Let's make this a little bit smaller. This is crazy looking.

00:13:43.200 --> 00:13:51.920
oh maybe that was supposed to be that big do you do this certification i i how do you say i do a

00:13:51.920 --> 00:14:00.000
little bit of everything i i think i have let me see let me look because i don't know i don't remember

00:14:01.760 --> 00:14:29.390
oh i know where to go the desktop i have these certifications uh things like 33 of them

00:14:29.390 --> 00:14:32.710
so are they going to get you a good job

00:14:32.710 --> 00:14:33.730
yes

00:14:33.730 --> 00:14:36.370
as a matter of fact those people offered me the job yesterday

00:14:36.370 --> 00:14:37.530
good

00:14:37.530 --> 00:14:39.270
the

00:14:39.270 --> 00:14:42.710
the power of certification

00:14:42.710 --> 00:14:44.670
coupled with experience

00:14:44.670 --> 00:14:46.450
if I do a search

00:14:46.450 --> 00:14:52.590
this is one of my top search

00:14:52.590 --> 00:14:56.690
in this area

00:14:56.690 --> 00:14:58.790
it does exceed

00:14:58.790 --> 00:15:00.490
this and I just

00:15:00.490 --> 00:15:02.710
happen to know that for a fact

00:15:02.710 --> 00:15:07.360
because I was a CISO myself.

00:15:08.180 --> 00:15:12.460
I mean, this is heavy compensation for anybody, almost anywhere.

00:15:15.690 --> 00:15:29.060
The thing is, though, I manage a company, and I teach.

00:15:29.260 --> 00:15:31.540
There's my little head right there when I had a beard.

00:15:31.540 --> 00:15:37.840
I teach people applied certification and work preparation.

00:15:40.270 --> 00:15:44.730
I teach all of this different stuff.

00:15:44.730 --> 00:15:52.810
i just do stuff um i am in this program working with this guy i'm actually his subcontractor

00:15:53.530 --> 00:15:57.210
um all of these people got jobs after working with me for three months

00:15:59.450 --> 00:16:08.010
and you can see my um my former life i worked in law enforcement so who's in your classroom

00:16:08.010 --> 00:16:14.170
studying is that military people who's in your classroom all of the above civilians

00:16:14.170 --> 00:16:19.610
law enforcement military intelligence i am so how does that work you go through a military or

00:16:19.610 --> 00:16:26.570
is it a boot camp or is it through your company it's through my company okay i understand yeah i

00:16:26.570 --> 00:16:32.090
this i i have i run i manage an internship so people can get actual work experience

00:16:33.530 --> 00:16:37.370
i have jobs for them to do do this work the crazy thing is though is the

00:16:38.650 --> 00:16:43.530
if they go through the we owe a program then they get paid while working for me otherwise they pay

00:16:43.530 --> 00:16:58.360
me to get this experience um but i um we do a little bit of everything that's going to help

00:16:58.360 --> 00:17:08.760
them gain employment um wire shark is a certification that let me see um let me see what it says wire

00:17:08.760 --> 00:17:23.400
shark average salary how about this wire shark certification average salary about 84 000 up to

00:17:23.400 --> 00:17:35.140
129. so let's do an example together can you find this flag in wire shark first of all we need to

00:17:35.140 --> 00:17:46.580
know what wire shark does what does wire shark do powerful open source network protocol analyzer

00:17:47.380 --> 00:17:55.460
allows you to capture and inspect network traffic okay this is important capture and inspect

00:17:56.420 --> 00:18:02.500
use to troubleshoot network issues analyze behavior network behavior detect security

00:18:02.500 --> 00:18:09.620
vulnerabilities we want to do all that stuff to detail microscopic view of network communication

00:18:09.620 --> 00:18:17.380
allowing users to see the data packets uh flowing between the devices and they have all these

00:18:17.380 --> 00:18:32.420
different examples there are free wireshark tutorials online awesome videos right um this

00:18:32.420 --> 00:18:43.030
guys been doing it forever there's a whole full course here it will help you i promise you when

00:18:43.030 --> 00:18:58.020
i learned wire shark it was called ethereal wire sharks previous name ethereal i learned ethereal

00:18:58.020 --> 00:19:09.290
or wire shark from nsa when i did technical surveillance countermeasures the hardest program

00:19:09.290 --> 00:19:16.970
i have done to date even tougher than my doctorate degree right what did it do physical inspections

00:19:16.970 --> 00:19:22.490
electronic sweeps other techniques to protect sensitive information and secure spaces from

00:19:22.490 --> 00:19:28.810
unauthorized surveillance right i'm looking for hidden cameras listening devices eavesdropping

00:19:28.810 --> 00:19:34.410
equipment i'm literally looking for terrorists um bad guys i was kind of like threat hunting

00:19:36.170 --> 00:19:46.490
okay in that i um wire shark was just one of many tools and big boxes i used to carry

00:19:48.010 --> 00:19:59.820
so let's do one we're in this terminal this is running i've opened up this pcat okay so i'm

00:19:59.820 --> 00:20:08.090
gonna do this I'm gonna do I'm gonna do a print screen at least I clicked on

00:20:08.090 --> 00:20:13.550
print screen print screen all right we got it and I'm gonna highlight all of

00:20:13.550 --> 00:20:22.220
this up to there that's all I need I want you to start doing this for the

00:20:22.220 --> 00:20:29.960
rest of your life yeah okay I'm gonna come over here to chat and say um teach

00:20:29.960 --> 00:20:39.880
me how to explain this all right I'm pasting and nothing's happening let's do

00:20:39.880 --> 00:20:46.760
that again well it takes a long it didn't paste okay let's do a print

00:20:46.760 --> 00:21:02.740
screen again print screen okay let's get it again come back over here there we

00:21:02.740 --> 00:21:12.300
go it did it finally right there is no way around this no one automatically knows all this stuff

00:21:12.300 --> 00:21:18.540
the hackers in the real world this is exactly how they taught themselves it's just that they did it

00:21:18.540 --> 00:21:25.560
with Google and maybe a book so it's looking at a wire sharp PCAP file okay high-level summary

00:21:25.560 --> 00:21:34.060
right we see a whole bunch of HTTP requests between two internal IP addresses it's giving

00:21:34.060 --> 00:21:43.760
you some examples here over tcp guaranteed handshake right detail breakdown we got the

00:21:43.760 --> 00:21:52.480
packet list pane which is the top section each row represents a network packet now if you know

00:21:52.480 --> 00:21:57.460
this stuff tell me so i don't do it talk to you about it i just want to make sure you understand

00:21:57.460 --> 00:22:09.130
right there keep going please okay so we got the number column right which is the number time

00:22:09.130 --> 00:22:19.650
the epoch time e-p-o-c-h time that's why you see this 0.0 0.053 0.0315 you can look that up

00:22:19.650 --> 00:22:27.810
the source time is micromanaging so we can find out exactly when uh uh an attack happened a packet

00:22:27.810 --> 00:22:34.930
came through the network a packet left the network right we have the source ip address

00:22:34.930 --> 00:22:46.210
it's highlighted 192.168.38.104 the destination ip 103. on tcp we have the length of the file 391

00:22:46.930 --> 00:22:54.290
we have information this information could be anything it says tcp pdu reassembled in two

00:22:54.290 --> 00:23:03.350
We have the push, acknowledgement, the sequence one, acknowledgement one, windows, the length

00:23:03.350 --> 00:23:06.350
is 337, the size of the packet.

00:23:07.570 --> 00:23:13.450
And then with all of these different icons, file, edit, view, gold caption, analyze, statistics,

00:23:14.010 --> 00:23:17.010
this will take you months to learn.

00:23:17.210 --> 00:23:18.830
You will not learn it today.

00:23:19.470 --> 00:23:25.310
but if you have an overview of what they are you will at least understand how to get the

00:23:25.310 --> 00:23:32.270
information this total chat gpt thing is a game changer before this i had to google everything

00:23:32.270 --> 00:23:40.000
and try to show people and tell them what i knew off of my memory so we got the number the packet

00:23:40.000 --> 00:23:52.640
number in order the time the ip addresses the protocol tcp or http so it's in the browser

00:23:52.640 --> 00:24:00.880
right size of the packet we have the tcp flags really good to learn that just google explain

00:24:00.880 --> 00:24:08.000
the tcp flags to me the um http methods post so that means someone posted something somewhere

00:24:08.960 --> 00:24:13.440
sequence and acknowledgement numbers information like this right

00:24:14.480 --> 00:24:20.000
htp code 200 means that it's okay means that you know it was successful you can see it

00:24:20.640 --> 00:24:24.880
we have the middle pane which is the packet details pane let's go back there

00:24:26.800 --> 00:24:32.080
over here and over here this is usually the middle pane let's go back

00:24:33.040 --> 00:24:45.040
close this shows the decoded layers for the selected packet now wireshark does not decode

00:24:45.040 --> 00:24:50.000
unless you uh if they have one well i'll put it like this it doesn't show

00:24:52.000 --> 00:24:56.640
https that particular protocol hypertext transfer protocol secure

00:24:57.920 --> 00:25:03.760
it will come up as what we call i call it gobbledygook you know it'll be uh encrypted

00:25:03.760 --> 00:25:05.760
information. Encrypted information cannot be

00:25:05.760 --> 00:25:07.780
captured. Well, it can be captured, but it can't

00:25:07.780 --> 00:25:09.440
be viewed. Does that make sense?

00:25:10.260 --> 00:25:11.700
Yes. Not even

00:25:11.700 --> 00:25:13.460
by you? No.

00:25:13.480 --> 00:25:15.720
Can you view it? No, no. Nobody can view it.

00:25:15.860 --> 00:25:17.780
No, I don't want to say that. It depends

00:25:17.780 --> 00:25:18.900
on the type of encryption.

00:25:19.940 --> 00:25:21.700
So, I was listening to a hacking

00:25:21.700 --> 00:25:23.640
video last night, and there was

00:25:23.640 --> 00:25:25.540
it was one of the common

00:25:25.540 --> 00:25:27.620
guys, I don't know, it doesn't matter, but he

00:25:27.620 --> 00:25:29.760
was talking about hacking VPNs

00:25:29.760 --> 00:25:32.020
and how the NSA has hacked VPNs

00:25:32.020 --> 00:25:39.060
for years and how it's just a bunch of garbage and it's like why are we so set up to fail

00:25:39.700 --> 00:25:46.580
so nsa because they are monitoring other countries they make and build a lot of this stuff they

00:25:46.580 --> 00:25:52.020
reverse engineer even before it goes out now that's a legend that's what i understand and i believe it

00:25:52.580 --> 00:25:56.900
i am also a graduate of nsa all they did was teach me bad guy stuff

00:25:56.900 --> 00:26:07.540
nsa created smb or eternal blue which is we can easily get into someone's network

00:26:07.540 --> 00:26:15.640
we have hooks the bad guys allegedly have hooks in our network they socially engineer us they get

00:26:15.640 --> 00:26:20.120
inside of our networks that's how we keep our country safe by monitoring even our friends of

00:26:20.120 --> 00:26:25.000
course they will not exactly admit to that but then again that's kind of what is like out there that's

00:26:25.000 --> 00:26:31.360
what we do and yes i would not doubt that you gotta you can't put that stuff online though

00:26:31.360 --> 00:26:38.680
so are you a big proponent of palantir um what's palantir i don't even know what that is

00:26:38.680 --> 00:26:47.680
it's the pal it's a silicon valley palo alto um company that the the government just gave

00:26:47.680 --> 00:26:55.740
a big contract too for surveillance purposes so so here's the thing the government is always going

00:26:55.740 --> 00:27:02.940
to surveil its neighbors its friends its enemies it has nothing to do with what whether we like it

00:27:02.940 --> 00:27:10.080
or not it's just a mandate pardon me it is it's what they do each government agency will say no

00:27:10.080 --> 00:27:14.960
we're not monitoring you they are monitoring us left and right they are going after hard and

00:27:14.960 --> 00:27:18.580
soft targets. They will use any system that they can.

00:27:19.500 --> 00:27:23.200
OK, so you have a decoded

00:27:23.200 --> 00:27:26.540
layers. Ethernet to layer to

00:27:26.540 --> 00:27:30.420
the MAC addresses layer three for the IPV

00:27:30.420 --> 00:27:34.440
for layer four. This is pretty much a breakdown of the

00:27:34.440 --> 00:27:39.860
OSI model at each layer. And this is data.

00:27:40.480 --> 00:27:43.780
So if you had to, if you I'm going to tell you

00:27:43.780 --> 00:27:49.220
story but if you were playing sock analyst and you're using wireshark you're trying to drill

00:27:49.220 --> 00:27:56.820
down to find out what happened and you may even want to corroborate it with another tool then

00:27:56.820 --> 00:28:05.620
packet three the packet bytes pane right raw packet data in hex and ascii format so you can

00:28:05.620 --> 00:28:13.780
clearly read the post um the the particular directories within the headers and content

00:28:15.920 --> 00:28:23.920
all right so like we have powershell remoting or win rm session this is good it's breaking this

00:28:23.920 --> 00:28:33.360
down for you it's telling you what it possibly is why port 5985 is default to win rm or over

00:28:33.360 --> 00:28:39.120
um http encrypted while 5986 is https so you won't be able to read that

00:28:41.040 --> 00:28:48.880
why is it important adversaries may abuse win room for lateral movement moving once they get inside

00:28:48.880 --> 00:28:53.680
their one organization's computer their lateral movement to another computer maybe even to the

00:28:53.680 --> 00:28:58.320
server um hackers always want to get to those servers they can take over the world

00:28:58.320 --> 00:29:07.840
Okay, monitoring posts to the WSMAN subscriptions can help detect the use of remote PowerShell

00:29:07.840 --> 00:29:13.700
or C2 frameworks, command and control frameworks like Empire, PowerShell Empire.

00:29:15.040 --> 00:29:20.780
Talking points, let's follow the TCP stream to reassemble this conversation.

00:29:21.120 --> 00:29:24.300
We want to know what was being said, right?

00:29:24.340 --> 00:29:26.020
This is what you would do in NCF.

00:29:26.020 --> 00:29:33.660
you're doing you can't get more real than this except for to do it for real this is a real live

00:29:33.660 --> 00:29:39.520
how do i what am i doing and this is a real live write-up right here so you're going to right

00:29:39.520 --> 00:29:47.320
click a packet follow tcp stream we can identify the service using the destination port and inspect

00:29:47.320 --> 00:29:56.600
the payload uh for science for the wind room rm usage look for unusual post requests especially

00:29:56.600 --> 00:30:05.160
with multi-part encrypted content types this may indicate obfuscated or tunneled data okay

00:30:06.280 --> 00:30:11.560
that was a lot right yeah probably over your head right so this is what we're going to do let's just

00:30:11.560 --> 00:30:23.780
do it okay no i was familiar with most most of that okay from ncl from the lab fantastic and there

00:30:23.780 --> 00:30:31.940
are a lot of tcp pdu reassembled this is all one conversation right and it only takes seconds to

00:30:31.940 --> 00:30:40.340
capture data can you tell it's all one conversation because it just is it captured one file and we

00:30:40.340 --> 00:30:48.340
have that file now that one conversation could also be two thousand four thousand it can be huge

00:30:49.300 --> 00:30:56.580
and then you'll have one file i understand yes right and we see 103 104 constantly they are just

00:30:58.260 --> 00:31:03.700
here you go here you go here you go here you go going through the whole tcp process the http

00:31:03.700 --> 00:31:07.860
looking on the url so what we're going to do now is i'm going to right click here

00:31:07.860 --> 00:31:16.920
and like it said it wants us to follow the TCP stream we want to follow the

00:31:16.920 --> 00:31:23.340
conversation this is the entire conversation 13 kilobytes it's showing

00:31:23.340 --> 00:31:27.180
an ASCII format although there's plenty other formats here if you want to look

00:31:27.180 --> 00:31:34.140
at that right you can break this down in the bytes but we want to examine the

00:31:34.140 --> 00:31:39.340
entire conversation there's no delta times we'll have to worry about that and there are a boatload

00:31:39.340 --> 00:31:49.360
of different streams what do we see we see what it is post w ws man subscriptions and we have this

00:31:49.360 --> 00:32:00.500
long hex number or i don't know what that is and http 1.1 connection keep alive right it's telling

00:32:00.500 --> 00:32:08.660
it wants to keep it alive multi-part encrypted protocol application http http cover row session

00:32:08.660 --> 00:32:17.300
is encrypted boundary encrypted boundary this is an example of encryption that's what it looks like

00:32:17.300 --> 00:32:28.320
we can't understand gobbledygook how do you decode it can't wire shark doesn't um if we

00:32:28.320 --> 00:32:34.480
don't have the tools to do it wireshark is open source nsa probably has the tools to do it and

00:32:34.480 --> 00:32:43.040
even still um we don't know how it's encoded we don't we that's that's what cryptographers

00:32:43.760 --> 00:32:49.920
cryptographic people they would have to do this it's it's a lot you can't do it don't even think

00:32:49.920 --> 00:32:56.560
about doing not this got it this this will make your head hurt you need a really not like you

00:32:56.560 --> 00:33:02.400
could put it in cyber chef and figure out what cypher it is it's impossible right yeah this one

00:33:02.400 --> 00:33:12.320
is you're not gonna do it okay so now it's a good question but now it wants me to follow the stream

00:33:12.320 --> 00:33:19.120
of all the conversations we're looking for anomalies we can see what we see in english

00:33:20.000 --> 00:33:22.080
But I'm going to go to the next stream.

00:33:23.300 --> 00:33:24.260
Stream one.

00:33:24.900 --> 00:33:25.820
I see what I see.

00:33:25.860 --> 00:33:27.340
It looks a lot the same.

00:33:27.740 --> 00:33:29.040
And it's a lot of data.

00:33:29.720 --> 00:33:31.020
But what are we looking for?

00:33:31.340 --> 00:33:32.380
Here's the hint.

00:33:34.620 --> 00:33:41.300
You're looking for Pico CTF curly bracket flag in curly bracket.

00:33:42.120 --> 00:33:44.920
That's what the question is asking you to do.

00:33:45.500 --> 00:33:46.500
You understand?

00:33:47.280 --> 00:33:47.780
Yes.

00:33:48.180 --> 00:33:48.440
Okay.

00:33:48.800 --> 00:33:50.400
So we're going to come back.

00:33:50.500 --> 00:33:55.420
we're not trying to make up stuff and make this harder go off of the literal

00:33:55.420 --> 00:34:02.500
words that they say so I'm scrolling down and I'm looking I may even want to

00:34:02.500 --> 00:34:11.080
search curly bracket curly bracket and just hit enter and it shows me two

00:34:11.080 --> 00:34:17.260
curly brackets right here well I don't see a flag inside that I can search for

00:34:17.260 --> 00:34:30.100
pico ctf uh nothing is showing up well because i'm not going to look through this

00:34:30.100 --> 00:34:35.120
with the naked eye like it's crazy you see what i'm saying

00:34:35.120 --> 00:34:42.660
all right who can look through all this and guess what we'll have to look through all this

00:34:42.660 --> 00:34:50.320
line by line when you are not looking for a flag when you don't know what you're looking for

00:34:50.320 --> 00:34:58.900
you understand yes which was a stressful thing to a former tscm operator

00:34:58.900 --> 00:35:06.240
why because i didn't know what i was looking for i wasn't looking for a flag i just know that

00:35:06.240 --> 00:35:10.480
somebody did something and i see a port that shouldn't be open and i'm like what are they

00:35:10.480 --> 00:35:17.320
doing let me see then i would capture the file and i had direct communication communication with nsa

00:35:17.320 --> 00:35:21.400
and I'd send a file to them encrypted, and then they would go through it themselves.

00:35:21.760 --> 00:35:26.560
I tried to find it locally, and they did a deeper, deeper inspection.

00:35:27.340 --> 00:35:31.920
So your job was only to capture the files and send them off for cryptography,

00:35:32.300 --> 00:35:35.560
for the cryptographers to decode.

00:35:35.760 --> 00:35:39.000
My job was to capture the file, try to decode it on site.

00:35:39.460 --> 00:35:43.600
But if it was going to take me a long time to do it,

00:35:44.160 --> 00:35:47.020
whether I found it or not, I sent it to NSA.

00:35:47.320 --> 00:35:57.720
interesting that's how we keep our country safe i was like uh i was a major input to what was

00:35:57.720 --> 00:36:03.500
going on for the president of the united states so i'm looking through here i don't see anything

00:36:03.500 --> 00:36:08.500
that's sticking out but i know i'm looking for a flag i did a search i didn't find anything

00:36:08.500 --> 00:36:17.340
so i'm going to go up another stream oh wow i don't see anything here let me go up another stream

00:36:17.340 --> 00:36:25.620
okay i have data i'm looking i'm looking this says collide that means nothing

00:36:25.620 --> 00:36:36.570
rhb i don't see anything you see anything standing out to you or you see a bunch of

00:36:36.570 --> 00:36:45.760
letters and some dots okay oh oh this could be something no it's not you have to get accustomed

00:36:45.760 --> 00:36:54.020
to it okay let's go to the next stream oh well that doesn't look like anything it's nothing to

00:36:54.020 --> 00:37:10.220
decode okay i got some english words here get this http here's the host what is 18.222.37.134

00:37:10.220 --> 00:37:20.420
oh that's outside the organization that is a clue somebody outside this organization sent this from

00:37:20.420 --> 00:37:28.580
this ip address let me keep that and they want the connection to stay alive right that's no bueno

00:37:28.580 --> 00:37:38.640
the maximum age says zero cash control upgrade insecure one request it was done from mozilla

00:37:38.640 --> 00:37:50.380
firefox i got the system apple web kit okay like gecko chrome safari okay except text or html

00:37:51.340 --> 00:38:00.540
applications it has all listed here images except encoding gzip deflate that's not good

00:38:00.540 --> 00:38:07.980
somebody is probably sending some sort of gun zip file a gzip file so they can inflate uh send

00:38:07.980 --> 00:38:16.220
large programs and a small little thing over the line it's in english okay 200 okay so that we

00:38:16.220 --> 00:38:25.270
that is definitely a connection we got the date that this took place this is not a normal time

00:38:25.270 --> 00:38:32.070
people are not at work right gmt time still have to look that up but still this doesn't it was done

00:38:32.070 --> 00:38:39.990
in the morning in the nighttime all right apache ubuntu right but this is window okay from this ip

00:38:39.990 --> 00:38:47.350
clues we got the date here that was last modified just three days prior there's an e-tag

00:38:47.750 --> 00:38:53.390
Okay, we'll document that, accept the ranges, 47, the bytes.

00:38:54.230 --> 00:38:54.970
Keep alive.

00:38:55.290 --> 00:38:56.310
Time out in five.

00:38:56.450 --> 00:38:57.250
Max is 100.

00:38:58.110 --> 00:38:58.930
Keep alive.

00:38:59.350 --> 00:39:01.070
This is no bueno information.

00:39:01.830 --> 00:39:04.330
This is stuff that makes me say, hey, what does this mean?

00:39:04.610 --> 00:39:05.770
What is this?

00:39:08.870 --> 00:39:09.810
You know what I see?

00:39:09.810 --> 00:39:15.810
I see this, and I see my two curly brackets that look like that Pico CTF.

00:39:16.270 --> 00:39:17.430
This could be the flag.

00:39:18.670 --> 00:39:19.850
Do you see that?

00:39:20.090 --> 00:39:24.490
I think one, two, three. Copy.

00:39:24.490 --> 00:39:29.900
Let me go to say here.

00:39:29.900 --> 00:39:32.380
Let's crack open.

00:39:32.380 --> 00:39:36.070
You said cyber chef.

00:39:36.070 --> 00:39:39.510
Yes. All right.

00:39:39.510 --> 00:39:42.390
Now, the question is,

00:39:42.390 --> 00:39:46.310
what does that look like to you?

00:39:46.310 --> 00:39:55.700
So we can go to our favorite search engines, right?

00:39:55.700 --> 00:40:13.070
what does this look like to you and let's see what it says oh rot 13 encoded do you know what

00:40:13.070 --> 00:40:23.990
rot 13 is oh yeah it's a type of cipher all right and then look at this the flag is yeah pick ctf

00:40:23.990 --> 00:40:34.290
peekaboo peekaboo i see you deadbeat how did you know how to pick rot 13 i didn't look at what

00:40:34.290 --> 00:40:45.910
outside that's what okay i think right but hold on let's look at this okay give it a try

00:40:48.150 --> 00:40:58.550
okay i don't want that one i want to i want to look up what is rot 13. simple letter cipher we

00:40:58.550 --> 00:41:12.310
saw that earlier okay here's this look at this let's go to this image okay rot 13 means rotation

00:41:12.310 --> 00:41:22.030
13th letter yes 13th letter in the alphabet so if i wanted to encode a message such as hello

00:41:22.030 --> 00:41:31.810
i'll just type hey we're spies hey donna um when i when i see you 30 days from now i'm gonna send

00:41:31.810 --> 00:41:37.750
you a message on a piece of paper don't say anything to me keep walking just make sure

00:41:37.750 --> 00:41:49.030
rod 13 i walk away 30 days later you get your rib and you're like this what wait a minute he told

00:41:49.030 --> 00:41:57.670
me rod 13 the letter u is really an h the letter r is really an e the letter y is really an l the

00:41:57.670 --> 00:41:58.850
The letter B is really an O.

00:42:00.290 --> 00:42:01.710
And vice versa.

00:42:02.930 --> 00:42:03.150
Cool.

00:42:04.110 --> 00:42:04.390
Okay?

00:42:04.790 --> 00:42:06.050
This is spy stuff.

00:42:07.430 --> 00:42:11.290
That's all cryptography and ciphering is.

00:42:11.950 --> 00:42:15.810
It's communicating in plain sight, but so other people don't understand it.

00:42:16.210 --> 00:42:19.410
It's like if you speak Spanish, hola.

00:42:20.030 --> 00:42:20.630
What?

00:42:21.110 --> 00:42:22.230
I'm not an hola.

00:42:22.630 --> 00:42:24.390
All I said was hello or hi.

00:42:24.390 --> 00:42:33.590
no need to get offensive about it you understand if i spoke french je m'appelle wesley phillips

00:42:33.590 --> 00:42:38.390
context clues you may be able to gather what i said what i said was my name is wesley phillips

00:42:38.390 --> 00:42:50.310
from here now i will type if i know what it is because i know how to research and use chat gpt

00:42:50.310 --> 00:43:01.910
rod 13 there you go pico ctf peekaboo i see you dead beef copy come back to pico

00:43:01.910 --> 00:43:08.710
paste that joker submit the flag hooray you solved the challenge again correctly

00:43:08.710 --> 00:43:18.790
awesome from there you're still not done you need to do more research

00:43:18.790 --> 00:43:30.590
rod 13 okay here's a rod 13.com i'm gonna take that same thing okay i did the reverse of it but

00:43:30.590 --> 00:43:47.010
let's get this roll x let's do this again one two three throw c delete okay paste there we go

00:43:47.010 --> 00:44:01.740
drop 13 rotation 13 look at how many rotations there really are you see that yeah right so if

00:44:01.740 --> 00:44:08.020
i'd have chosen selected the wrong rotation i would i would not have found the answer

00:44:08.020 --> 00:44:12.900
you are only as good as your knowledge and the tools you know how to use

00:44:12.900 --> 00:44:25.080
i'm not trying to hurt myself i may even do this and just search and when i see

00:44:25.080 --> 00:44:35.880
rod 13 come up some write-ups too right i go here cipher text is what this is plain text is what

00:44:35.880 --> 00:44:45.000
we're looking for rod 13 decode oh well here's rod 5 here's rod 18 here's rod 47 what kind of

00:44:45.000 --> 00:44:57.840
letter system is that bad bad guys will do anything they can to hide their bad work to hide data from

00:44:57.840 --> 00:45:06.640
us we also use encryption to hide data from bad guys or unauthorized people from accessing it

00:45:07.600 --> 00:45:12.880
when you want to send your social security number to an employer you want to encrypt the email

00:45:12.880 --> 00:45:23.140
right it's a protection guess what the government i actually know these people

00:45:23.140 --> 00:45:32.440
i know of a guy he works for a certain three-letter agency he built a tool that he can put inside of

00:45:32.440 --> 00:45:37.840
his backpack he can walk in any country in the world including this one but he won't do it in

00:45:37.840 --> 00:45:45.940
this one and he has wire shark on his um on that in that backpack download it for free you know

00:45:45.940 --> 00:45:54.620
wiretruck is free anybody can download it that means that when he walks a one block radius he

00:45:54.620 --> 00:45:59.820
could pick up capture files within a one mile radius and then he can come back home and they

00:45:59.820 --> 00:46:07.900
can analyze all those files and they can learn all kinds of secrets did he uh design his own device

00:46:07.900 --> 00:46:13.600
he did is that what makes him special he worked he's sanctioned and that's what he's like a

00:46:13.600 --> 00:46:24.100
cryptographer. And that's what he does. Now, I've done this with actual students. I've had them

00:46:24.100 --> 00:46:30.480
bring in their laptop or their computer, download Wireshark for free. Wireshark is a free download.

00:46:32.680 --> 00:46:38.140
Kali Linux has Wireshark for free. As you see, it's free. It's already there.

00:46:39.480 --> 00:46:44.540
Download now. You download on any operating system. There's a whole learn section.

00:46:44.880 --> 00:46:52.720
the user's guide certifications etc etc you need to read it you need to do it oh i will

00:46:52.720 --> 00:46:58.320
you've got to that's the only way you're going to two more weeks off so i will i will master that

00:46:58.320 --> 00:47:08.000
in two weeks master fantastic that's what i like to hear and then from there um i mean some of

00:47:08.000 --> 00:47:17.520
these um uh let's come back over let's do it like this wire shark tutorial right there are tons of

00:47:17.520 --> 00:47:25.520
them yeah the videos speak for themselves all this right here and then you just need to take

00:47:25.520 --> 00:47:33.680
really good notes and there's nothing like finding a wire shark tutorial with a video

00:47:33.680 --> 00:47:43.940
or even look at this right here uh give me five wireshark

00:47:43.940 --> 00:47:52.740
examples i can do on my cali linux machine

00:47:52.740 --> 00:48:07.650
while that's doing that i'm going to show you this wireshark pcap file let me see yeah files

00:48:08.030 --> 00:48:14.430
Let's do a free Wireshark PCAP files, right?

00:48:14.430 --> 00:48:16.250
Here's some sample captures right here.

00:48:17.990 --> 00:48:20.470
Public PCAP files for download.

00:48:21.510 --> 00:48:24.810
Index, Wireshark capture files.

00:48:24.810 --> 00:48:28.200
Why am I showing you that?

00:48:28.200 --> 00:48:29.620
Roles to look at.

00:48:29.620 --> 00:48:32.200
So you can do that on your machine.

00:48:32.200 --> 00:48:33.980
There's nothing fake you're doing here.

00:48:35.080 --> 00:48:35.920
You understand it?

00:48:35.920 --> 00:48:37.100
Look at this right here.

00:48:37.100 --> 00:48:39.040
See unencrypted HTTP requests.

00:48:39.040 --> 00:48:40.880
Great for understanding web traffic.

00:48:40.880 --> 00:48:43.480
Open Wireshark, select your main interface.

00:48:44.920 --> 00:48:46.720
In a terminal, run this.

00:48:48.500 --> 00:48:50.740
Wireshark, filter by Nginx or HTTP.

00:48:52.660 --> 00:48:53.720
Click and inspect.

00:48:55.160 --> 00:48:57.420
What to look for, the GET, the 200 OK.

00:48:58.700 --> 00:49:02.260
Inspect DNS query, et cetera, et cetera.

00:49:03.620 --> 00:49:05.960
You can solve all of your problems.

00:49:06.160 --> 00:49:10.160
You don't need anyone if you know how to do the research and what to research.

00:49:10.880 --> 00:49:16.580
Let this software and Google research do everything that you need it to do.

00:49:18.920 --> 00:49:20.040
You will learn.

00:49:20.940 --> 00:49:23.300
If you have a talk, what questions do you have right now?

00:49:24.520 --> 00:49:27.440
How do I configure my Raspberry Pi?

00:49:27.680 --> 00:49:40.920
Look, how do I configure my Raspberry Pi for Air Crack NG?

00:49:41.620 --> 00:49:42.640
Look at this right here.

00:49:43.580 --> 00:49:48.460
i'm doing this for my fellows right on my class

00:49:50.220 --> 00:49:54.860
because chat she's not going to teach you how to pen test or crack someone's uh wi-fi

00:49:55.740 --> 00:49:59.900
in the in the real world per se you know what i'm saying great project

00:50:01.260 --> 00:50:07.660
powerful portable tool right wi-fi auditing and ethical uh cyber security with eight

00:50:07.660 --> 00:50:18.160
talks have a fellow right step-by-step guide here you go there you go and there you go some more

00:50:18.160 --> 00:50:27.920
hey we done this before iw config iw right look at eight steps

00:50:27.920 --> 00:50:37.720
you you mentioned something the other day to me when we first met and i actually did it

00:50:37.720 --> 00:50:49.010
what I'm gonna show you I'll put it here so I just remember I have it here where

00:50:49.010 --> 00:51:06.100
is it here it's in my pen test section pen test okay see that right there I

00:51:06.100 --> 00:51:24.080
created a mobile hacking lab pen testing that yes my question is then I mean I

00:51:24.080 --> 00:51:31.200
understand creating these labs and doing it yourself but like for instance if i create a vm

00:51:31.200 --> 00:51:41.200
and try to simulate a recent hack like the linux cheroot hack i mean how like um

00:51:43.520 --> 00:51:54.000
like uh how does people how do people like you know that i'm a student versus somebody who is

00:51:54.080 --> 00:52:00.400
actually trying to do a hack like if somebody takes my laptop and i have all these vms with

00:52:00.400 --> 00:52:07.520
all this simulated stuff that i'm trying to do where is the i mean how come i'm not considered

00:52:07.520 --> 00:52:14.800
a criminal i mean i haven't done anything with it but i mean is my computer up for suspicion is

00:52:14.800 --> 00:52:22.240
what i'm trying to say when i'm trying to learn this stuff okay let's answer let me answer one

00:52:22.240 --> 00:52:26.780
question at a time. Give me the first question, because that was a lot of questions, and I don't

00:52:26.780 --> 00:52:34.320
know which one to answer first. When I build VMs and simulate hacks, do I have any legal

00:52:34.320 --> 00:52:41.260
ramifications with my computer as a student? No. You're good. I mean, yes and no. So here's

00:52:41.260 --> 00:52:48.000
the thing. You see my machine? This is my VM. I literally had about 75 different vulnerable

00:52:48.000 --> 00:52:55.440
machines in here but right now i have only like 12 give or take i have my wazoo i have all this

00:52:55.440 --> 00:53:01.600
stuff now no one gets to see this stuff except for the my students and my my my fellows with my

00:53:01.600 --> 00:53:09.200
company because i um i i do build this is a whole red team blue team lab right here

00:53:09.200 --> 00:53:14.300
where we do build attacks and then we build defenses to see what they look like

00:53:14.300 --> 00:53:23.540
this is stuff that I do um as a student in this dr. West is that you know the way

00:53:23.540 --> 00:53:29.760
our institution sets us up you know in a sense is that you know because I'm

00:53:29.760 --> 00:53:33.640
going to you for different information it's like I'm seeking out the last

00:53:33.640 --> 00:53:39.780
chapter of the Bible you know what I'm saying it's like I'm just trying to learn

00:53:39.780 --> 00:53:46.900
which they've already introduced me to and they're asking me to use in cyber lab but nobody wants the

00:53:46.900 --> 00:53:53.300
responsibility of teaching it and so nobody's giving us the information that we need to

00:53:54.900 --> 00:54:04.300
they're going to give you the bare minimum to get by um but um it's like for example i mean i mean

00:54:04.300 --> 00:54:11.180
martial arts instructor for example right i want to get if someone comes to me and say hey dr phillips

00:54:11.180 --> 00:54:15.500
i want to learn martial arts from you i've seen you in action i want to see what you can teach me

00:54:16.220 --> 00:54:20.060
and i'm like okay well let me learn about you why do you want to learn martial arts

00:54:20.780 --> 00:54:25.820
if they say something like i want to learn how to beat someone's behind i want to learn how to kick

00:54:25.820 --> 00:54:33.100
butt i want to learn how to beat up people well guess what i'm going to say i am not interested

00:54:33.100 --> 00:54:41.100
in teaching you good luck on your quest can you tell me why i said that because you want somebody

00:54:41.100 --> 00:54:47.420
to say i am here for self-defense i'm in fear for my life and then i want to learn how to protect

00:54:47.420 --> 00:54:56.300
myself so that's why we had that orange jumpsuit conversation we're talking about pen testing aka

00:54:56.300 --> 00:55:04.460
hacking right i'm showing you real bad guy techniques all you have to do use your vpn

00:55:04.460 --> 00:55:15.760
socially engineer or brute force your way into a network once you're on their network you can do

00:55:15.760 --> 00:55:23.500
anything you want to because Kali Linux is free to the world not just you not just me not just

00:55:23.500 --> 00:55:29.140
all the other students in classes the students in the classes don't know what to do the teachers

00:55:29.140 --> 00:55:34.580
in universities don't get me started i used to be a dean of a college the the teachers in these

00:55:34.580 --> 00:55:43.860
colleges will teach you what the curriculum says they don't add in the real life how you do it in

00:55:43.860 --> 00:55:51.780
real life i try my best to do that and as you see i know how to use virtual machines you do too

00:55:52.500 --> 00:55:58.420
i know how to do almost all of this stuff best part is i know how to figure it out

00:55:59.460 --> 00:56:08.260
i have friends i do research i know how to use the the gpts to my benefit i know what to say so i

00:56:08.260 --> 00:56:14.340
don't get in trouble and end up in that orange jumpsuit when you look at my linkedin profile

00:56:14.340 --> 00:56:22.340
it says the company that i work for you go to my website it tells you everything that i do

00:56:23.540 --> 00:56:30.740
so it's not like um i'm out there doing anything bad i understand correct so when they did a

00:56:30.740 --> 00:56:37.060
background on checking well she's a cyber security stupid and um yeah but she could be doing bad

00:56:37.060 --> 00:56:42.260
stuff you have training right here if they if someone came to me and said did you teach her

00:56:42.260 --> 00:56:49.540
how to do hacking yes 100 can't lie about it did you teach her how to hack into organizations

00:56:50.580 --> 00:56:55.620
yes i did so you taught her how to hack that organization that she hacked into

00:56:55.620 --> 00:57:02.020
no i did not check your questions right know who you're talking to i'm a former law enforcement

00:57:02.020 --> 00:57:10.340
officer former law enforcement agent right i'm like wait a minute i show all of my students how to do

00:57:10.340 --> 00:57:22.340
these things i also show all of my students this and we have that conversation from the beginning

00:57:23.700 --> 00:57:30.180
you don't do it to prove a point you have to have written permission and all that stuff

00:57:30.180 --> 00:57:37.940
we're talking about write a report otherwise you can't hack into someone's network you don't

00:57:37.940 --> 00:57:46.290
do it to prove a point and you don't want to end up in an orange jumpsuit so definitely not

00:57:47.170 --> 00:57:54.210
the presentation it it's it's all in what you do and what you say it uh it'll it'll work out in

00:57:54.210 --> 00:58:05.330
your in your benefit my my um profile is you know very public um and everybody kind of knows it um

00:58:05.330 --> 00:58:07.590
Um, that's me without a beard.

00:58:09.730 --> 00:58:22.530
So, um, this wire shark stuff, it's like, it's like, you know what it's like?

00:58:22.590 --> 00:58:26.590
It's like, um, being a really good chef working with chops.

00:58:27.510 --> 00:58:33.970
You have chefs that will say, um, that give me the instructions, cooks, I'll say that

00:58:33.970 --> 00:58:37.010
follow the instructions and they make a pretty good meal.

00:58:38.090 --> 00:58:39.230
I can do that too.

00:58:39.310 --> 00:58:40.290
You probably can too.

00:58:40.290 --> 00:58:47.130
Then you've got those chefs that say, here's some chocolate, here's some tomatoes, here's some squash, make a good meal.

00:58:48.790 --> 00:58:49.270
Huh?

00:58:49.670 --> 00:58:51.230
I can't do that.

00:58:51.850 --> 00:58:55.290
And then you've got some people who will make that meal and it's like, this is good.

00:58:56.470 --> 00:59:03.490
So with this whole cybersecurity stuff, with the penetration testing stuff that we're doing, right?

00:59:03.490 --> 00:59:15.470
we have to deal with what we have in order to accomplish our goal what is your goal

00:59:15.470 --> 00:59:27.170
is your goal if your goal is to do penetration testing okay we have done one looking forward

00:59:27.170 --> 00:59:37.090
to doing another right let me see cali linux intermediate right uh-oh right

00:59:41.940 --> 00:59:50.080
trying to get there on purpose the intermediate right we need to know all of these things

00:59:52.470 --> 01:00:01.270
and then and the technique that i showed you yesterday i was hoping you were really getting it

01:00:01.270 --> 01:00:05.950
and then what I want to do is get you to do it to me.

01:00:07.490 --> 01:00:10.590
Show me how to do these things.

01:00:11.710 --> 01:00:14.350
Show me what you came up with and then let's do it.

01:00:15.270 --> 01:00:18.150
Show me an example of this and then let's do it.

01:00:19.210 --> 01:00:21.970
Show me an example of this and then let's do it.

01:00:22.450 --> 01:00:23.510
You understand what I'm saying?

01:00:24.710 --> 01:00:28.850
You're creating, I gave you a process to follow.

01:00:28.850 --> 01:00:37.250
you may look at it as if well this is not showing me wait a minute yes it is as an employer and you

01:00:37.250 --> 01:00:44.850
did i i agree with you you gave it to me as an employer i don't want people to come work for me

01:00:44.850 --> 01:00:50.210
that's going to say hey boss show me what to do show me what to do show me what to do

01:00:50.210 --> 01:00:57.410
why did i hire you why did i hire you why did i hire you i gotta go to a meeting

01:00:58.850 --> 01:01:06.750
I want to be able to brag about who I hired because, man, he or she can do anything you ask them to.

01:01:07.550 --> 01:01:14.180
So, Donna, you told me yesterday you may have done scripting in Bash Shell.

01:01:14.560 --> 01:01:16.040
Here's what I'd like for you to do.

01:01:16.900 --> 01:01:20.780
Tell me what to do to do a script in Bash Shell.

01:01:21.280 --> 01:01:22.060
Keep it easy.

01:01:22.200 --> 01:01:22.840
Keep it simple.

01:01:22.960 --> 01:01:23.820
I will help you.

01:01:24.460 --> 01:01:25.280
Tell me what's the...

01:01:25.280 --> 01:01:26.720
I'm going to copy this content.

01:01:27.760 --> 01:01:29.160
Tell me where to go, what to do.

01:01:29.160 --> 01:01:41.080
i can read it but i have no idea okay you do have an idea okay let me tell you the very first thing

01:01:41.080 --> 01:01:50.940
you should do is always research it just tell me where that's my hint well so i'm on uh chat and i

01:01:50.940 --> 01:01:58.020
looked up bash scripting hold on hold on tell me don't tell me what you did tell me i want to help

01:01:58.020 --> 01:02:05.060
you i want you to tell me what to do even if you fail tell me go there go there do this

01:02:05.860 --> 01:02:15.140
go to google or go to chat which one which one go to chat and tell us good um what is bash scripting

01:02:15.140 --> 01:02:23.220
what is bash scripting okay it's going to tell me something right let's wait and see what it is

01:02:23.860 --> 01:02:27.460
writing a sequence of commands and a text file executed as a program

01:02:27.460 --> 01:02:33.700
okay born again shell which is this is this okay what's in what does bash script we look like oh

01:02:33.700 --> 01:02:41.220
shebang been bashed echo hello a shock cyber fellow today blah blah blah blah blah okay how to

01:02:41.220 --> 01:02:52.870
run a bad script okay so now what should i do now i would pull up the cali terminal cali terminal

01:02:52.870 --> 01:03:00.310
starts bashing so let's do a bash script then i'm getting in there hold on i'm going to the terminal

01:03:01.110 --> 01:03:07.830
let's do this ctrl c closing that clearing that right trying to get there right let's do a cd

01:03:07.830 --> 01:03:13.510
till day go back to the home clear okay we're going to create a bash script right

01:03:15.430 --> 01:03:18.550
what a basket looks like now what do i tell chat

01:03:18.550 --> 01:03:27.030
what does he want to ask chat how to run the bass script well here it is already there how to run it

01:03:27.030 --> 01:03:37.110
change your change your word how to enter it into the how to enter it okay so um

01:03:37.110 --> 01:03:48.790
give me step-by-step instructions to create this bash script how about that you there

01:03:48.790 --> 01:03:57.030
okay i was asking you how about that so i can hear you think yay or nay okay i'm gonna hit enter

01:03:57.030 --> 01:04:12.230
oh wow look create a basket for a network scan nice okay we'll update that throw this

01:04:12.230 --> 01:04:19.170
nano okay so we have step-by-step instructions you ready let's do it

01:04:19.170 --> 01:04:29.330
together copy here right click paste enter oh I'm in there what's happening

01:04:29.330 --> 01:04:35.110
I want a text editor a nano then I have the shebang bin bash which we have to

01:04:35.110 --> 01:04:45.490
right echo start working scan blah blah blah copy from here right click I'm pasting it okay

01:04:45.490 --> 01:04:52.750
let's come back what do you want me to do now notes shebang tell the system this is a bad script

01:04:52.750 --> 01:05:03.370
see how that works in map sn pings all hosts on the subnet ping scan only on saves the output in a

01:05:03.370 --> 01:05:09.190
normal file format to a file just like when we did the greater than sign and we gave it a name

01:05:09.190 --> 01:05:15.710
that's the uh the o n i think i mentioned that yesterday all right save and exit ctrl o press

01:05:15.710 --> 01:05:30.790
enter save okay let's come back here ctrl o press enter ctrl x to exit do a ls and where's my bash

01:05:30.790 --> 01:05:41.130
script it's in the ends network scan dot sh now what happened make the script executable so we have

01:05:41.130 --> 01:05:48.010
to do the change mod add the executable and that particular file so if we want to look at that

01:05:48.010 --> 01:05:57.390
we'll do this first ls tag al tag network look at it it's not executable now so i'm gonna follow

01:05:57.390 --> 01:06:00.830
that command i'm going to copy and paste it because i want to show you how easy this is

01:06:01.630 --> 01:06:10.270
copy come back you can also type it in and then i paste the selection enter i do up arrow twice

01:06:11.150 --> 01:06:17.310
three times hit enter now it's executable do you see the difference between executable

01:06:17.310 --> 01:06:29.180
and non-executable okay okay good and then i'm gonna come back here it says run the script now

01:06:29.180 --> 01:06:35.420
execute run that script by the way what was that ip 192 once he said okay that's usually standard

01:06:35.420 --> 01:06:41.740
that's probably going to work you can run it with the dot forward slash to run and do that let's do

01:06:41.740 --> 01:06:54.510
that copy come back and then i will paste and enter we just ran a bash script we just automated

01:06:54.510 --> 01:07:00.830
the script if i can if you can upload one of these to someone else's computer all you gotta

01:07:00.830 --> 01:07:04.830
do is get it there send it to them in an email and then bang it'll upload and start doing it

01:07:06.890 --> 01:07:11.530
and it did a scan report for all of this stuff right here let's hold on let me do um let me

01:07:11.530 --> 01:07:20.650
score my down ls because it's going to give me a file right it was um let me see i'll go back

01:07:20.650 --> 01:07:33.290
here i can see it faster scan complete results to be scanned scan results dot txt there it is

01:07:33.290 --> 01:07:40.120
right there so if i were to cat that all that stuff that we see up top would actually open

01:07:43.340 --> 01:07:55.500
that's how you do everything anything it's a test virtual box is a tool a sandbox where you test

01:07:55.500 --> 01:08:04.540
your theories chat gpt and other search engines like that ai stuff is so that you can research

01:08:04.540 --> 01:08:09.660
and learn how to do it now that's just one way i think another way is to type let me see bash

01:08:11.180 --> 01:08:18.620
bash um hold on let me up arrow twice there you go dot dot bash

01:08:18.620 --> 01:08:34.330
bash yep you type bash it'll also run the script you can do that for anything you can tell don't ask

01:08:34.330 --> 01:08:41.050
chat tell it what to do tell it what you want to do you see what i'm saying and next thing you know

01:08:41.610 --> 01:08:47.930
you are pen testing within 30 days within three months within six months with confidence right

01:08:47.930 --> 01:08:57.030
i am i am excited to go back and teach myself wire shark and do the tutorials i know where to

01:08:57.030 --> 01:09:03.090
find them all i know how to look for them on pico cts yeah and i know how to find wire shark

01:09:03.090 --> 01:09:10.070
shark.org and look up the certifications and go through their tutorials so i'm well on my way

01:09:10.070 --> 01:09:19.750
with wire chart the cali is going to take a while because of the commands easy easy but the copy and

01:09:19.750 --> 01:09:29.190
paste i get you now i get you why it's the copy and paste crisis constantly and it's because it's

01:09:29.190 --> 01:09:36.710
so easy to paste these commands i understand that yes and so but also to make sure your cali limit

01:09:36.710 --> 01:09:44.410
on your real Kali Linux you go to settings and you click on advance and make sure you have

01:09:44.410 --> 01:09:51.110
this change this able to bi-directional so you can copy and paste from the computer to your host

01:09:51.110 --> 01:09:57.490
to the um the to the Linux machine thank you that's why it doesn't work right there there you

01:09:57.490 --> 01:10:06.470
go that that this when you know when you first yes I'm sorry go ahead when you first frustration

01:10:06.470 --> 01:10:13.710
When you first install Kali or Parrot, you go to settings, you go to general, and you click on advanced.

01:10:13.850 --> 01:10:15.190
You change that immediately.

01:10:15.770 --> 01:10:17.850
You should not have to change anything else.

01:10:18.350 --> 01:10:19.630
Then you go to system.

01:10:20.510 --> 01:10:25.330
You make sure you have 49096 or better, otherwise it's not going to work.

01:10:26.930 --> 01:10:28.630
You don't really need the floppy.

01:10:28.650 --> 01:10:29.950
You can uncheck it if you want.

01:10:31.330 --> 01:10:33.850
Processor, I would do at least two, but it could be more.

01:10:34.950 --> 01:10:36.430
Acceleration, you don't have to worry about that.

01:10:36.470 --> 01:10:42.230
pin on your system display make sure it's the video memories that maxed out

01:10:42.230 --> 01:10:48.890
at 128 you can increase the monitor count if you want or leave it don't mess

01:10:48.890 --> 01:10:53.990
with that scale factor leave it at 100 otherwise gonna look really weird you

01:10:53.990 --> 01:10:59.790
don't have to worry about storage you don't have to worry about audio network

01:11:00.590 --> 01:11:09.390
you choose which network adapter to actually use you can use nat which is uh like the 10.0 series

01:11:09.390 --> 01:11:14.030
or bridge adapter which will give you an ip address from the router in your house there are

01:11:14.030 --> 01:11:18.670
a whole bunch of different resources here as a matter of fact let me give this to you this will be

01:11:18.670 --> 01:11:27.470
helpful to you now kivo okay you like this these are all of the settings the adapter settings

01:11:27.470 --> 01:11:33.550
that you can use and should be using inside of virtual box this is the complete guide virtual

01:11:33.550 --> 01:11:40.350
box network settings so that you can look at the pictures words pictures words pictures to

01:11:40.350 --> 01:11:45.230
to explain to you and show you why you want to use the appropriate adapter type

01:11:46.270 --> 01:11:52.590
you need to know that as a pen tester no i i know the i learned the adapters but you know that

01:11:52.590 --> 01:11:59.390
website right there is what we should all get before we start building vms nobody gave us

01:11:59.390 --> 01:12:06.510
that information so that alone was invaluable thank you you are so welcome i'm so frustrated

01:12:06.510 --> 01:12:13.070
this is actually really good to hear you tell me what your frustrations are so that we can get over

01:12:13.070 --> 01:12:20.430
that i want to let me tell you donna you can get over all this stuff today i just need to know what

01:12:20.430 --> 01:12:27.710
it is but the thing is though where's that thing i was uh i don't remember where i was

01:12:28.510 --> 01:12:35.870
i don't remember what man nico um the bm settings uh the that's what i was doing here we go what

01:12:35.870 --> 01:12:43.790
was it called where is it it was yeah and then from here how about this do you know how to create

01:12:43.790 --> 01:12:54.430
share folder uh no okay no we no i do not okay you you want to create a shared folder on your

01:12:54.430 --> 01:13:02.590
kali linux so that you can share a folder with your host computer that means that you can download

01:13:02.590 --> 01:13:10.750
information into onto your host computer then you can go inside your kali vm let me see where is this

01:13:10.750 --> 01:13:22.320
um cd slash media ls share folder kali linux share folder i got a few of them then i can

01:13:22.320 --> 01:13:30.960
change directory to them right i don't remember which one is the latest permission denied control

01:13:30.960 --> 01:13:41.200
a sudo that thing okay okay that must be the one that's not working but what this is is

01:13:42.160 --> 01:13:50.960
the media allows you that means i can go up hold on so a remove maybe that work that won't work

01:13:51.680 --> 01:13:58.560
let's go control a okay do it again

01:14:03.710 --> 01:14:16.240
oh i need the up arrow so a dir i think oh that's yay see i removed that first one

01:14:16.240 --> 01:14:19.580
and if I didn't know how to do it, what would I do?

01:14:22.550 --> 01:14:23.850
Look it up on Channette.

01:14:23.930 --> 01:14:24.510
There you go.

01:14:24.810 --> 01:14:26.230
You got the answer, right?

01:14:26.350 --> 01:14:28.690
You go to chat and you follow that process

01:14:28.690 --> 01:14:30.530
and you learn how to do it.

01:14:30.550 --> 01:14:31.410
You don't give up.

01:14:31.510 --> 01:14:32.510
You don't get stressed.

01:14:32.910 --> 01:14:33.250
You know what?

01:14:33.410 --> 01:14:36.110
Let the stress, the stress is what teaches us.

01:14:36.410 --> 01:14:39.150
It's what prepares us to do work in the real world.

01:14:39.630 --> 01:14:42.270
I don't know too many non-stressful people, right?

01:14:42.270 --> 01:14:45.270
Everybody has a certain ounce of stress that they produce.

01:14:45.430 --> 01:14:47.010
The end of the day is, you know what?

01:14:47.030 --> 01:14:47.990
I can deal with that.

01:14:47.990 --> 01:14:55.250
Let me tell you stress. Stress is being on an airplane, being told we're going to crash land in the ocean. You ever been through that before?

01:14:56.830 --> 01:15:01.650
I skydive once, but no. It's not a crash land. It's not a crash land.

01:15:01.890 --> 01:15:12.230
So I've been through that. That was stress. That was tears coming down my eyes type stress, right? That was, man, what could be worse than this?

01:15:12.230 --> 01:15:17.190
I'm just being told right now that I'm probably going to die in the next few minutes. That's stress.

01:15:17.990 --> 01:15:25.330
right? This stuff right here, man, I can still go to sleep at night and I know how to overcome it

01:15:25.330 --> 01:15:39.760
because I have a process to overcome all that, right? For example, I just clicked on it,

01:15:39.780 --> 01:15:52.980
but it didn't open. It's amazing. Try it again, Wes. Let's do it again. Retend, open.

01:15:53.720 --> 01:15:58.660
Unless it opened somewhere else. That's probably what it did. Let's do this. I'm trying to show

01:15:58.660 --> 01:16:09.650
you what I do to overcome every issue on the planet. It just doesn't matter. And all I got

01:16:09.650 --> 01:16:18.160
to do is get it open. By the way, your share folder is valuable because now you can share

01:16:18.160 --> 01:16:26.620
stuff in and out of your machines. All you got to do is look about the same. And then

01:16:26.620 --> 01:16:33.580
you take that and you put it and you put it in your notes and you're grand everything is easy

01:16:33.580 --> 01:16:39.180
you can do this on your parent security too follow all the steps i just told you

01:16:40.780 --> 01:16:45.820
you go learn everything you don't know what this is google it and say explain this to me like a

01:16:45.820 --> 01:16:51.820
10 year old explain this to me like a 10 year old let me do this right explain this to me like a

01:16:51.820 --> 01:16:57.180
a 10 year old uh explain this to me like a 10 year old and you read it it's so easy

01:16:57.820 --> 01:17:33.470
explain this to me you understand um these are google searches you do this with pico ctf

01:17:34.590 --> 01:17:42.670
they what's happening in your school is they see the big picture you don't probably because they

01:17:42.670 --> 01:17:50.110
didn't tell you they didn't show you if they have to show and tell you you understand what i'm saying

01:17:53.600 --> 01:18:01.440
if from your expert perspective many people are learning the network and many people are getting

01:18:01.440 --> 01:18:08.720
these comptia certifications that we discussed where do you see the shortfalls where do you

01:18:08.720 --> 01:18:12.940
what do you think students could focus on

01:18:12.940 --> 01:18:15.080
as far as the software side

01:18:15.080 --> 01:18:17.040
to become more proficient?

01:18:17.620 --> 01:18:18.540
I already know.

01:18:18.760 --> 01:18:20.680
Because everybody's learning networking.

01:18:21.240 --> 01:18:22.560
You're supposed to.

01:18:22.840 --> 01:18:25.020
Because guess what cybersecurity is?

01:18:25.020 --> 01:18:25.300
I understand.

01:18:25.580 --> 01:18:28.880
Cybersecurity is securing the network.

01:18:29.320 --> 01:18:29.680
Correct.

01:18:30.020 --> 01:18:30.740
But here's the thing.

01:18:31.440 --> 01:18:34.140
I'll tell you what happened a month ago.

01:18:35.080 --> 01:18:36.700
Now, I'm up here in Virginia.

01:18:36.880 --> 01:18:38.320
I'm right outside of Quantico Marine

01:18:38.320 --> 01:18:45.360
call bases literally right over there behind them trees um the military officials the top brass

01:18:45.360 --> 01:18:51.360
went and met with comptia you know what they told comptia they told comptia we are no longer

01:18:51.360 --> 01:18:56.720
interested in your certifications anymore you told me that but why and what's happening now so

01:18:57.440 --> 01:19:02.000
here's why should i proceed here's why because well first of all

01:19:02.000 --> 01:19:18.610
first of all that's probably going to take a couple of years but in the meantime this is the

01:19:18.610 --> 01:19:28.930
military's certification list what does it say cisco comptia comptia right basic intermediate

01:19:28.930 --> 01:19:36.210
advanced right now you still need to play the game and get comptia certified certification

01:19:36.210 --> 01:19:44.970
certification is just compliance it's just saying yes you guys in policy say i need to be certified

01:19:44.970 --> 01:19:51.190
i'm certified you understand that's one half of the problem i just need you to understand that

01:19:51.190 --> 01:19:58.150
do you understand that yes sir good now here's the other half we people hey they say we need to

01:19:58.150 --> 01:20:05.550
get certified so we can get the job true but you need to know how to do the job what do we people do

01:20:06.290 --> 01:20:09.210
They get certified and say, hey, I'm certified.

01:20:09.670 --> 01:20:11.030
And then they're not getting a job.

01:20:11.370 --> 01:20:11.650
Why?

01:20:12.530 --> 01:20:14.990
Because they didn't take the time to do what you did.

01:20:15.650 --> 01:20:17.890
You're learning how to do pen testing.

01:20:19.310 --> 01:20:24.450
Now, when you get certified, you can say, I'm certified in pen testing.

01:20:24.950 --> 01:20:26.370
And then you can do this, hopefully.

01:20:28.990 --> 01:20:31.150
And here are all the examples of my pen tests.

01:20:36.400 --> 01:20:37.240
You see the difference?

01:20:37.240 --> 01:20:41.620
If you don't get certified and not know how to do something, that's what I'm saying.

01:20:41.820 --> 01:20:46.840
right you're going to embarrass yourself the people will look at you and be like

01:20:46.840 --> 01:20:53.180
thanks but no thanks and you're going to be like well why i did what everyone said

01:20:53.180 --> 01:21:01.760
but you didn't take the time to learn how to do the work exactly that's why i'm here because i'm

01:21:01.760 --> 01:21:07.000
going to end up with comptias and not know how to pen touch just like everybody else

01:21:07.000 --> 01:21:15.360
which actually you will not because you have a document you see um donna i am not interested

01:21:15.360 --> 01:21:22.000
as an employer i am not interested in hearing you tell me that you have a pen test plus

01:21:22.000 --> 01:21:30.780
certification i am interested in okay you got a certification how many pen tests have you

01:21:30.780 --> 01:21:36.460
actually done i don't care if it's bone hubs or real life first of all you can't do it in real

01:21:36.460 --> 01:21:38.500
life. Someone's going to sign

01:21:38.500 --> 01:21:40.380
waivers. You don't want to tell

01:21:40.380 --> 01:21:42.320
an employee that you did some legal

01:21:42.320 --> 01:21:44.500
real pen test and you weren't

01:21:44.500 --> 01:21:46.400
authorized to do it. Do you

01:21:46.400 --> 01:21:46.820
understand?

01:21:48.180 --> 01:21:50.360
You want to say, hey, look at all these

01:21:50.360 --> 01:21:52.400
pen tests I've done. But here's

01:21:52.400 --> 01:21:53.920
the cool thing about my situation.

01:21:54.840 --> 01:21:56.540
These are the phone hubs I've done.

01:21:58.600 --> 01:21:59.780
But now let me tell you

01:21:59.780 --> 01:22:01.400
about the government pen tests I've done.

01:22:02.040 --> 01:22:02.760
You see what I'm saying?

01:22:03.920 --> 01:22:05.880
Let me tell you about all the people

01:22:05.880 --> 01:22:07.140
I've trained in pen testing.

01:22:07.140 --> 01:22:11.240
I got Yaya who works for, I forgot that bank name.

01:22:11.320 --> 01:22:11.920
He works for a bank.

01:22:11.980 --> 01:22:12.620
He's a pen tester.

01:22:13.160 --> 01:22:14.660
I have all these other people.

01:22:14.820 --> 01:22:15.440
I have Assad.

01:22:15.720 --> 01:22:17.060
He's a pen tester in the government.

01:22:17.560 --> 01:22:20.080
These are my ASAC fellows.

01:22:20.420 --> 01:22:21.960
These are people who I train.

01:22:23.620 --> 01:22:27.800
I train people and they get real jobs.

01:22:29.080 --> 01:22:32.800
It is a fantastic statement that I can say with confidence.

01:22:36.080 --> 01:22:39.180
Then I have all kinds of tools and techniques.

01:22:39.320 --> 01:22:39.960
And guess what?

01:22:40.120 --> 01:22:41.620
I still don't know it all.

01:22:41.800 --> 01:22:43.720
I still learn from other people.

01:22:43.720 --> 01:22:47.840
But all I need to know are the basics.

01:22:48.920 --> 01:22:55.740
I need to review the policies, see what the industry is calling for, play that game, earn

01:22:55.740 --> 01:23:00.060
one or more of these certifications, and then gain the hands-on experience.

01:23:00.480 --> 01:23:03.200
I just showed you how to do that.

01:23:03.200 --> 01:23:10.520
there is nothing you can't learn to do here go ahead i understand how did comptia respond to the

01:23:10.520 --> 01:23:17.700
dod what went down after it was announced oh they're pissed because guess what a comptia exam

01:23:17.700 --> 01:23:19.720
is a theory-based only exam

01:23:19.720 --> 01:23:30.220
what people do is they go find websites online the dumps and they try to memorize the question

01:23:30.220 --> 01:23:32.680
and they go in there and they take a stab

01:23:32.680 --> 01:23:34.400
and maybe they pass and maybe they don't.

01:23:35.280 --> 01:23:38.540
When they pass, ah, I'm certified.

01:23:38.780 --> 01:23:39.920
Let me put it on LinkedIn.

01:23:41.820 --> 01:23:45.780
And let me tell you, I got 33 certifications.

01:23:45.940 --> 01:23:46.440
So what?

01:23:47.440 --> 01:23:51.540
What makes my resume is the fact that I have done

01:23:51.540 --> 01:23:53.260
or know how to do these things.

01:23:53.680 --> 01:23:55.480
I can demonstrate at will.

01:23:55.840 --> 01:23:58.180
I can teach people how to do it.

01:23:58.180 --> 01:24:01.640
I'm trying my best to make sure you get what I

01:24:01.640 --> 01:24:04.660
I'm transferring all this stuff in this bald head to you

01:24:04.660 --> 01:24:08.840
so that you can say I can do this with confidence

01:24:08.840 --> 01:24:11.400
and I can do it in a few minutes

01:24:11.400 --> 01:24:13.320
what do I need to do?

01:24:13.320 --> 01:24:15.200
I need to take notes

01:24:15.200 --> 01:24:17.340
that's why we did the one note

01:24:17.340 --> 01:24:21.860
I'm hoping that you will continue what I show you

01:24:21.860 --> 01:24:24.940
because I have been in interviews like this

01:24:24.940 --> 01:24:31.740
and said they said so um it always comes up um can you show me examples of your work that you

01:24:31.740 --> 01:24:37.820
know technically i'll show them all these pin tests i'll show them national cyber league stuff

01:24:37.820 --> 01:24:44.360
right here's actual national cyber league stuff that you should be doing inside of the thing you

01:24:44.360 --> 01:24:51.320
see how i take screenshots of everything do you see how i have solutions for everything

01:24:51.320 --> 01:24:59.040
yes you have to do that on the job so practice now practice perfect

01:24:59.040 --> 01:25:07.020
right i teach people to practice perfect then they learn all these things ah now i know what

01:25:07.020 --> 01:25:14.660
a user agent header is okay i know why it's important right um hey do you know linux yes

01:25:14.660 --> 01:25:22.430
i pull up a linux terminal doing the interview and i'm like what would you like to see what would

01:25:22.430 --> 01:25:28.450
you'd like to see right they could even make up tell me something I've never done before hmm I've

01:25:28.450 --> 01:25:36.210
not done that before but hold on a second I come right over here I minimize this I come over here

01:25:36.210 --> 01:25:44.430
let's see no prob right let's go that and I'm here um oh rules of engagement I've done that

01:25:44.430 --> 01:26:07.360
for but anyway um explain this for pen testing for my notes approved guidelines and boundaries

01:26:07.360 --> 01:26:15.280
agreed upon by the client the pentesting team man i don't even know what to say definitely

01:26:15.280 --> 01:26:21.280
need to know the laws the laws are different state of virginia versus say the state of georgia or

01:26:21.280 --> 01:26:28.080
south carolina in your case the local state and federal pen test the federal pen testing laws are

01:26:28.080 --> 01:26:33.600
what they are hacking laws the local and state are different up here in virginia i think if you do

01:26:33.600 --> 01:26:38.400
a certain infraction you may get five years in jail you do that same thing in georgia you may get

01:26:38.400 --> 01:26:46.480
15. please find out i mean what is i mean we wouldn't do it without permission so we're not

01:26:46.480 --> 01:26:55.360
concerned i understand that but how do you know what your penalties are in your state for testing

01:26:55.360 --> 01:27:00.880
you do exactly this i know i'll look it up right now because that's interesting

01:27:00.880 --> 01:27:09.760
uh-huh so what are the pen testing let me see let me see nobody has ever even mentioned that

01:27:09.760 --> 01:27:24.920
that. South Carolina cyber crime. So I put in here in South Carolina versus Virginia,

01:27:25.060 --> 01:27:30.260
because I want to see the difference. South Carolina hacking laws, South Carolina computer

01:27:30.260 --> 01:27:38.440
crime, Matt. Here we go. Here are the key offenses. 10 years in prison, $50,000 fine. Three years of

01:27:38.440 --> 01:27:45.900
misdemeanor, $10,000 or $10,000. One year misdemeanor or $200 fine. Here's Virginia.

01:27:46.420 --> 01:27:54.740
felony. Ooh. Class six, felony. Ooh. Okay. We got a little comparison sheet. Third degree

01:27:54.740 --> 01:28:01.460
computer crime misdemeanor, computer trespass, 10 years, felony, if malicious and cold. Ooh.

01:28:02.460 --> 01:28:12.760
We have to ask questions. We now have a fascinating tool to be able to do that.

01:28:15.080 --> 01:28:24.820
we also even have google we still got books we got video um i can't believe that i try to open

01:28:24.820 --> 01:28:30.340
up a document and it didn't open this document where the brick rooms picture okay so i'm gonna

01:28:30.340 --> 01:28:36.580
go there because this is important i'm gonna show you something that i only show my fellows

01:28:39.560 --> 01:28:47.940
here we go i got it finally open i showed you this yesterday i think here's the goal

01:28:47.940 --> 01:28:54.480
confidence and proficiency. If you are not confident, why? If you are not proficient at

01:28:54.480 --> 01:29:05.060
what you do, why? It's because you are not identifying the task, the project, the problem,

01:29:05.060 --> 01:29:10.700
the opportunity. You don't know what you're trying to solve or achieve. So you're just

01:29:10.700 --> 01:29:21.080
walking out in the wilderness just ah right by the way this is um um going through the patent process

01:29:21.080 --> 01:29:28.520
i just want to let you know that because i like put in all the paperwork um to get this uh trademark

01:29:28.520 --> 01:29:37.920
and patent on my for my company but i'm showing you this because in my company we do first

01:29:37.920 --> 01:29:47.020
we learn second we teach you teach me how to do what you've done then i'm confident and you're

01:29:47.020 --> 01:29:53.860
confident notice yesterday you were teaching me the pen test that you did right it's okay even if

01:29:53.860 --> 01:29:59.040
it wasn't perfect you were still teaching me and i actually want you to teach me again you know why

01:29:59.040 --> 01:30:05.420
i need to make sure that you walk out of here saying i know what i'm doing

01:30:05.420 --> 01:30:08.620
these pieces of paper

01:30:08.620 --> 01:30:10.980
don't mean anything

01:30:10.980 --> 01:30:12.600
unless you can demonstrate.

01:30:12.780 --> 01:30:13.060
You understand?

01:30:13.880 --> 01:30:14.400
Huh?

01:30:15.900 --> 01:30:17.500
Japanese martial arts?

01:30:17.700 --> 01:30:19.440
Yeah, I may, well,

01:30:19.700 --> 01:30:21.020
actually, I just got promoted.

01:30:21.880 --> 01:30:23.900
But I was a fourth degree black belt.

01:30:23.980 --> 01:30:25.260
Now I'm a sixth degree black belt.

01:30:25.360 --> 01:30:26.480
I skipped the promotion.

01:30:27.540 --> 01:30:29.160
I am going to get that promotion

01:30:29.160 --> 01:30:31.360
in six days from now.

01:30:31.800 --> 01:30:32.160
Yay.

01:30:32.160 --> 01:30:49.110
um these are some of my real fellows they have they they dave is working andre andre was 14 years

01:30:49.110 --> 01:30:54.610
old when he worked with me five years later he's now a north carolina a.t student full ride

01:30:54.610 --> 01:31:01.950
cyber security interning with the nga and the cia that's when he was 15 he was teaching adults

01:31:01.950 --> 01:31:03.490
what I was teaching you.

01:31:04.870 --> 01:31:05.350
And then some.

01:31:06.250 --> 01:31:08.450
These are my interns that I had over the summer.

01:31:10.490 --> 01:31:12.490
Blaine and Maggie.

01:31:13.330 --> 01:31:14.890
And all I can say is

01:31:14.890 --> 01:31:18.610
they did such good work

01:31:18.610 --> 01:31:19.950
that if I actually had an opening,

01:31:20.050 --> 01:31:20.650
I would hire them.

01:31:21.730 --> 01:31:22.170
Right.

01:31:24.890 --> 01:31:27.910
Nad is a real estate agent

01:31:27.910 --> 01:31:29.830
who is tearing up Pentax.

01:31:29.850 --> 01:31:31.690
I don't care what your background is.

01:31:31.950 --> 01:31:36.290
Can you follow this process that I just showed you?

01:31:36.970 --> 01:31:38.770
You can follow the process.

01:31:40.330 --> 01:31:44.330
I mean, Zabion works for McDonald's.

01:31:45.470 --> 01:31:47.070
He's the kitchen manager.

01:31:49.170 --> 01:31:52.880
And he's killing cybersecurity.

01:31:59.260 --> 01:32:01.940
Do you understand what you need to do?

01:32:02.940 --> 01:32:03.220
Yes.

01:32:04.820 --> 01:32:07.580
You have no idea how exciting that is for me

01:32:07.580 --> 01:32:12.360
because there's not a lot of things that stress me out.

01:32:13.360 --> 01:32:16.820
If I'm pouring my heart into something for someone

01:32:16.820 --> 01:32:18.740
to hopefully change their lives

01:32:18.740 --> 01:32:20.140
and they don't get it,

01:32:20.740 --> 01:32:22.140
I feel some kind of way.

01:32:24.400 --> 01:32:25.360
I understand.

01:32:25.620 --> 01:32:26.940
I will sleep, but I'm like,

01:32:27.680 --> 01:32:28.320
I wonder if-

01:32:28.320 --> 01:32:29.080
Oh, I get it.

01:32:29.180 --> 01:32:32.600
I just didn't know how prepared I needed to come

01:32:32.600 --> 01:32:33.820
and bring all my notes.

01:32:34.040 --> 01:32:36.200
And I just didn't know.

01:32:36.200 --> 01:32:43.960
you don't know what you don't know until too late and so today it's been like a really wonderful day

01:32:43.960 --> 01:32:51.480
i've picked up a lot of things can we can you tell me what i don't know about payloads yes okay hold

01:32:51.480 --> 01:33:02.170
on i'm gonna give you something real quick it's free on youtube but this is the linux workshop

01:33:02.170 --> 01:33:12.860
that i did with a corporation called blacks insider it's very interactive um it's an interactive um

01:33:14.780 --> 01:33:23.340
uh thing that i think will benefit you um the uh the people who the the people that blacks

01:33:23.340 --> 01:33:29.660
inside want me to come back i just i'm just way too busy and i can't but it's a four-hour workshop

01:33:29.660 --> 01:33:33.900
hands-on you can do this take your time to do it i think you'll actually enjoy it

01:33:33.900 --> 01:33:41.740
that's why i said it okay you want me to show you what now will you tell me what i don't know about

01:33:41.740 --> 01:33:54.140
payloads and what i how i need to look at payloads okay differently or it's not not a

01:33:54.780 --> 01:33:59.500
huge lift i'll show i'll talk to you but i'm also going to show you some research right

01:33:59.500 --> 01:34:01.540
The very first thing we do is research.

01:34:03.200 --> 01:34:07.840
Payloads in Metasploit are a code that runs on a target system after successful exploits.

01:34:08.160 --> 01:34:14.520
So in Metasploit, that's going to establish a handshake between your TCP handshake between that particular system and yours.

01:34:14.800 --> 01:34:16.700
And once it's in, you can do whatever you want to.

01:34:16.700 --> 01:34:30.700
And then based on the different vulnerabilities on that machine, you get to select the payload to send to that machine if you have it.

01:34:31.260 --> 01:34:37.720
And which when we saw yesterday, when we did the, what was it again?

01:34:37.840 --> 01:34:38.820
Basic pen testing.

01:34:42.800 --> 01:34:48.710
When we did this yesterday, here are the different payloads, right?

01:34:50.440 --> 01:34:52.960
These are the payloads that exist within Metasploit.

01:34:53.520 --> 01:35:10.060
but some of these payloads were let me see i'm looking for it um i'm looking for the words

01:35:10.060 --> 01:35:19.000
excellent and others were not excellent because they've been remediated when you see something

01:35:19.000 --> 01:35:27.020
like excellent or very good or whatever and it's exactly what you were looking for because it was

01:35:27.020 --> 01:35:41.720
written on the nmap scan right well houston that is a clue and and all that is is okay

01:35:43.240 --> 01:35:51.880
you have to research it to find out if there's a way into any system you don't just know it oh i

01:35:51.880 --> 01:35:58.360
did this before it worked no we patch things we build them up we make them better later on in life

01:35:58.360 --> 01:36:05.560
you won't be able to use it anymore you see what i'm saying yeah got a lot of things like that

01:36:05.560 --> 01:36:12.200
exactly so three main types self-contained payloads perform one action and exit

01:36:12.760 --> 01:36:19.880
like upload this script or bash script and leave here's an example command unix generic

01:36:20.520 --> 01:36:28.660
runs a simple unix command best for quick one-time actions ping or open calc stagers

01:36:28.660 --> 01:36:35.380
small payloads that establish a connection and download a larger payload right so it's going to

01:36:35.380 --> 01:36:41.900
maybe get entry the systems may not capture anything major and it'll ignore it and then

01:36:41.900 --> 01:36:48.400
second stroke keystroke bang now we put another stage and now it's starting to get bad to get bad

01:36:48.980 --> 01:36:51.980
Use the bypass size restrictions.

01:36:53.940 --> 01:36:54.500
Menterpreter.

01:36:55.580 --> 01:36:57.100
We have pen tests for that.

01:36:57.300 --> 01:36:58.840
We can do that all day.

01:37:00.020 --> 01:37:00.220
Right?

01:37:02.940 --> 01:37:03.740
Second part.

01:37:03.740 --> 01:37:05.940
Do we need to try one of those using Menterpreter?

01:37:06.600 --> 01:37:07.040
We can.

01:37:07.140 --> 01:37:07.920
I mean, that's just it.

01:37:07.920 --> 01:37:17.680
I wanted you to finish basic pen testing two first, though, because everything is a buildup.

01:37:18.400 --> 01:37:24.520
yeah you know I don't want to get you to the point of oh my god it is but the

01:37:24.520 --> 01:37:29.080
here's a cool thing look at this right here let's see what can I get all right

01:37:29.080 --> 01:37:35.120
hold on and then it shows you how to set one up we did that and you have the

01:37:35.120 --> 01:37:40.280
screenshots you have no I don't know if you have an idea but because you have

01:37:40.280 --> 01:37:45.020
the screenshots of your work your words your work you should be able to

01:37:45.020 --> 01:37:49.900
understand that better because you did it the people in your school if they are not doing what

01:37:49.900 --> 01:38:00.840
we did they need to it's the only way to to learn this stuff do you understand yes um do you do y'all

01:38:00.840 --> 01:38:08.420
use oh do y'all do this in your school what do you do you work in a lab you said yeah we go on

01:38:08.420 --> 01:38:18.980
each class comes with the laboratory so once a week we have like 10 to 20 hours in a lab per

01:38:18.980 --> 01:38:28.800
class and so we are in this lab by ourselves and we have to figure it out and that's how it is in

01:38:28.800 --> 01:38:35.500
every single class so you don't you you can't ask anybody but chat it's all unless you're going to

01:38:35.500 --> 01:38:41.100
go on discourse and deal with your classmates and it takes forever to get an answer it's like

01:38:41.100 --> 01:38:49.840
forget it okay so i just go on chat so no we don't this is we don't do any of this but unlike the

01:38:49.840 --> 01:38:55.560
first year but the second year doesn't do it either so i get why they're doing it but they're

01:38:55.560 --> 01:39:03.160
not doing it right think about it like this um a brand new baby is born right mama and the baby

01:39:03.160 --> 01:39:09.260
are like this. Hopefully daddy is there too, right? The baby needs to be taken care of when

01:39:09.260 --> 01:39:17.600
it's born. You have to feed it, clothe it, keep the baby warm, keep the baby cool. You do burp it,

01:39:18.080 --> 01:39:23.040
make it use the bathroom, clean it up. You understand what I'm saying? The first year of

01:39:23.040 --> 01:39:28.360
your program needs to be like that or the first few months. They're not carrying you. They're

01:39:28.360 --> 01:39:34.420
pointing you in a direction and making you walk and run. Some people are gravitating to that.

01:39:35.440 --> 01:39:40.960
A lot of people are not. That's too many. After the big, and I say this because this is the

01:39:40.960 --> 01:39:46.660
analogy I tell my fellows, I'm going to carry you the first month or first few weeks. You're

01:39:46.660 --> 01:39:51.740
going to call me whenever you want to. I will take care of you. I just need to know. Also too,

01:39:51.740 --> 01:39:59.020
is this is the process we follow now um eventually i'm gonna hold your hand because you're walking

01:39:59.020 --> 01:40:04.620
now and you're looking all cute right i'm walking your hand now hold your hand now i need you to do

01:40:04.620 --> 01:40:10.780
this work like this that's what i need you to do and then eventually after some time

01:40:11.660 --> 01:40:20.380
i'm gonna let your hand go and you're on your own that process those steps and processes are not

01:40:20.380 --> 01:40:28.900
there because you're not strong enough yet. Now here's the thing, Donna, what they are doing is

01:40:28.900 --> 01:40:35.860
good, but they just shot you to the top of the, you like three years in from day one. That's what

01:40:35.860 --> 01:40:40.740
I'm hearing. They advanced you really quickly and people are frustrated and have questions and they

01:40:40.740 --> 01:40:50.160
don't know how to do it still. Now I'm showing you how to do it. I have shown you things

01:40:50.160 --> 01:40:55.340
And I just need you to say, you know what this ain't no issue. I know how to do it

01:40:55.340 --> 01:40:57.340
That's the first thing you say

01:40:57.340 --> 01:40:59.340
second thing you do

01:40:59.340 --> 01:41:05.420
You do is you Google it click on images click on videos and you start thinking

01:41:05.420 --> 01:41:12.920
Um, let me maybe I should if I want to learn wireshawk. I need to find some free tutorial find some free tutorials

01:41:12.920 --> 01:41:17.220
I need to type in chat GPT. How do you do this?

01:41:17.860 --> 01:41:24.580
give me examples step-by-step examples of how to do this you need to build a portfolio

01:41:26.260 --> 01:41:34.580
this is my um my personal cyber security portfolio here these are all the things

01:41:36.860 --> 01:41:42.940
that i've done and know how to do it's ridiculous i have them all over the place

01:41:42.940 --> 01:41:50.940
you just click on stuff here's wire shark i got all those notes right here's the ransomware build

01:41:50.940 --> 01:41:58.060
that i built i built this from scratch by the way and everybody was like here the hidden

01:41:58.060 --> 01:42:03.260
instructions right there why did you build a ransomware because i never did it and i wanted

01:42:03.260 --> 01:42:12.220
to learn how i wanted to see and understand how easy it was to actually build it where do you

01:42:12.220 --> 01:42:17.740
use your ransomware only in my virtual machine i'm not going to use it for real i call that a

01:42:17.740 --> 01:42:22.300
dumb question but you know what if you don't know anything about this thing then that's the answer

01:42:24.550 --> 01:42:28.710
do you have a cyber security portfolio of all the work you've ever done with your work in

01:42:28.710 --> 01:42:36.150
it and screenshots instead i i have it i have my work saved but i haven't built anything you started

01:42:36.150 --> 01:42:40.710
yesterday yes because on your one note you started that's what i'm trying to tell you

01:42:41.430 --> 01:42:48.790
you do because we started it yesterday all you got to do is right click on this thing go to properties

01:42:48.790 --> 01:42:55.430
and say and put in a title call it your cyber security portfolio just like i did

01:42:57.030 --> 01:43:03.670
and then you continue to build continue to make different tabs now this is advanced stuff adam

01:43:03.670 --> 01:43:12.870
silo these are actually apt that exist out there um advanced package um and not bad pets too um

01:43:12.870 --> 01:43:19.350
advanced persistent threats adam silo is an actual attacker and i have all these different

01:43:20.150 --> 01:43:28.230
things i've done what is crazy i got them um

01:43:28.230 --> 01:43:50.560
Um, I, the, the, so the irony of like my company is I help students, teachers, and, um, military intelligence gain hands-on experience so that they can feel comfortable when they get into the job day one, you know what to do.

01:43:52.080 --> 01:43:59.160
Um, they pay me and then they get hands-on experience to put on their resume.

01:43:59.160 --> 01:44:08.020
they actually work for my company it's crazy you can um link that for example here's aaron

01:44:08.020 --> 01:44:16.030
he started with me april 1st he works for my company he earned a security plus in like

01:44:16.030 --> 01:44:22.390
37 days he has all these things are things that i showed him how to do

01:44:22.390 --> 01:44:31.480
to include ncl top 10 which he was like this is so fascinating

01:44:31.480 --> 01:44:33.180
because we did it.

01:44:33.280 --> 01:44:34.260
I do it twice a year

01:44:34.260 --> 01:44:35.780
because he was like,

01:44:35.860 --> 01:44:37.360
I've never done this before.

01:44:37.500 --> 01:44:39.160
And I was like, I don't care.

01:44:39.580 --> 01:44:40.900
I need you to do this.

01:44:41.040 --> 01:44:42.760
I want to give you a process to follow.

01:44:43.060 --> 01:44:44.500
And he was crushing it.

01:44:44.860 --> 01:44:46.260
Do you see that top 10%?

01:44:46.480 --> 01:44:47.800
His very first NCL?

01:44:48.920 --> 01:44:49.360
Yeah.

01:44:49.620 --> 01:44:50.880
You can do that same thing.

01:44:51.180 --> 01:44:52.580
You just need a mentor.

01:44:53.680 --> 01:44:55.380
Look at his Google sites portfolio.

01:44:56.580 --> 01:44:57.360
Look familiar?

01:45:00.740 --> 01:45:02.000
Kind of looks a little bit like,

01:45:02.100 --> 01:45:03.640
look at all the certifications he's earned.

01:45:05.920 --> 01:45:15.440
he gets to show this to employers all these things he knows how to do where is your central

01:45:15.440 --> 01:45:21.630
repository of things that you know how to do well i'm going to be putting it together that's

01:45:21.630 --> 01:45:30.430
for sure there you go you said the right answer because the thing is that's what we all need to

01:45:30.430 --> 01:45:39.150
do i just promoted him to team lead now he's helping teach me teach a plus to some teenagers

01:45:39.150 --> 01:45:48.220
that i'm teaching for see i says yes you both work at a soft cyber makes my day he's not the

01:45:48.220 --> 01:45:59.930
only one i i have many of them on on the team let's see megan let me make megan works here too

01:45:59.930 --> 01:46:06.890
i've known megan like 17 years now 15 years jesus i know before she had the five kids she has

01:46:06.890 --> 01:46:16.050
I can go on and on. I don't want to bore you.

01:46:18.290 --> 01:46:20.030
Are you up for taking a break?

01:46:20.510 --> 01:46:20.770
Yes.

01:46:20.770 --> 01:46:22.210
Because I need to go to the restroom.

01:46:22.910 --> 01:46:23.310
Yes.

01:46:23.830 --> 01:46:24.890
Start to squirm.

01:46:25.330 --> 01:46:26.410
Yes. What time do you want to come?

01:46:26.410 --> 01:46:28.070
Yeah, tell me when you want to come back.

01:46:28.490 --> 01:46:32.930
I was about to say, I may take advantage of getting some food, so I can do like 30 minutes if you want.

01:46:35.120 --> 01:46:36.500
See you at 12.15.

01:46:37.500 --> 01:46:37.860
Okay.

01:46:38.020 --> 01:46:39.460
Or 12.16. Okay, bye-bye.

01:46:39.460 --> 01:48:02.500
I hear you now. Hello. Hello. I was going to give you this, too. I think that this would be helpful to you, probably more so than a resource I gave you yesterday and even relevant to the question that you just asked me about payloads.

01:48:02.500 --> 01:48:36.180
Okay. So, okay. We still have a boatload of, I mean, what do you want to do right now? We have a lot of different things relative to the intermediate pen test that we need to discuss, but I don't know what, I mean, I'm trying, I'm following the list. I just don't know what you want me to do.

01:48:36.180 --> 01:48:46.050
i wouldn't mind doing another pen test and um okay maybe looking yeah just uh i mean we don't

01:48:46.050 --> 01:48:52.810
have to go all day i wouldn't mind doing another pen test and then you know pretty much it because

01:48:52.810 --> 01:48:59.810
we can leave we can leave anytime we can leave anytime you want to you just tell me

01:48:59.810 --> 01:49:05.530
i just mean yeah i don't i'm kind of out of questions i mean there's just so much i don't

01:49:05.530 --> 01:49:12.030
know i don't even know what to ask so i don't know what to tell you i mean i just so much i

01:49:12.030 --> 01:49:17.350
don't know that you could basically tell me anything it's like what i want to hear about

01:49:17.350 --> 01:49:27.030
is the network and cali and all the software and i mean i can i can hit all those but i mean yeah

01:49:27.030 --> 01:49:31.690
i mean let me tell you this have to keep doing it over and over again like you said that's it

01:49:31.690 --> 01:49:36.890
and networks are secret um in other words it's like whatever goes in your house is secret and

01:49:36.890 --> 01:49:44.490
not everybody knows and no one should know how you establish and create your network to for the people

01:49:44.490 --> 01:49:50.570
inside of their community to work is one thing and that's all the secret the thing is though you have

01:49:50.570 --> 01:49:57.370
people coming uh let me show you this or this thing let me show and tell and um i'm gonna need

01:49:57.370 --> 01:50:04.010
you to share your screen as well but let me share mine first and then i'll show you this i want to

01:50:04.010 --> 01:50:10.890
hopefully you will you will get this because i have one image that tells it all and i already

01:50:10.890 --> 01:50:18.490
know you know what it is because you mentioned it yesterday okay so this is the defense and death fan

01:50:18.490 --> 01:50:29.090
right these are mission critical assets for every organization a company or even a personal

01:50:29.090 --> 01:50:37.390
organization right you can even drill it down to say a cell phone so within these mission critical

01:50:37.390 --> 01:50:45.370
assets exist social security numbers dates of birth um private health information

01:50:45.370 --> 01:50:54.830
um intellectual property you know like like kfc's secret recipe or uh uh secrets that the

01:50:54.830 --> 01:51:00.710
government may have and we don't ever want unauthorized people to get to that you understand

01:51:00.710 --> 01:51:08.270
yes now if somebody can hack into your home computer what will i get you don't have to

01:51:08.270 --> 01:51:13.730
answer i can already tell you i'm going to get your social security number your date of birth

01:51:13.730 --> 01:51:19.310
your credit card numbers. I'm going to emulate you. I'm going to cause you a bad day. I may find

01:51:19.310 --> 01:51:23.730
any and everything that I can use against you. I already know how to create a ransomware. I showed

01:51:23.730 --> 01:51:28.790
you I did it in an hour and 15 minutes. All I got to do is execute it and hold your stuff hostage.

01:51:29.350 --> 01:51:35.570
You decide whether you pay it or not. So this is something that's personal. If we work for the

01:51:35.570 --> 01:51:41.430
same organization and someone hacked into that organization, they got our stuff. We're both mad.

01:51:41.430 --> 01:51:46.550
so now what does that take this defense in depth is something that you've seen before

01:51:47.750 --> 01:51:54.150
but there's prevention or policy management before you can even you're going to work on

01:51:54.150 --> 01:51:58.790
my network before you can even touch my network you i'm going to have you um

01:51:59.670 --> 01:52:05.830
review the acceptable use policy of the things that you can and cannot do on my network

01:52:05.830 --> 01:52:16.490
For example, I need you to come here and work, not open up Apple Music on your computer and slow down my bandwidth so other people can't work proficiently.

01:52:17.150 --> 01:52:23.950
Not go to gambling sites or pornographic sites, you know, stuff like that that you should not be doing.

01:52:24.030 --> 01:52:33.990
You're there to work. There are other policies, cyber threat intelligence, security policies and compliance, risk management, security awareness in the training,

01:52:33.990 --> 01:52:42.090
penetration testing, vulnerability assessment. Because as a pen tester, you may be doing

01:52:42.090 --> 01:52:50.130
vulnerability management and assessments more so than actual pen testing. Those are different

01:52:50.130 --> 01:52:55.630
roles. You can do the job and you can say, hey, okay, these are things that you need to do to

01:52:55.630 --> 01:53:01.810
protect your organization. So that's the policy section. If it's not in writing, that means that

01:53:01.810 --> 01:53:08.370
anybody who gets in the network even bad guys can do anything they want and there's nothing to govern

01:53:09.170 --> 01:53:16.450
um them and hold them accountable on the right side is operations which is monitoring and response

01:53:17.650 --> 01:53:23.410
i asked the question yesterday do you have a sock in your house do you have a sim installed in your

01:53:23.410 --> 01:53:31.570
home most people don't so at hsock cyber that's what i show people how to do so that they can

01:53:31.570 --> 01:53:39.010
monitor everything that goes on inside the house just in case there is an external threat

01:53:41.010 --> 01:53:49.330
or an internal threat which could be even just clicking on the wrong site because they don't

01:53:49.330 --> 01:53:55.970
know any better not like they didn't want to do anything malicious with that there's also data

01:53:55.970 --> 01:54:02.930
security what are you doing to secure your data from being exfiltrated outside the organization

01:54:03.490 --> 01:54:10.690
are you using data loss prevention dlp do you have encryption you know they're going to steal

01:54:10.690 --> 01:54:15.170
the data but at least if they steal the data all they'll see is gobbledygook like we saw in wireshark

01:54:16.770 --> 01:54:21.330
you know just trying to bring everything we did what how do we classify that data

01:54:21.330 --> 01:54:28.370
hey that's credit card data that's personal data that's phi you know um their data wiping

01:54:28.370 --> 01:54:33.970
okay they stole a whole computer you know what i can remotely wipe it so they'll get nothing

01:54:34.530 --> 01:54:41.890
application security you can google search this or chat gpt but most of the apps on the app store

01:54:41.890 --> 01:54:48.690
are insecure and have bugs all throughout something like 85 88 something like that

01:54:48.690 --> 01:54:55.010
when i did it a couple of weeks ago these applications are on our phones they're on

01:54:55.010 --> 01:55:02.530
our computers how do you think nsa and china and russia are getting into our computers

01:55:04.050 --> 01:55:09.490
they don't have to come physically go ahead and do the um do the tom cruise and uh in that movie

01:55:09.490 --> 01:55:15.890
uh mission impossible right when he came out the ceiling nobody nobody wants to get caught

01:55:15.890 --> 01:55:22.530
But all you got to do is find the vulnerabilities in the applications, and we download them

01:55:22.530 --> 01:55:31.450
all day, which is why we need to do vulnerability assessments and scans and penetration testing

01:55:31.450 --> 01:55:37.270
routinely, usually at least a year for pen tests, but vulnerability scans take me every

01:55:37.270 --> 01:55:37.590
week.

01:55:39.010 --> 01:55:41.590
The frequency on the job is we did it every week.

01:55:41.590 --> 01:55:44.830
I presented it every week, man, we did this, we did this, we found nothing.

01:55:45.890 --> 01:55:51.510
these applications are vulnerable. You have people inside the organizations going on apps

01:55:51.510 --> 01:55:55.910
and putting their social security numbers in and they're on the government network. The government

01:55:55.910 --> 01:56:02.350
has tools that will be able to catch and stop that, such as this DLP, database monitoring and scanning,

01:56:03.290 --> 01:56:10.790
endpoint security, patch management, configuration compliance. We have all these different tools or

01:56:10.790 --> 01:56:16.950
everybody has a computer or maybe even a cell phone. What are we doing to monitor or to secure

01:56:16.950 --> 01:56:23.930
their cell phone for them? Because we don't trust them to do it. Even if we trust them to do it,

01:56:24.010 --> 01:56:32.550
we're going to do it anyway. Network security. Okay. That's what cybersecurity is, securing

01:56:32.550 --> 01:56:39.630
the network and all of its operations, internal and external. Whatever you're doing on my network

01:56:39.630 --> 01:56:53.970
And with my devices, I need to make sure that the appropriate people are being allowed in and out, the appropriate information is being allowed in or out, which is why we have firewalls, right?

01:56:54.310 --> 01:56:56.730
Firewall is like, hey, if you're on the list, you can come in.

01:56:57.370 --> 01:56:59.610
If you're not on the list, you can't come in, right?

01:57:00.030 --> 01:57:03.650
And we have different types of firewalls for different functions.

01:57:04.250 --> 01:57:09.610
To back up firewalls, we have intrusion detection and intrusion prevention systems, right?

01:57:09.630 --> 01:57:20.830
If an intruder is coming in and we have their signature, we need to be alerted in the operations section so that we can respond and we're going to look at the policy.

01:57:21.290 --> 01:57:26.730
Then we're going to contact the people with a tool and say, hey, firewall people, you need to block this IP address.

01:57:26.990 --> 01:57:28.730
You see how that works all in tandem?

01:57:31.040 --> 01:57:32.100
Perimeter security.

01:57:32.100 --> 01:57:41.020
Obviously, that's the equivalent of say, okay, Donna, you can come to my house and I'm going

01:57:41.020 --> 01:57:45.160
to actually give you a key. You can use the key to my house for the time you're here.

01:57:45.920 --> 01:57:53.000
You can come in and out at will. I don't care, 24-7. Whereas if someone else comes into my

01:57:53.000 --> 01:57:58.740
organization, they don't have a key and they're entering my space, I better be catching them.

01:57:59.160 --> 01:58:00.480
Operations need to catch them.

01:58:01.140 --> 01:58:03.140
Physical security needs to catch them.

01:58:03.680 --> 01:58:07.400
The firewall needs to catch them if they're doing something technically, right?

01:58:07.400 --> 01:58:09.980
From someone outside the organization trying to get in.

01:58:10.700 --> 01:58:12.400
Secure DMZs.

01:58:13.180 --> 01:58:16.520
Applications, because you can always get into an organization through an application.

01:58:17.380 --> 01:58:17.820
They submit.

01:58:18.160 --> 01:58:18.940
Do you see what I'm saying?

01:58:19.060 --> 01:58:20.420
Physical security honeypots.

01:58:21.400 --> 01:58:23.520
This is how all this works.

01:58:24.020 --> 01:58:24.860
And then guess what?

01:58:24.900 --> 01:58:27.080
Every organization is in the cloud today.

01:58:27.080 --> 01:58:35.200
right public cloud such as amazon because they have a dmz where they sell stuff and people go

01:58:35.200 --> 01:58:40.020
there and look at stuff and hopefully they're not manipulating anything but they're not getting into

01:58:40.020 --> 01:58:46.740
the organization deep but if they learn how to bypass it they find the right ip they can get

01:58:46.740 --> 01:58:52.320
through the public cloud into the organization private cloud same thing we have private clouds

01:58:52.320 --> 01:58:58.120
People should not be getting those IP addresses, but somehow, someway, they got into the Amazon

01:58:58.120 --> 01:59:02.020
public server, and they found a way into the organization.

01:59:03.740 --> 01:59:13.040
This is a snapshot, and it is a hell of a discussion that we can literally do all this

01:59:13.040 --> 01:59:16.460
stuff in our virtual machines, in our home networks.

01:59:16.780 --> 01:59:21.000
How can you protect an organization if you don't know how to protect yourself?

01:59:21.000 --> 01:59:28.000
So what you do is you build everything here inside your house.

01:59:28.620 --> 01:59:30.140
That's what I do at H-Stop.

01:59:30.540 --> 01:59:32.280
And then you take notes.

01:59:33.820 --> 01:59:39.360
And then from there, you will apply for jobs.

01:59:39.780 --> 01:59:41.240
You will research everything.

01:59:42.120 --> 01:59:43.600
You'll take all these notes.

01:59:44.200 --> 01:59:46.520
And then you will go forth and forth.

01:59:47.400 --> 01:59:48.040
Comments, questions?

01:59:48.040 --> 01:59:55.180
um well i'm probably not going to apply for a job i'm probably going to open a company as a

01:59:55.180 --> 02:00:03.460
consultant nice i like it but you know i uh it's really tricky to have a small digital footprint

02:00:03.460 --> 02:00:10.260
but the world requires you to be a rock star and hang yourself out on a shingle and publish all

02:00:10.260 --> 02:00:17.960
your nonsense not like yours is nonsense i'm not saying that most people publish nonsense they do

02:00:17.960 --> 02:00:25.640
and i don't publish anything and so i get chastised all the time but i don't want to

02:00:26.280 --> 02:00:33.080
and so i have to work around the whole linkedin and i already have a company it doesn't matter

02:00:33.080 --> 02:00:39.160
that i don't know content yet because i'm in this program for two more years and i'm

02:00:39.160 --> 02:00:45.960
going to figure it out because i have two years to do it and i have all the resources around me

02:00:45.960 --> 02:00:51.160
i have a mentor that was supposed to contact you i don't know if he did and it doesn't really

02:00:51.160 --> 02:01:00.040
matter but he will take me down the rabbit hole but he has like downloaded so much information

02:01:00.040 --> 02:01:08.840
upon me that i mean even though i look like a nitwit i do have a 4.0 so my brain works way

02:01:08.840 --> 02:01:17.160
differently like i am the person that just leave me alone give me my computer and i will show you

02:01:17.160 --> 02:01:25.000
how i get there but i have a i mean i don't have a choice because this is how we're set up in this

02:01:25.000 --> 02:01:34.120
program so i just um appreciate your dialogue and your different type of teaching because i can

02:01:34.120 --> 02:01:43.000
see how the shortfall that i have in the learning gap between the different types of teaching and so

02:01:43.880 --> 02:01:52.120
i'm gonna work on that and um i'm definitely getting a bigger monitor but next time my boot

02:01:52.120 --> 02:02:02.990
camp it'll be in the cyber lab so i don't have any of these problems so anyway i the information

02:02:02.990 --> 02:02:11.070
now you know what questions do i have just back to the same stuff it all goes like round and round

02:02:11.070 --> 02:02:20.510
the mulberry bush until it doesn't so i mean i'm good it's just that i have never done anything in

02:02:20.510 --> 02:02:28.510
my life like everybody else not because i don't want to it's because my life is as such that

02:02:28.510 --> 02:02:32.110
i keep getting shot out of the cannon in so many different ways

02:02:33.630 --> 02:02:41.150
that i'm gonna land and this time when i land it's gonna be differently okay so i am going back

02:02:41.150 --> 02:02:48.510
to the woodshed with cali lennox and next time i know how to prepare for a boot camp um it's just

02:02:48.510 --> 02:02:50.550
that. Yeah, it was just

02:02:50.550 --> 02:02:52.150
some bad timing.

02:02:52.770 --> 02:02:54.350
So, anyway,

02:02:54.930 --> 02:02:58.400
I would

02:02:58.400 --> 02:03:00.320
love to see another pen test or

02:03:00.320 --> 02:03:02.240
just run through the one that we did.

02:03:02.760 --> 02:03:04.400
I reviewed the notes.

02:03:04.540 --> 02:03:06.300
I understand that I have all

02:03:06.300 --> 02:03:07.800
the information I need

02:03:07.800 --> 02:03:09.660
at this point.

02:03:10.140 --> 02:03:11.580
Okay, so then

02:03:11.580 --> 02:03:13.820
it's not everything.

02:03:14.840 --> 02:03:15.140
It's...

02:03:15.140 --> 02:03:18.020
Well, pen test. To do a basic

02:03:18.020 --> 02:03:20.340
pen test. A basic pen test, yes.

02:03:20.360 --> 02:03:27.720
and um you can um okay so i'm gonna give you a choice you can either do it in front of me

02:03:27.720 --> 02:03:34.360
or you can tell me what to do and explain it and i can fill in the gaps and then um if you want

02:03:34.360 --> 02:03:39.720
that basic pen test too should be uploaded on your machine you can try that one too but i will tell

02:03:39.720 --> 02:03:48.420
you it's uh it's harder than the first one so you put it on chat no i copied it no no you um

02:03:48.420 --> 02:03:54.980
you downloaded basic pen test to onto your machine right here yeah yeah so

02:03:54.980 --> 02:04:01.020
okay so I'm gonna give you the choice basic pen test 2 or you can do basic

02:04:01.020 --> 02:04:05.940
pen test 1 and just do it and let me watch you or you can tell me what to do

02:04:05.940 --> 02:04:15.760
and then I can do it and I want to fill in the gaps wherever I can since you

02:04:15.760 --> 02:04:22.720
have your screen up already okay I'm gonna do that I'm in the desktop

02:04:22.720 --> 02:04:35.540
you ready yes i am okay i want to crack open my virtual box all right and i'm am i doing basic

02:04:35.540 --> 02:04:43.720
pen test one or two oh two one excuse me never mind basic pen test one okay here we go the

02:04:43.720 --> 02:04:51.260
confidence um i yeah i'm glad that you um i thank you for all of your comments i did have some

02:04:51.260 --> 02:04:56.540
comments to a few things, but feel free to always keep in touch with me. You got my cell phone

02:04:56.540 --> 02:05:06.900
number. You have access to Noble Prog. Do what you know is best to do. The bottom line is,

02:05:06.900 --> 02:05:13.280
I mean, I won't lie to you. Have you heard the University of Maryland Global Campus?

02:05:14.620 --> 02:05:19.360
No. No? Well, University of Maryland Global Campus has almost 200,000 students,

02:05:19.360 --> 02:05:27.560
And I just partnered with them, my company, to show them how to do cyber better and differently.

02:05:28.920 --> 02:05:34.980
Also, Prince William County, Virginia schools, I just partnered with them a month ago.

02:05:35.760 --> 02:05:37.980
I'm teaching kids how to do this stuff.

02:05:41.060 --> 02:05:42.680
I'm partnered with the Wish Center.

02:05:43.240 --> 02:05:48.240
I'm partnered with, I have like 15, 16 different partners.

02:05:48.240 --> 02:05:56.820
so you know my main professor in the cyber lab professor angela kern i do not okay she's in the

02:05:56.820 --> 02:06:08.080
cyber lab a lot i mean that's what i was she's a coach but anyway um kern yeah k-e-r-n she set up

02:06:08.080 --> 02:06:19.070
the cyber program in south carolina she's from penn state okay i don't see her but what's really

02:06:19.070 --> 02:06:28.250
cool is that I was the very same way as you. I was not a social person online per se. But

02:06:28.250 --> 02:06:37.110
in the end of the day, I was told that I would not get a really good job opportunity if I

02:06:37.110 --> 02:06:43.530
didn't have a LinkedIn profile. And in the end of the day, that was 2015. And I will

02:06:43.530 --> 02:06:52.630
tell you. Since 2015, the very first job I got was on LinkedIn and I made $40,000 extra that year

02:06:52.630 --> 02:07:00.410
in 2015 because I got on LinkedIn. And every job I've had since then was someone finding me on

02:07:00.410 --> 02:07:05.450
LinkedIn and offering me a job to include Noble Pro. I have not applied for a job of my own.

02:07:05.830 --> 02:07:12.710
It's crazy. I call that a blessing. Okay. Let's come back to here because I didn't see what I

02:07:12.710 --> 02:07:21.470
need to you tell me I just um I have my Kali Linux machine running I have my um and the terminal

02:07:21.470 --> 02:07:35.940
open I'm ready to go okay so in lowercase well first of all you're gonna do in lowercase if

02:07:35.940 --> 02:07:38.720
config enter

02:07:38.720 --> 02:07:40.780
okay

02:07:40.780 --> 02:07:44.200
and then you're going to go to ethos

02:07:44.200 --> 02:07:46.300
and find your IP address

02:07:46.300 --> 02:07:49.940
there it is

02:07:49.940 --> 02:07:50.760
okay

02:07:50.760 --> 02:07:54.260
so then we're going back to

02:07:54.260 --> 02:07:54.860
Cali

02:07:54.860 --> 02:07:57.380
and we're going to write

02:07:57.380 --> 02:07:58.560
IP

02:07:58.560 --> 02:08:02.240
and then the address enter

02:08:02.240 --> 02:08:03.700
space yes

02:08:03.700 --> 02:08:05.000
address enter

02:08:05.000 --> 02:08:07.880
so of course you don't have to do both but you can do one

02:08:07.880 --> 02:08:19.440
but ip address is the the one that's colorful i have config is the older one okay okay

02:08:19.440 --> 02:08:29.860
okay you got it and by the way i tried to show you at least two different commands

02:08:29.860 --> 02:08:48.320
just because um oh i'm gonna show you this just because we're there you see what i wrote

02:08:55.580 --> 02:09:08.260
i wrote what are the alternatives to ifconfig and look at what we're learning these are all things

02:09:08.260 --> 02:09:16.020
you can put in your notes and actually try okay okay i'm gonna i'm gonna do that from time to time

02:09:16.020 --> 02:09:27.980
but what's next so now you're gonna type in ip in lowercase space and the address you just found

02:09:27.980 --> 02:09:43.400
okay you take ip space address you want me to say what it is okay uh 10 yeah that's you got it

02:09:43.400 --> 02:09:55.960
but i'll say it next time okay so you're gonna write ip space and 10.1.0.3.15 and enter

02:09:55.960 --> 02:10:17.500
you're going to write ip space 10.0.3.15 just tell me so now before you just tell me the command

02:10:17.500 --> 02:10:24.760
before that is what we're doing in your notes so what are we trying to do once we identify the ip

02:10:24.760 --> 02:10:33.360
address of the attacker machine we move on to the next step yeah we're trying to find out the um

02:10:33.360 --> 02:10:48.120
our ip address so find my ip would be ip space a so we did that ip address right i we now have

02:10:48.120 --> 02:10:54.780
the ad the ip address of the cali linux machine the attack machine now what are we trying to do

02:10:54.780 --> 02:11:03.700
We're going to enter IP space A-V-V-R.

02:11:03.960 --> 02:11:04.400
Okay.

02:11:04.540 --> 02:11:05.800
No, we don't have to do that.

02:11:06.400 --> 02:11:09.560
Those are options because, look.

02:11:09.560 --> 02:11:11.380
Those three are the same thing.

02:11:11.520 --> 02:11:11.760
Okay.

02:11:12.020 --> 02:11:13.180
Because they're all the same, right?

02:11:13.860 --> 02:11:14.340
Ooh.

02:11:14.560 --> 02:11:14.780
Yeah.

02:11:14.980 --> 02:11:15.140
Okay.

02:11:15.260 --> 02:11:18.580
So now we're going to do NetDiscover.

02:11:18.580 --> 02:11:27.140
We're going to write in lowercase pseudo space NetDiscover, one word,

02:11:27.140 --> 02:11:32.340
lower k okay but what are we doing but what are we doing we're scanning the network we are looking

02:11:32.340 --> 02:11:38.900
for vulnerabilities we're finding the target ip okay so hold on finding the target ip there you

02:11:38.900 --> 02:11:44.340
go we're finding the ip address for the target machine not scanning for vulnerabilities

02:11:46.180 --> 02:11:51.700
okay now i'm going to right click this and split this terminal between left and right make this

02:11:51.700 --> 02:12:00.820
bigger control shift plus plus plus control shift plus plus plus plus plus are there any alternative

02:12:00.820 --> 02:12:07.060
commands you want me to type at the same time well do you want alternatives we can do an alternative

02:12:07.060 --> 02:12:14.100
show me an alternative that you have when you know an alternative is the pseudo command lowercase okay

02:12:14.100 --> 02:12:29.060
space arp dash scan space tack lowercase l enter right now why do we use that command

02:12:29.060 --> 02:12:36.010
because that is uh scanning the network um

02:12:36.010 --> 02:12:42.930
looking for that ip address of the target machine but do you remember what we talked

02:12:42.930 --> 02:12:51.980
about yesterday which one is more thorough and which one is faster the second one is more thorough

02:12:51.980 --> 02:13:02.040
which is the second one be specific the the second one we did with the arp dash scan

02:13:02.040 --> 02:13:12.120
is lowercase l is more has more information no it's faster faster you write it down because look

02:13:12.120 --> 02:13:21.220
it's done see how fast it did it as soon as i did it it just popped right up but when we did this

02:13:21.220 --> 02:13:28.500
look at this one the net discover is still running it's literally going through all of the different

02:13:28.500 --> 02:13:39.440
um domains much slower much more thorough okay you don't have to discover much thorough more

02:13:39.440 --> 02:13:50.420
correct now i want to show you this too i'm going to man net discover so you can see this is active

02:13:51.860 --> 02:13:58.340
or passive address resolution reconnaissance tool there are a bunch of different

02:13:59.700 --> 02:14:06.740
switches the device the range the file if you have it and i need you to know how to

02:14:06.740 --> 02:14:16.340
look up look it all up so we have filters times we have counts nodes right enable fast mode scan

02:14:16.340 --> 02:14:24.420
with the dash f function and i want you to be able to always look up the man for that and also

02:14:24.420 --> 02:14:31.860
the other one i taught you manual i don't think tldr is located installed in here let me see if i

02:14:31.860 --> 02:14:40.740
can install it install teal deer which means too long don't read remember i told you that

02:14:42.340 --> 02:14:48.980
and look at that i'm installing it and you need to know how to install things just in case you

02:14:48.980 --> 02:14:56.900
can't find something or if you need to know how something works see how that works now it wants me

02:14:56.900 --> 02:15:06.260
the you see the red tldr tag tag update i need to update this so that it can actually work

02:15:06.980 --> 02:15:18.660
we have to read yes the output and we see how that's written scan the ip range on the network

02:15:19.300 --> 02:15:23.300
on the interface network interface and it's showing you a bunch of different options

02:15:23.300 --> 02:15:30.980
You can also do, let's see, NetDiscover TACH, and that'll do the same thing.

02:15:34.250 --> 02:15:34.810
Okay, hold on.

02:15:34.890 --> 02:15:35.350
One more.

02:15:37.620 --> 02:15:39.060
TACH help.

02:15:39.980 --> 02:15:44.620
If I type out TACH help, it does the same thing as TACH.

02:15:46.690 --> 02:15:50.250
Okay, so TACH is a shortened version for TACH help.

02:15:52.180 --> 02:15:57.880
Okay, so I'm going to pull up this NetDiscover command we did,

02:15:57.880 --> 02:16:05.540
and i got it right there and this appears to be the attack machine's ip address because i can tell

02:16:05.540 --> 02:16:12.940
from the mac address which we can find inside of the virtual machine okay and this one is still

02:16:12.940 --> 02:16:19.820
running you see that right there it's slower it's more thorough this one is fast and it's usually

02:16:19.820 --> 02:16:27.480
very thorough it's just fast my students don't even use net discover anymore well look at this

02:16:27.480 --> 02:16:48.210
right here. What are the alternatives to net discover in Linux? Great question. ARP scan

02:16:48.210 --> 02:17:01.910
in map, ping scan or ARP scan, fping, high speed ping scanner, IP neighbor plus ping suite.

02:17:03.050 --> 02:17:15.720
mass scan right see how that works and all right i've used all of them that's how you learn all of

02:17:15.720 --> 02:17:22.020
them you just gotta try it mass scan is great for large organizations and there are more

02:17:22.020 --> 02:17:38.400
there are more okay okay we got that what's next so what's next is that uh

02:17:40.670 --> 02:17:49.150
we have identified the target yes now we verify connectivity okay with the ping

02:17:49.870 --> 02:17:58.030
in lower case we type ping space and the ip address is the target which was one zero point

02:17:58.030 --> 02:18:06.750
zero point three point one six enter got it doing it okay it's running it's pinging now what

02:18:10.800 --> 02:18:17.920
connectivity now so you just hit ctrl c or q depending on what works because if we don't

02:18:17.920 --> 02:18:24.960
it'll ping forever it'll ping forever okay what's an alternative to that an alternative

02:18:24.960 --> 02:18:32.880
is um doing an f ping which is just paying in lower case space and the ip address

02:18:32.880 --> 02:18:39.840
and it just shows that it's alive fantastic look at you look at this right here what alternatives

02:18:40.080 --> 02:18:43.000
are there to ping.

02:18:49.590 --> 02:18:52.350
We did the fping, multi-host and fast ping.

02:18:52.730 --> 02:18:53.870
That's what fping means.

02:18:54.710 --> 02:18:55.690
Fast ping.

02:18:57.230 --> 02:18:57.530
Right?

02:18:58.990 --> 02:18:59.950
HPing 3.

02:19:01.470 --> 02:19:02.150
Wow.

02:19:02.150 --> 02:19:02.650
Nping.

02:19:03.650 --> 02:19:07.210
I've only used ping ever, so that's interesting.

02:19:07.450 --> 02:19:08.330
What are alternatives?

02:19:08.350 --> 02:19:09.350
Ping 6.

02:19:10.370 --> 02:19:14.110
Trace path, trace route for diagnostics.

02:19:14.110 --> 02:19:16.470
for ARP, ARP ping.

02:19:17.750 --> 02:19:19.290
Here's a summary table.

02:19:21.760 --> 02:19:23.820
And then all we got to do

02:19:23.820 --> 02:19:25.880
is come back to the terminal

02:19:25.880 --> 02:19:27.560
and try it.

02:19:32.120 --> 02:19:34.660
Okay, I probably need to install that, right?

02:19:36.120 --> 02:19:37.220
Make sure I did it right.

02:19:38.040 --> 02:19:39.620
HPing 3, excuse me.

02:19:40.420 --> 02:19:41.500
Let's hit the up arrow.

02:19:42.940 --> 02:19:44.860
I still probably need to install it.

02:19:45.360 --> 02:19:46.700
Don't. It's there.

02:19:46.700 --> 02:19:57.230
open sock raw operation not permitted so let's try this and if you run into those problems

02:19:57.230 --> 02:20:03.030
you will copy that and put it in chat gpt and say hey this is what i ran into it looks like

02:20:03.030 --> 02:20:12.330
it's ping flooding what's happening oh wow that's great advice yeah um perfect i have to do a

02:20:12.330 --> 02:20:13.270
Control-C, right?

02:20:14.530 --> 02:20:14.870
Yeah.

02:20:15.170 --> 02:20:16.030
Control-C.

02:20:17.230 --> 02:20:17.750
Yes.

02:20:18.490 --> 02:20:20.430
Now we're going to scan the network.

02:20:20.770 --> 02:20:21.110
All right.

02:20:21.130 --> 02:20:22.170
We're going to scan the network.

02:20:23.030 --> 02:20:25.330
On the left side, should I stop this or what?

02:20:26.110 --> 02:20:27.310
I would stop it.

02:20:27.630 --> 02:20:28.610
I would hit Q.

02:20:29.650 --> 02:20:30.810
I did Control-C.

02:20:31.130 --> 02:20:31.430
Okay.

02:20:32.030 --> 02:20:32.270
Okay.

02:20:32.290 --> 02:20:32.870
We got it.

02:20:33.590 --> 02:20:34.410
What's next?

02:20:35.770 --> 02:20:40.310
Now we're going to use NMAP in lowercase N-M-A-P.

02:20:40.530 --> 02:20:40.730
Okay.

02:20:40.730 --> 02:20:44.630
the target IP, which is

02:20:44.630 --> 02:20:45.770
10.3

02:20:45.770 --> 02:20:52.670
I got it. I did it.

02:20:53.190 --> 02:20:55.870
TAC, capital A. There you go.

02:20:56.630 --> 02:21:00.590
Oh, you want the capital A? Yeah, let's do the

02:21:00.590 --> 02:21:04.570
advanced one. You can also feel free to tell

02:21:04.570 --> 02:21:08.690
me other things you want to try that you've never tried. There's a whole bunch on the cheat sheet, right?

02:21:09.370 --> 02:21:09.970
I know.

02:21:10.170 --> 02:21:11.210
This is what you do.

02:21:11.290 --> 02:21:12.290
You try them.

02:21:17.180 --> 02:21:19.980
And we also looked at, let me go to my chat.

02:21:22.420 --> 02:21:23.520
What was the question?

02:21:25.100 --> 02:21:30.220
Alternatives to ping, alternatives to net discover.

02:21:31.500 --> 02:21:32.460
So did we look up?

02:21:32.660 --> 02:21:33.360
I don't know if we did.

02:21:33.360 --> 02:21:38.960
So what are the alternatives to Nmap?

02:21:39.380 --> 02:21:45.740
All right.

02:21:45.960 --> 02:21:51.640
So now if you want to do speed or stealth or web app focus or automation,

02:21:51.780 --> 02:21:59.840
This is what we need to do. Here's mass scan, the fastest port scanner. Then you go right there.

02:22:00.840 --> 02:22:16.030
This is ZMAP. Here's unicorn scan, asynchronous and stealthy scanner, passive style port scanning

02:22:16.030 --> 02:22:28.300
for stealth you don't want to get caught right ruscan amass shodan clean auto recon

02:22:29.900 --> 02:22:36.780
you see how that works hold on let me go back up which one you want to try jordan

02:22:38.380 --> 02:22:46.780
hold on shodan shodan now shodan is specific that may be the one shodan search apache this is for

02:22:46.780 --> 02:22:51.160
For interconnected devices, fine-exposed devices showed us API.

02:22:51.700 --> 02:22:54.460
So now that's actually one that we can't use.

02:22:55.240 --> 02:22:58.540
But that's the one we can't because that's going to be like Internet of Things.

02:22:58.840 --> 02:22:59.460
See IoT?

02:23:01.380 --> 02:23:04.660
If we were looking for the Internet, like a smart refrigerator or something,

02:23:04.740 --> 02:23:05.540
then we'd use that.

02:23:06.740 --> 02:23:11.120
Can we go back to Cali and use a different NMAT scan?

02:23:11.300 --> 02:23:16.260
Like, can you show me like a more intensive scan to, well,

02:23:16.260 --> 02:23:22.700
Well, in our example, we have three open ports, and one was the back door.

02:23:22.880 --> 02:23:28.540
So this dash A is definitely more intensive than the first one because you see the data.

02:23:29.180 --> 02:23:32.440
So now this is what you would do, right?

02:23:32.920 --> 02:23:45.690
I'm just going to talk.

02:23:45.690 --> 02:23:54.990
My cheat sheet says that on the particular example that we're using, those three open ports,

02:23:54.990 --> 02:24:01.870
there's a command i can use to scan those ports even further would i want to do that the one that

02:24:01.870 --> 02:24:08.910
says excellent in the bookstore would i want to use a particular advanced uh port scan on that

02:24:08.910 --> 02:24:14.750
or you know it's open and it's a back door and i don't need to hold on hold on are we going off of

02:24:14.750 --> 02:24:22.110
the nmap scan or are you ahead of me yeah no no it's off this asset off of the nmap scan that

02:24:22.110 --> 02:24:29.070
we did we have three open ports the one that you're pointing to and the two other ones so

02:24:29.070 --> 02:24:38.030
is there is there a reason to use an advanced port scan on those three open ports so um

02:24:39.870 --> 02:24:46.110
well you're scanning and we know that they're open there's no reason to scan them further

02:24:46.110 --> 02:24:53.470
meaning i wanted to try to do like port specification scans you can so you can do a

02:24:53.470 --> 02:24:59.470
you can scan one particular port is that what you're talking about yes so now scan the port

02:24:59.470 --> 02:25:07.230
that's the back door that's open and see what else it says maybe so now how do you do that so what

02:25:07.230 --> 02:25:19.310
What I would do is, I would tack P to switch, to switch, oh, I don't know.

02:25:20.310 --> 02:25:22.510
Well, that's, forget that.

02:25:22.730 --> 02:25:30.390
So, like, tack P is telling that I'm going to scan a port, so that's the wrong, that's

02:25:30.390 --> 02:25:31.090
the wrong command.

02:25:31.090 --> 02:25:39.090
so what i want to do is put nmap like we had and the target ip address that you have and then i

02:25:39.090 --> 02:25:50.610
want to do tac p and the port 21 that is showing like that um i think i would take the capital a

02:25:50.610 --> 02:26:03.360
out and just back all that up uh so yeah let's start a space and then what does that tell me

02:26:03.360 --> 02:26:11.760
doesn't tell you anything more correct but it tells you the same yes and you just specified a

02:26:11.760 --> 02:26:20.420
particular port instead of all ports or the first 1 000 ports or the first 1 000 which is

02:26:20.420 --> 02:26:27.740
yeah so you can do whatever you want that's what that cheat sheet is you go off of the reasoning

02:26:27.740 --> 02:26:34.560
or the description and then you say let me try that there's really if you were to do this

02:26:34.560 --> 02:26:41.460
to get more information you'll probably do better if you did attack a and some other um thing for

02:26:41.460 --> 02:26:54.840
that particular one port and that's going to give you more information see all that and that's the

02:26:54.840 --> 02:27:03.940
same as doing attack a for the first 1000 ports you just focused it on one port really not

02:27:03.940 --> 02:27:10.260
necessary in other words you just do it for all the ports or a certain section so then my question

02:27:10.260 --> 02:27:18.120
to you is if you were scanning this network is there any other type of scan that you would include

02:27:18.120 --> 02:27:24.220
maybe it really is on my cheat sheet see that's just it it depends but look what i did

02:27:24.220 --> 02:27:35.240
what registers what like i already i literally what registers is keep it keep it simple

02:27:35.240 --> 02:27:48.940
right so you do that first hold on do that first see what it tells you that's it

02:27:48.940 --> 02:27:56.460
then from there yes maybe you can do that um i would not have done that

02:27:56.460 --> 02:28:06.880
would not have done that but look at what i did do you see what i wrote right because that's the

02:28:06.880 --> 02:28:14.060
question more intensive detail mf scan look at this you need to know what all these switches mean

02:28:14.060 --> 02:28:22.100
right so i'm going to copy it yeah can we try the o we're going to try all of it

02:28:22.100 --> 02:28:29.960
oh good i'm trying i'm trying all of it so remote os detection using tcpip stacking stack

02:28:29.960 --> 02:28:36.980
fingerprinting so you're looking for a handshake yeah this is gonna this is

02:28:36.980 --> 02:28:42.900
gonna be a serious pen test so that's just it you may not want to go too deep

02:28:42.900 --> 02:28:50.190
too fast because you don't want to get caught in map will catch you so if

02:28:50.190 --> 02:28:54.750
you're using a map how do you protect yourself a VPN is not gonna do it

02:28:54.750 --> 02:29:00.690
you're in a virtual machine a VPN a VPN will help tremendously what you do is

02:29:00.690 --> 02:29:07.690
you scan sections instead of scan the whole 65 000 points or the first 1000 you may want to

02:29:07.690 --> 02:29:13.490
scan the first 50 to 100 and you're going to scan accordingly because you don't want to get caught

02:29:13.490 --> 02:29:22.150
by the tools but based on this script you you look up what's the dash a in on the cheat sheet

02:29:22.150 --> 02:29:34.190
you look up with the dash t4 the tag p tag which is all 65 000 see the dash sv the dash sc the dash

02:29:34.190 --> 02:29:40.190
over pn you have to look that up the dash on there's a full scan block so if i come down here

02:29:40.190 --> 02:29:49.150
and i type ls there's the full scan report right there because of this particular switch

02:29:50.030 --> 02:29:56.270
don't make it hard look at the cheat sheet see what it says and then go oh let me try that and

02:29:56.270 --> 02:30:02.590
then that's what it's going to do you know how would i do this i would just take my time

02:30:03.550 --> 02:30:05.030
I'm going to get what I need.

02:30:05.470 --> 02:30:08.950
In reality, I'm probably going to test.

02:30:10.770 --> 02:30:11.390
Hold on.

02:30:11.470 --> 02:30:12.050
Let me scroll up.

02:30:15.050 --> 02:30:17.910
I'm probably going to test all of these ports.

02:30:18.470 --> 02:30:19.730
And that's what we did.

02:30:20.190 --> 02:30:21.770
Yesterday, we went to port 80.

02:30:23.890 --> 02:30:29.060
We didn't try to log in, but we did try FTP.

02:30:30.920 --> 02:30:34.220
At the end of the day, we found a backdoor through the FTP.

02:30:34.220 --> 02:30:42.200
i didn't need to do anything else further i got inside the machine i own the machine

02:30:42.200 --> 02:30:48.620
that was all i need to do is get root got it once i accomplish root there's nothing else for me to

02:30:48.620 --> 02:31:04.520
do okay okay all right um but look at here that was the nmap scan look at these others

02:31:05.220 --> 02:31:07.460
The showdown can be done for like.

02:31:08.760 --> 02:31:09.800
Internet of things.

02:31:10.440 --> 02:31:11.000
Internet of things.

02:31:11.620 --> 02:31:14.920
Yeah, to scan a network and find everything connected to it.

02:31:15.040 --> 02:31:18.180
Well, let's try another one so you can see what the output is.

02:31:18.820 --> 02:31:19.780
Which one do you want to try?

02:31:20.640 --> 02:31:21.240
You can ask.

02:31:22.420 --> 02:31:26.280
No, let's do unicorn scan because that's stealthier.

02:31:28.080 --> 02:31:28.560
Copy.

02:31:28.900 --> 02:31:29.340
All right.

02:31:29.340 --> 02:31:31.640
You probably have it loaded already.

02:31:31.640 --> 02:31:34.780
Uh, oh my virtual machine. Yes, but not here

02:31:35.620 --> 02:31:39.420
Well, it looks like it's here already look at that now. Let me change the IP

02:31:40.240 --> 02:31:58.850
right

02:31:58.850 --> 02:32:00.430
Oh, wow

02:32:00.430 --> 02:32:02.430
It says total host block

02:32:03.030 --> 02:32:05.750
Total package should take a little longer than one hour

02:32:06.630 --> 02:32:10.170
15 hours 30 minutes and 32 minutes and 11 seconds

02:32:11.510 --> 02:32:13.350
You want to scan?

02:32:13.350 --> 02:32:15.350
Takes a long time

02:32:15.350 --> 02:32:18.570
well it's not very stealthy if it takes you 15

02:32:18.570 --> 02:32:19.770
quarters no

02:32:19.770 --> 02:32:22.690
that means that it is stealthy

02:32:22.690 --> 02:32:24.130
because it's going to take a long time

02:32:24.130 --> 02:32:26.470
stealthy is not fast

02:32:26.470 --> 02:32:28.090
like 30 hours

02:32:28.090 --> 02:32:30.410
so that's just it I don't know

02:32:30.410 --> 02:32:31.390
but here's the thing

02:32:31.390 --> 02:32:34.590
stealthy means that you're peeking around

02:32:34.590 --> 02:32:36.550
every corner so you don't get caught

02:32:36.550 --> 02:32:38.890
that takes a long time

02:32:38.890 --> 02:32:40.710
that's why it takes so long

02:32:40.710 --> 02:32:40.970
right

02:32:40.970 --> 02:32:42.830
NMAP is like this

02:32:42.830 --> 02:32:54.910
it doesn't care but but that's how you know is you try it and you go i don't have

02:32:54.910 --> 02:33:06.860
um 15 hours so i'm gonna do ctrl c we stop that you want to try one more okay which one um six

02:33:06.860 --> 02:33:20.220
on rust scan okay rust scan scan for super fast and hand off to nmap okay oh would you want to

02:33:20.220 --> 02:33:26.540
use that in cahoots with nmap so you're super speedy see that depends the short answer that

02:33:26.540 --> 02:33:32.860
is probably no because you don't want to get caught right but if you're you're doing a white

02:33:32.860 --> 02:33:42.700
box pin test doesn't matter nobody got it so what i find super frustrating is that nobody tells you

02:33:42.700 --> 02:33:48.220
things that don't work together like when you're doing your vms you don't want to put

02:33:48.220 --> 02:33:54.620
bit defender when you're you know when you're virtualizing your system which means you will

02:33:54.620 --> 02:34:02.380
learn from a school of hard knocks and no one knows because they don't do this all the time

02:34:02.860 --> 02:34:11.460
nobody knows to tell you that's the thing so i know a lot of things but i don't know everything

02:34:11.460 --> 02:34:19.000
i also know things that some of my pen testers don't know they also know a few things that i

02:34:19.000 --> 02:34:28.410
don't know so we share information and then we actually do it and we try and look at that right

02:34:28.410 --> 02:34:35.130
there look at that rust scan installed wow it's a snap popped up the three open

02:34:35.130 --> 02:34:41.430
forks right off the bat boom right perfect right then what you would have

02:34:41.430 --> 02:34:52.940
to do is you have to look it up and see scan the top 1,000 forks for service

02:34:52.940 --> 02:34:58.220
old s detection this is the format right here rust scan tag tag top tag a

02:34:58.220 --> 02:35:04.540
for addresses and then you got to put the address in there so you look up here that's what we did

02:35:04.540 --> 02:35:16.280
right there um what i'm trying to show you is that stop thinking that everybody knows because

02:35:16.280 --> 02:35:22.840
they don't what they do i only have to use that map because there's so many other tools got it

02:35:22.840 --> 02:35:30.120
stuck on my tool exactly and you know learn how to you learn how to research better differently

02:35:30.120 --> 02:35:37.480
because in the end of the day, you would need to find the right tool.

02:35:37.480 --> 02:35:41.520
And now look at all this stuff that's popping up.

02:35:42.820 --> 02:35:44.720
And this still isn't everything.

02:35:46.220 --> 02:35:47.540
I have stuff on here.

02:35:47.580 --> 02:35:49.520
I can prove it to you, but take too long.

02:35:50.140 --> 02:35:51.000
Okay, now did that.

02:35:51.080 --> 02:35:51.760
Now what's next?

02:35:51.760 --> 02:36:09.630
so now so now we are going to uh blow through that open port port collins metasploit and we're

02:36:09.630 --> 02:36:18.790
going to search exploit in lower case one word and then enter and enter that backdoor port

02:36:18.790 --> 02:36:27.790
The capital space, capital P, R-O, yeah, you got it.

02:36:29.490 --> 02:36:29.670
Right.

02:36:29.970 --> 02:36:33.210
You can also look this up with Google.

02:36:38.070 --> 02:36:38.490
Copy.

02:36:39.890 --> 02:36:40.950
Come here.

02:36:44.430 --> 02:36:46.650
And then you get the whole detail for the CVE.

02:36:47.390 --> 02:36:50.090
You got the whole Rapid7 backdoor, 2010.

02:36:51.450 --> 02:36:51.690
See?

02:36:52.410 --> 02:36:52.690
Right?

02:36:52.690 --> 02:36:55.550
Look, here's an NSE script.

02:36:55.770 --> 02:36:57.210
We haven't done that yet.

02:36:58.830 --> 02:37:01.450
See that right there?

02:37:02.230 --> 02:37:02.670
Yes.

02:37:03.570 --> 02:37:04.110
Copy.

02:37:08.450 --> 02:37:09.050
Paste.

02:37:25.500 --> 02:37:26.640
I'm not sure if I need that.

02:37:29.420 --> 02:37:30.320
These dashes.

02:37:37.630 --> 02:37:39.790
This installation has been backdoored.

02:37:41.850 --> 02:37:42.450
Right?

02:37:43.510 --> 02:37:51.340
It's just cool how you can just look this stuff up and do it.

02:37:52.100 --> 02:37:53.380
Hackers don't have a manual.

02:37:53.380 --> 02:38:00.160
they just google search and go to the dark web and do it have you ever been to the dark web by the

02:38:00.160 --> 02:38:07.180
way no it's really can i go there yes you can legally just that when you go there don't buy

02:38:07.180 --> 02:38:15.120
any uh nuclear triggers don't buy any drugs don't buy assassins i have um neutralized um

02:38:15.120 --> 02:38:23.360
ubuntu and put the tor on it but and then i have a vpn but my uh mentor who's the navy tier one

02:38:23.360 --> 02:38:30.780
research guy says don't do it and i'm not taking you there so i'm like oh my god they make

02:38:30.780 --> 02:38:37.400
everything like so untouchable like i feel like i'm gonna be punished so that's what i need to get

02:38:37.400 --> 02:38:44.020
over it's not illegal to go there i'm a law enforcement officer who trains the military right

02:38:44.020 --> 02:38:56.680
um hold on the only thing is you can go there just don't do anything yeah and so the tech guys that

02:38:56.680 --> 02:39:01.700
i've talked to are all afraid of it they're like don't go there this is what happened to me and i'm

02:39:01.700 --> 02:39:07.740
like stop it i wouldn't make it i'm just waiting to get more proficient before i mess around

02:39:07.740 --> 02:39:15.340
so i just showed you how it came right up just this right there you do that you can do it right

02:39:15.340 --> 02:39:21.680
here inside your language browser always verify and um i literally showed my students how to do

02:39:21.680 --> 02:39:28.160
this on the military base and then i was showing them how you could buy assassins i was showing

02:39:28.160 --> 02:39:33.440
them how you could buy nuclear triggers and drugs and then and i was like now if you go here later

02:39:33.440 --> 02:39:39.080
on your own and you do something crazy don't do it law enforcement and the military and intelligence

02:39:39.080 --> 02:39:45.140
they track it they can see doesn't matter how many vp they'll just track the first vpn and

02:39:45.140 --> 02:39:53.700
last vpn they'll get you there are ways to to socially to backdoor anything that's all i'm

02:39:53.700 --> 02:40:01.620
saying but look here if i can look that up in chat gpt and it gives me this don't do it

02:40:01.620 --> 02:40:07.300
is a little bit od to me i know that's the thing i've already done it i just don't go there because

02:40:08.180 --> 02:40:11.460
you know i don't need any more trouble and you would not buy anything

02:40:11.460 --> 02:40:18.880
no of course not it's crazy see this accessing the dark web is not illegal in most countries

02:40:18.880 --> 02:40:27.040
but many of the hosts hosted on it are illegal you understand that as a cyber professor use it

02:40:27.040 --> 02:40:35.220
only for research education and monitoring threats so now i don't know i mean i i did not

02:40:35.220 --> 02:40:39.740
i just told you how to do it and i've done it myself and i have no problem going there now

02:40:39.740 --> 02:40:50.190
that's how easy it is okay let's come back okay don't do it sorry that's kind of funny

02:40:50.190 --> 02:40:56.090
there's so much mythology going around it's weird so whenever someone tells you mythology or truth

02:40:56.090 --> 02:41:04.290
search for it instantly that's it that's the lesson okay so we tried a few different in match

02:41:04.290 --> 02:41:10.450
scripts right this was one of the things too you had to do and um hold on i don't need this

02:41:10.450 --> 02:41:16.110
Anymore don't need that don't need this I gave you that and it was a

02:41:20.820 --> 02:41:22.120
NSE

02:41:22.120 --> 02:41:26.200
Yes, vulnerability analysis uses in map NSE, which we just did one

02:41:26.760 --> 02:41:32.900
Nick though Nick though is also something that you could do here. See Nick though

02:41:33.900 --> 02:41:39.660
Tag H 10.0.0 that three that one six. I don't know if that's right

02:41:39.660 --> 02:41:48.680
I think I have to put eight it is right and what that will do is it's gonna scan the IP address for vulnerabilities even further

02:41:50.240 --> 02:41:56.650
Look at this see what it says slash secret. This might be interesting right here

02:41:57.570 --> 02:42:00.450
So what you would do is you'd open up here

02:42:01.310 --> 02:42:03.310
Go to your Firefox

02:42:03.790 --> 02:42:07.790
Type in an IP which remember you supposed to do that earlier myself yourself

02:42:07.790 --> 02:42:23.210
we got that then we put the slash secret and it takes us to a blog page it says wordpress

02:42:23.210 --> 02:42:31.810
then we would have to consider what we would do for that you know maybe you would do a

02:42:31.810 --> 02:42:44.890
search for that a vulnerability scan for that nothing tested or you just got to make sure you

02:42:44.890 --> 02:42:49.450
read all this stuff because the bottom line is there could be something in here start from the

02:42:49.450 --> 02:43:05.000
top nick though what is nick though right let's see uh tldr nick though all right web server

02:43:05.000 --> 02:43:15.760
scanner which performs against web servers for multiple items see how this works and then what's

02:43:15.760 --> 02:43:36.680
cool is um show me how to use nikto with this ip 10.0.3.16 step-by-step guide

02:43:38.760 --> 02:43:52.010
oh there we go 10 000 there you go right there that's the http yeah oh they did it differently

02:43:52.010 --> 02:44:00.330
you can do both scan a port so this is how this works so let me see this is the copy i don't think

02:44:00.330 --> 02:44:05.850
it's going to be different because i like literally did it but let's do it anyway paste

02:44:07.530 --> 02:44:14.730
enter yep same information patchy ubuntu the mf scan kind of gave you all the information anyway

02:44:14.730 --> 02:44:21.050
you can search for all directors with the use taxi all secret might be interesting

02:44:22.010 --> 02:44:26.910
Right and then when you go to that URL, you need to go through everything here

02:44:27.410 --> 02:44:29.410
maybe there's a

02:44:29.510 --> 02:44:31.510
username or something

02:44:31.510 --> 02:44:33.510
maybe there's a

02:44:33.530 --> 02:44:35.790
This that you can right-click and go to

02:44:37.370 --> 02:44:39.370
View the page source

02:44:39.530 --> 02:44:42.370
Wow, there's a whole lot of information in it. I can't see

02:44:44.930 --> 02:44:46.270
Right

02:44:46.270 --> 02:44:51.390
There's information in here that you have to read through it all or put it through some sort of a

02:44:52.010 --> 02:44:59.210
Tool to read it for you. You can leave it once you learn as a wordpress scan. You may even want to do this

02:45:05.510 --> 02:45:14.890
Show me how to use word press scan or WP scan and Kali Linux

02:45:16.070 --> 02:45:18.070
against

02:45:18.070 --> 02:45:31.050
zero three god sixteen everything absolutely wpscan we got it here it is

02:45:33.130 --> 02:45:39.290
that's here's one you can try curl you can curl it or download the content to your local computer

02:45:39.290 --> 02:45:47.610
here's a basic run so i'm gonna try both of these really quickly because remember we are testing

02:45:47.610 --> 02:45:49.610
Everything

02:45:50.390 --> 02:45:52.390
Oh wow script

02:45:54.350 --> 02:45:57.190
Okay, let me hit the up arrow because what I did not do

02:45:58.490 --> 02:46:00.490
Let's try this

02:46:00.490 --> 02:46:02.490
Slash secret

02:46:03.370 --> 02:46:05.370
It's a different URL

02:46:05.630 --> 02:46:09.210
Okay, that's fine. I'm come back over here and get this WP scan

02:46:10.670 --> 02:46:12.670
copy

02:46:12.670 --> 02:46:14.670
Come back here

02:46:14.670 --> 02:46:25.100
right click and I want to paste secret because we know that one right there was a wordpress

02:46:25.100 --> 02:46:31.160
scan now it's going to open up WP scan and it's going to give you more data remember you can use

02:46:31.160 --> 02:46:38.900
us in map or a different type of scan every all through this whole thing anyway anytime you just

02:46:38.900 --> 02:46:46.400
want to understand something and what it does is invaluable that's amazing I actually chatted

02:46:46.400 --> 02:46:52.640
of that i couldn't figure out like it's cali but you use all this other stuff on cali and i'm like

02:46:52.640 --> 02:46:58.080
well why is that so i had to chat that but anyway well here's the goal i'll make it even easier for

02:46:58.080 --> 02:47:05.680
you you come here look at all the reconnaissance tools learn how to use them all learn how to use

02:47:05.680 --> 02:47:11.360
all of them here's a resource development tool learn how to use all of them so and you go in

02:47:11.360 --> 02:47:19.840
reconnaissance and you see these list of comprehensive tools it's really simple web scanning

02:47:20.960 --> 02:47:28.480
vulnerability scanning in map zen map right web scanning you just learn how to use them

02:47:29.360 --> 02:47:41.490
so let me see zen map oh it's it's there 10.0.3.16 error uploading the file okay

02:47:41.490 --> 02:47:50.950
Okay, here it is right there, 10.0.3.16, right?

02:47:51.230 --> 02:47:57.550
Now, there are other types of scans, and 10 scan, it's a whole lot of stuff right here.

02:47:58.090 --> 02:48:00.610
You just choose one, right?

02:48:00.850 --> 02:48:09.110
Here is the command, the TAC T4-A-B for verbose, but I can just scan it.

02:48:09.110 --> 02:48:22.890
it'll give you the same results as you will get when you're running it through Kali.

02:48:24.170 --> 02:48:27.570
But now, there's pretty pictures and stuff like that.

02:48:27.890 --> 02:48:28.670
They highlight.

02:48:28.830 --> 02:48:31.210
It kind of stands out a little bit better than Kali.

02:48:33.280 --> 02:48:35.680
And then you can add whatever.

02:48:35.800 --> 02:48:40.560
You can even look at the topology so you can see the drawing and how stuff works,

02:48:40.560 --> 02:48:44.020
the different posts, ports, and the hosts.

02:48:44.840 --> 02:48:52.100
the host details, the different scans that were done in map output, right? If I want to add stuff

02:48:52.100 --> 02:49:00.840
to it, I want to put the slash secret. Some people like using this because it's a GUI

02:49:00.840 --> 02:49:08.040
and it gives a little bit of color. It highlights a few things and it may give you more information.

02:49:08.160 --> 02:49:14.160
It may give you less. Whatever the case is, you're testing defenses where you're throwing every tool

02:49:14.160 --> 02:49:24.960
you know how to throw at it pen testing today is much easier because of chat gpt right look

02:49:24.960 --> 02:49:32.740
brute force login if permitted so you can actually log in to the w and you can actually

02:49:32.740 --> 02:49:39.620
hack your way all the way into it if you knew the admin if you knew the passwords on rocku.txt

02:49:39.620 --> 02:49:49.360
if it were permitted this is what makes pen testing really fun really cool and then you can

02:49:49.360 --> 02:49:51.660
scan, you can

02:49:51.660 --> 02:49:54.240
print this, all a bunch of different

02:49:54.240 --> 02:49:56.040
tools, create a profile,

02:49:56.560 --> 02:49:57.820
you can review it again.

02:49:58.900 --> 02:50:00.280
I'm just going to quit this for now.

02:50:01.780 --> 02:50:02.420
Unsaved

02:50:02.420 --> 02:50:03.580
thing, close anyway.

02:50:04.960 --> 02:50:06.400
And you can do that on any

02:50:06.400 --> 02:50:09.230
system. Okay.

02:50:10.170 --> 02:50:11.130
What's next?

02:50:11.910 --> 02:50:13.030
That's way better.

02:50:13.290 --> 02:50:15.010
Like the dots connected.

02:50:15.630 --> 02:50:16.050
Yay!

02:50:17.770 --> 02:50:30.480
What's next? Console.

02:50:32.720 --> 02:50:36.720
msf console mss console enter

02:50:38.800 --> 02:50:48.940
right by the way on this right side i'm going to right click this right

02:50:49.500 --> 02:50:54.300
and i'm going to close the sub terminal just so things can look a little bit bigger bigger

02:50:56.940 --> 02:51:05.020
now that's my msf console look at how many exploits there are yeah a lot a lot of auxiliaries

02:51:05.020 --> 02:51:07.340
post 432

02:51:07.340 --> 02:51:10.060
Will you explain that?

02:51:10.420 --> 02:51:12.700
Sure. Look at how many exploits there are.

02:51:14.160 --> 02:51:15.760
There are a lot of auxiliaries.

02:51:16.520 --> 02:51:17.300
What does that mean?

02:51:17.380 --> 02:51:18.580
Auxiliary exploits.

02:51:20.060 --> 02:51:23.200
Other things you can do. There's post-exploitation

02:51:23.200 --> 02:51:26.320
stuff right here, right? So here we go. Look. Let's do this too.

02:51:27.220 --> 02:51:28.220
Rinse cream.

02:51:30.320 --> 02:51:32.040
Let's get it.

02:51:32.760 --> 02:51:40.360
Because we always, even if I explain it perfectly, explain this to me.

02:51:44.840 --> 02:51:46.240
And that's just a portion of it.

02:51:46.720 --> 02:51:49.380
I'm presuming it's going to know it's a meta-sploit, and it does.

02:51:49.840 --> 02:51:52.100
It's the startup banner, right?

02:51:52.360 --> 02:51:54.520
Which gives you a different picture every time you open it up.

02:51:55.140 --> 02:51:57.140
It's telling you to break down, right?

02:51:58.220 --> 02:51:59.320
Mobile counts.

02:51:59.920 --> 02:52:01.140
Look at how many exploits.

02:52:01.880 --> 02:52:03.500
Ready to use the tax scripts.

02:52:04.980 --> 02:52:05.460
Okay?

02:52:05.820 --> 02:52:13.260
what that one then you have non-exploit modules scanners fuzzers and sniffers nice

02:52:15.100 --> 02:52:18.220
post exploitation modules after you gain access

02:52:22.120 --> 02:52:26.680
okay different payloads codes that run after the ex after that after the tar

02:52:26.680 --> 02:52:38.580
on the target after exploiting it 49 encoders knob generators used in buffer overflow attacks

02:52:40.420 --> 02:52:47.540
evasion attacks help you evade these different um the software the edr is the endpoint detection

02:52:47.540 --> 02:52:54.100
recovery response tools or the firewalls this is a newer feature in metasploit version 6 plus

02:52:54.660 --> 02:53:02.200
there's a documentation and because i do this for my fellows all the time it keeps telling me what

02:53:02.200 --> 02:53:11.640
to teach my fellow i've trained my chat gpt to be a my assistant because i get

02:53:11.640 --> 02:53:17.480
questions like this all the time and i show them that i already showed you how to solve that

02:53:17.480 --> 02:53:23.640
find the answer to that question and then uh so i tell them i'm i politely have them show me what

02:53:23.640 --> 02:53:29.880
to do or i make them do it while i'm watching and then i'm saying there's your answer well

02:53:29.880 --> 02:53:34.520
the reason why you have to do that is because in the workplace the boss is not there to help you

02:53:35.480 --> 02:53:43.080
right what do i do next so now we're gonna uh search that back door through the mfs console

02:53:43.080 --> 02:53:53.560
so we're gonna enter the uh pro ftpd and then in the series 1.3.3 small c and enter

02:53:54.280 --> 02:54:04.810
i must have typed something wrong what i do ah did you see what i did wrong no

02:54:04.810 --> 02:54:09.390
I'll hear you. Yes, I did. Okay

02:54:11.470 --> 02:54:12.470
Excellent

02:54:12.470 --> 02:54:14.470
Yes

02:54:14.470 --> 02:54:16.470
Excellent, which is terrible

02:54:17.690 --> 02:54:19.690
We're gonna use the ethernet

02:54:20.330 --> 02:54:26.490
We're gonna use the zero. Okay. Well look at this. Look at this. You can also do info zero

02:54:27.710 --> 02:54:29.710
use zero

02:54:29.710 --> 02:54:31.710
or use exploit

02:54:31.710 --> 02:54:34.310
that whole script there.

02:54:36.190 --> 02:54:38.430
So there are options. That's why we read, right?

02:54:38.510 --> 02:54:39.550
So we're going to use zero.

02:54:41.980 --> 02:54:44.160
Will I get a different output

02:54:44.160 --> 02:54:45.500
using the other one?

02:54:45.720 --> 02:54:46.700
It'll be the same output.

02:54:47.500 --> 02:54:48.020
Okay.

02:54:49.020 --> 02:54:51.360
Now we're going to type in options.

02:54:52.100 --> 02:54:52.580
Enter.

02:54:54.340 --> 02:54:54.860
Okay.

02:54:55.720 --> 02:54:58.020
Now we're going to reset.

02:54:58.320 --> 02:54:59.140
The R has to be required.

02:54:59.140 --> 02:55:01.060
Now we're going to set the R host.

02:55:01.280 --> 02:55:03.320
And you see these are not required, right?

02:55:03.340 --> 02:55:11.660
yeah yeah automatic that's important to know you can also do info or info tag

02:55:11.660 --> 02:55:21.700
D okay I'm sorry what am I typing we're gonna type set space capital our host

02:55:21.700 --> 02:55:29.880
R-H-O-S-T space the target IP 10.0.3.16.

02:55:30.140 --> 02:55:30.520
Enter.

02:55:31.400 --> 02:55:32.420
All right, it's set.

02:55:33.480 --> 02:55:38.420
Then we're going to type show payloads, two words, show space payloads.

02:55:39.080 --> 02:55:40.820
Because there's various payloads.

02:55:40.840 --> 02:55:42.160
In fact, there are nine of them.

02:55:42.780 --> 02:55:43.860
There's nine of them.

02:55:44.000 --> 02:55:44.200
Right?

02:55:44.280 --> 02:55:46.080
It says eight, but it starts with zero.

02:55:49.480 --> 02:55:49.800
Yeah.

02:55:49.800 --> 02:56:02.200
And we're going to choose, we're going to set payload fourth, or you're going to type SET space payload, small, small case as well, space, the number four.

02:56:03.340 --> 02:56:12.940
Now, when other people talk ports in the college environment, nobody talks about port zero.

02:56:12.940 --> 02:56:19.060
You're the first man in my life that said 65,536.

02:56:19.540 --> 02:56:20.020
Yes.

02:56:20.220 --> 02:56:21.380
So look at this.

02:56:22.160 --> 02:56:25.720
And I believe you, but why doesn't anybody else point that out?

02:56:25.840 --> 02:56:26.520
Because they don't know.

02:56:28.290 --> 02:56:31.050
Or they didn't investigate it and do deep research.

02:56:31.510 --> 02:56:33.670
So let me show you because I can show and tell you.

02:56:34.590 --> 02:56:35.470
Here's Wikipedia.

02:56:38.100 --> 02:56:39.900
These are the well-known ports.

02:56:40.300 --> 02:56:41.720
What port number does it start with?

02:56:44.400 --> 02:56:45.660
Computers start with zeros.

02:56:45.940 --> 02:56:47.740
Binary is zeros and ones.

02:56:47.900 --> 02:56:53.680
yeah we should always start with one well if i keep scrolling down it's a long way to go so let

02:56:53.680 --> 02:57:13.610
me get there what's the top number 65,535 there is no 65,535 exactly which makes 65,536 ports

02:57:13.610 --> 02:57:21.770
it's semantics but it's very literal do ports change is this set in stone

02:57:22.490 --> 02:57:28.710
I mean, will ports ever change or will more ports be added and ports taken away?

02:57:28.830 --> 02:57:32.610
Or is this the way the grid lies for life?

02:57:32.950 --> 02:57:34.510
Okay, let me answer the question.

02:57:35.910 --> 02:57:37.250
Can ports change?

02:57:37.390 --> 02:57:37.910
They can.

02:57:38.170 --> 02:57:38.670
Do they?

02:57:39.030 --> 02:57:39.870
Probably not.

02:57:40.310 --> 02:57:44.230
They add more than a little bit, but there are a lot of sections.

02:57:44.450 --> 02:57:45.410
They're well-known ports.

02:57:47.090 --> 02:57:50.170
Let me scroll down to the next section so you see what they're called.

02:57:50.170 --> 02:58:01.290
well-known ports are up to 1028 1023 excuse me then there's registered ports which is 1024

02:58:01.290 --> 02:58:11.870
on up within some of these ports there are unofficial ports so who knows what people can

02:58:11.870 --> 02:58:19.340
do hackers can hide within all that stuff some of them are blank see how that works

02:58:19.340 --> 02:58:29.700
hold on let me get down there people can use this stuff to do whatever most companies though

02:58:29.700 --> 02:58:51.300
will get assigned a port okay then you have the dynamic private or ephemeral ports you see the

02:58:51.300 --> 02:58:59.300
range contains dynamic or ever-changing or private ports that cannot be registered with

02:58:59.300 --> 02:59:10.260
ayana everything stems from ayana is a process so those ports can get swapped then those those

02:59:10.260 --> 02:59:16.740
private ports yes they can yes and bad guys hide well within them see you have a legend over here

02:59:18.340 --> 02:59:24.900
can billionaires own their own port i don't see why not because uh you got the money you can do

02:59:24.900 --> 02:59:37.640
anything you want and if you go to um i think it's ayana.com you can learn more about how ip addresses

02:59:37.640 --> 02:59:47.800
and protocol registries are assigned and this thing is a money thing you got the money do whatever you

02:59:47.800 --> 03:00:00.710
one of them figures yeah so and this is a long list but i'm hopeful that you um got something

03:00:00.710 --> 03:00:15.760
oh let me go in here you've heard all these right so in the u.s users aaron

03:00:17.760 --> 03:00:27.520
the um you know asia right go to africa afrnic ayana assigns the regions they're the regions that

03:00:27.520 --> 03:00:33.840
assign the ip addresses to those regions so when i used to go overseas and i went in say asia

03:00:34.720 --> 03:00:39.600
i needed to know the ip ranges that were there so i can spot the anomalies

03:00:42.320 --> 03:00:52.800
you know so everything you do should be research based not just hearsay based you must

03:00:52.800 --> 03:00:59.580
a thorough pen tester must do the research on everything right hold on a second look at this

03:00:59.580 --> 03:01:16.160
right here did you see my question this was one of the most powerful widely used exploitation there

03:01:16.160 --> 03:01:22.460
are several excellent alternatives did you know of these alternatives I know about cobalt strike

03:01:22.460 --> 03:01:25.760
and maybe that's it.

03:01:26.720 --> 03:01:27.740
So here we go.

03:01:28.400 --> 03:01:28.740
Beef.

03:01:30.280 --> 03:01:30.720
Right?

03:01:31.400 --> 03:01:33.020
Let me show you about beef real quick.

03:01:35.000 --> 03:01:47.760
How to hack web browsers with beef.

03:01:49.900 --> 03:01:52.040
This is my whole step-by-step

03:01:52.040 --> 03:01:53.820
how I hacked into a web browser with beef.

03:01:55.260 --> 03:01:57.280
And I showed the students how to do it.

03:01:58.020 --> 03:01:59.640
How long do you think it took me?

03:02:01.400 --> 03:02:04.220
10 minutes.

03:02:04.220 --> 03:02:10.160
didn't take long but when we went into beef they loved it because they were like i'll say just play

03:02:10.160 --> 03:02:15.160
around with it do some stuff but look at all these different things that exist out there

03:02:15.160 --> 03:02:27.410
kobold strike does cost money they're powerful empire power shell empire so hold on let me see

03:02:27.410 --> 03:02:34.010
i think that's have you ever tried nasa yeah i use it in my house

03:02:34.010 --> 03:02:41.330
so hold on so that's a good one now that now that's for vulnerability scans though so

03:02:41.330 --> 03:02:52.110
yes so all you got to do is say um show me how to use nessus to scan my home network

03:02:52.110 --> 03:03:02.320
the industry wants people to know how to do stuff so all you got to do is look for the how to do

03:03:02.320 --> 03:03:15.580
stuff step by step bang that's the essentials this install it right what we got seven steps and

03:03:15.580 --> 03:03:22.500
we're done it doesn't take long to do cyber the thing is you just have a million different tasks

03:03:22.500 --> 03:03:30.640
to do that's what overwhelms us where do i start you just need the right mentor everybody needs the

03:03:30.640 --> 03:03:37.200
right mentor when i learned this stuff in school i didn't have the right mentors they were really

03:03:37.200 --> 03:03:42.700
intelligent and i thought they were smart but they didn't show me how i'm showing you they said read

03:03:42.700 --> 03:03:47.040
this book and write a paper yeah because what's happening is all these people are coming out of

03:03:47.040 --> 03:03:54.060
fort gordon with all these hardware skills and so like if i want to learn anything i have to join

03:03:54.060 --> 03:04:00.620
hacker groups and i'm a little bit leery joining these hacker groups because they take my part

03:04:00.620 --> 03:04:07.440
and they disassemble them right in front of me and they're not always right when i like doubt

03:04:07.440 --> 03:04:15.220
myself you know because i have the least amount of information i feel i've been right like 80

03:04:15.220 --> 03:04:23.140
of the time against these guys so now i'm just referring to chat so i understand uh you know

03:04:23.140 --> 03:04:28.440
there's a lot of people pretending they know what's going on out there and um i just gotta

03:04:28.440 --> 03:04:36.840
blaze my own trail and not get stuck on tools that i've only been exposed to and if you need help with

03:04:36.840 --> 03:04:43.520
some stuff just let me know thank you but you're gonna get sucked away into some fabulous job and

03:04:43.520 --> 03:04:48.960
what is gonna happen to your students and your curriculum now so so you probably can't answer

03:04:48.960 --> 03:04:55.880
but just in general no i can't look when i was work when i was working as a sizzle i was doing

03:04:55.880 --> 03:05:02.120
the same thing i just didn't i had a day job i did a sock cyber in the evening on two days and

03:05:02.120 --> 03:05:08.840
thursday the team meeting two hours teach college on mondays and wednesdays play piano and organ

03:05:08.840 --> 03:05:14.680
for my church and teach the choir i'm saying martial arts instructor and i work out when i can

03:05:14.680 --> 03:05:20.600
and i'm a disabled veteran and i work in the government uh law enforcement and that's how i live

03:05:21.560 --> 03:05:28.680
seven jobs well not seven jobs but i have about i have a lot of means of income

03:05:29.720 --> 03:05:37.400
yes now that's great i just need one to pay my bills i don't live off of my training money

03:05:37.400 --> 03:05:43.320
that i make from my side business i'm not trying to work i'm not worried about money

03:05:43.320 --> 03:05:47.640
i want to get contracts so that i can change people's lives because i feel i can teach it

03:05:47.640 --> 03:05:53.320
better i wish there was a place to go where we can learn instead of the virtual like uh i mean

03:05:53.320 --> 03:05:59.320
it's always going to be virtual but i mean i wish there was an actual campus or somewhere we could

03:05:59.320 --> 03:06:05.080
actually just study cali lennox for five months straight and all the things that it can do

03:06:05.960 --> 03:06:10.680
and that's really not that it's funny you say that because that's what i do with my business

03:06:10.680 --> 03:06:21.160
they study it here but um yeah you you can't have if you have 10 000 different things in

03:06:21.160 --> 03:06:28.360
cyber security to study how do you know which one to study because cali linux hold on let me show you

03:06:28.360 --> 03:06:46.070
this let me show you this if you think cali linux is awesome you have not been around yet see this

03:06:46.070 --> 03:06:54.710
right here you already know about parrot black arch linux is advanced we still messing with the

03:06:54.710 --> 03:07:05.460
lightweight stuff you want some tools go to black arch linux and here's some other alternatives

03:07:05.460 --> 03:07:17.100
and download that 2800 hacking tools you see that right there yes put cali linux is like

03:07:17.100 --> 03:07:26.140
what the average person uses you want to take it to another level get yourself a black box

03:07:26.140 --> 03:07:32.460
linux black art clinic and now that the commands are going to be pac-man instead of apt

03:07:33.020 --> 03:07:40.460
where you're doing installs yeah that's the hard part but with chat you can do it

03:07:40.460 --> 03:07:49.480
and it's cleave focus less beginner friendly so as advanced but you will look at this a serious

03:07:49.480 --> 03:08:02.020
retina not not not the average joe okay so black watch black arch linux will smoke cow smoke

03:08:02.020 --> 03:08:08.680
parrot security you want to get some serious pen testing skill get that black arch and i'm talking

03:08:08.680 --> 03:08:13.000
you can put i used to have it in here i just don't use it that much but now that i'm talking

03:08:13.000 --> 03:08:25.560
about i just very well may just install it again and that is a simple download there you go right

03:08:25.560 --> 03:08:35.560
there huge learning curve there you go all right i'm doing that today along with all my other

03:08:35.560 --> 03:08:42.280
follow up so i can remember the section that we've had um we said payload four

03:08:44.840 --> 03:08:59.110
set payload four and then we're going to type in options enter then we're going to set the l host

03:08:59.110 --> 03:09:10.680
so that's a yeah and the ip address enter and we're going to run it running enter

03:09:12.280 --> 03:09:17.800
and then to check our work we're gonna do who am i you see what's happening it's sending the back

03:09:17.800 --> 03:09:27.220
door and it's accepted the first client connection except that the second client connection

03:09:27.860 --> 03:09:36.260
is echoing this particular hash is writing a socket a and b and then it's establishing that

03:09:36.260 --> 03:09:46.240
connection and is matching a is the input socket a command shell session one is open so that the cli

03:09:46.240 --> 03:09:56.920
is open and like you said who am i oh my god i root right cd to slash root bad guy and you decide

03:09:56.920 --> 03:10:01.580
what kind of malware you're going to inflict on the network if you're the bad guy but you're

03:10:01.580 --> 03:10:08.320
the pen testing guy. So now you're going to cover your investigation with a full throttle report

03:10:08.320 --> 03:10:13.180
and send it to your people who hired you. And that's your only job. You're done, right?

03:10:13.540 --> 03:10:19.380
So hold on. There's more. This is a great question. So sometimes pen testers will leave

03:10:19.380 --> 03:10:31.220
their mark. Let me show you this right here. Okay. You see this right here? Northbridge

03:10:31.220 --> 03:10:40.920
literacy project yes okay this is the capstone that i gave to my students in alabama and i had

03:10:40.920 --> 03:10:46.680
them create a red and blue team and i separated them and said you're going to attack and you're

03:10:46.680 --> 03:10:53.140
going to defend and you're going to create a video about it what happened was i'm just going to the

03:10:53.140 --> 03:11:02.500
bottom. Did you guys use Cousteau to identify the vector? Do who? Cousteau. No, but see this right

03:11:02.500 --> 03:11:09.680
here? Yeah. What's this say? Change directory to West was here. I had them create a directory to

03:11:09.680 --> 03:11:15.600
show that they were successful in attacking. That's all I had to do. No malware, no nothing,

03:11:15.600 --> 03:11:18.060
because this is for educational purposes.

03:11:18.900 --> 03:11:19.460
Absolutely.

03:11:19.880 --> 03:11:20.780
But I had them.

03:11:21.480 --> 03:11:23.160
If they were successful,

03:11:23.440 --> 03:11:25.140
that's what they were supposed to do.

03:11:25.220 --> 03:11:26.820
Look at all the payloads and stuff we did.

03:11:28.160 --> 03:11:28.360
Right?

03:11:31.100 --> 03:11:32.220
In summary,

03:11:36.900 --> 03:11:38.220
what level of student

03:11:38.220 --> 03:11:41.280
is getting to perform those types of challenges?

03:11:41.280 --> 03:11:44.460
I just met these people in January

03:11:44.460 --> 03:11:45.600
and by April,

03:11:46.000 --> 03:11:47.020
they were getting jobs

03:11:47.020 --> 03:11:47.960
and they were all beginners.

03:11:48.940 --> 03:11:49.380
Unbelievable.

03:11:50.880 --> 03:11:52.880
I'm telling you, it doesn't take long with me.

03:11:53.280 --> 03:11:55.660
I show people all kind of do all this stuff.

03:11:55.760 --> 03:11:58.120
Okay, I'm going to show you this.

03:11:58.480 --> 03:11:59.720
I think it's kind of cool.

03:12:00.520 --> 03:12:02.000
Projects, projects, projects.

03:12:02.420 --> 03:12:04.680
This is the video here.

03:12:05.580 --> 03:12:08.620
They actually created this red-blue team demo.

03:12:10.140 --> 03:12:12.520
This is the first fellowship I taught in Alabama.

03:12:13.800 --> 03:12:16.700
They created 11 virtuals and see the expectations.

03:12:16.700 --> 03:12:45.210
In this video. Let me see if I can play it. I don't know if it's still active. I actually wanted to show you something in here. Let's see. Okay. I'm not able to play it. That's frustrating.

03:12:45.210 --> 03:12:50.970
In this video, though, I had them because I'm it's all about proof of work.

03:12:51.910 --> 03:12:55.670
I have a thousand people have told me they know how to do something.

03:12:56.170 --> 03:12:59.950
And I'm like this. I don't believe you until you show me.

03:13:01.090 --> 03:13:05.130
Right. Keep that in mind, because people will be nice to you.

03:13:05.250 --> 03:13:08.930
Oh, OK. But they really don't know and they don't believe you.

03:13:09.050 --> 03:13:13.370
They don't know for sure. That's why we create proof of work.

03:13:13.370 --> 03:13:24.710
cybersecurity portfolio, screenshots. That's me. So that people can see that I'm really the guy

03:13:24.710 --> 03:13:36.110
doing this stuff. That makes you a believer. In that video, I had Amari and I can't think of her

03:13:36.110 --> 03:13:40.570
name, but I had them put their pictures in the corner while they were speaking and demonstrating.

03:13:40.570 --> 03:13:52.510
Then we posted it to the executives of the Alabama Cybersecurity Fellowship, the CEO here and the whole the university people.

03:13:53.270 --> 03:14:02.050
When they did that. They said. Oh, my God, they really did it.

03:14:02.050 --> 03:14:08.310
why were they also oh my god in shock because that school was having students do powerpoints

03:14:08.310 --> 03:14:14.170
those are the corniest powerpoints i've ever seen in my life they had no steps in it there

03:14:14.170 --> 03:14:19.890
was nothing in them to them they they were like less than i i would never present that to an

03:14:19.890 --> 03:14:27.410
employer this video they could actually present to an employer that's a picture this video they

03:14:27.410 --> 03:14:28.950
can actually present to an employer.

03:14:30.410 --> 03:14:34.360
There it is.

03:14:35.180 --> 03:14:36.480
They can present it

03:14:36.480 --> 03:14:37.200
to an employer.

03:14:39.100 --> 03:14:39.860
You see the picture?

03:14:40.540 --> 03:14:41.240
That's Stephanie.

03:14:42.160 --> 03:14:44.260
Stephanie was a librarian when I met her.

03:14:45.640 --> 03:14:46.380
She's now

03:14:46.380 --> 03:14:48.500
a cybersecurity specialist

03:14:48.500 --> 03:14:50.680
in the hospital

03:14:50.680 --> 03:14:51.740
in Alabama.

03:14:54.490 --> 03:14:56.610
Amari got offered a job in Alabama.

03:14:57.610 --> 03:14:58.510
He's a pen tester.

03:15:00.090 --> 03:15:00.610
Where did you learn

03:15:00.610 --> 03:15:02.250
pen testing, Amari, Dr. Phillips?

03:15:02.270 --> 03:15:04.770
How long have you been in my studio, Mark?

03:15:04.770 --> 03:15:12.230
Three months.

03:15:12.230 --> 03:15:13.730
I know her name, Michelle.

03:15:13.730 --> 03:15:14.950
I'm not Michelle.

03:15:14.950 --> 03:15:19.910
Bridget, she has a job working in a school.

03:15:19.910 --> 03:15:24.090
McHale, that's it.

03:15:24.090 --> 03:15:25.030
I know her name.

03:15:25.030 --> 03:15:33.600
All I'm saying is, this Landon, I love Landon.

03:15:33.600 --> 03:15:38.710
That's the day beyond.

03:15:38.710 --> 03:15:42.920
That's the other Landon.

03:15:42.920 --> 03:15:46.460
All I'm saying is, from the beginning,

03:15:46.460 --> 03:15:50.800
I have them creating projects that they can show employers.

03:15:51.720 --> 03:15:53.320
Now, I hate being on LinkedIn.

03:15:53.620 --> 03:15:54.520
I detest it.

03:15:54.940 --> 03:15:56.620
But it's the only way to get a job.

03:15:57.140 --> 03:16:02.280
I have a Facebook account only for my business because I don't do anything on it.

03:16:02.280 --> 03:16:04.000
I don't want people coming after me.

03:16:05.060 --> 03:16:08.160
When I started my company full-time, this is what I did.

03:16:08.480 --> 03:16:09.160
Who would have thought?

03:16:09.300 --> 03:16:12.680
In the past two months, I've gotten 16 contracts.

03:16:12.820 --> 03:16:13.860
I can't believe it.

03:16:14.680 --> 03:16:15.700
I'm in shock and awe.

03:16:15.700 --> 03:16:21.060
i'm working with um politicians i'm working with the mayor in the state i told the mayor what he

03:16:21.060 --> 03:16:26.020
could do to make the county safe and he's looking at me like this well i'm trying to meet with the

03:16:26.020 --> 03:16:33.460
mayor next week of our county and get him to help me clean up medical billing because cyber identity

03:16:33.460 --> 03:16:40.420
theft 30 comes from medical bill processing where they ask you to put your credit card number on

03:16:40.420 --> 03:16:47.620
the bill and mail it back for your image all because you needed to get imaged anyway so we'll

03:16:47.620 --> 03:16:53.300
see where the mayor stands on it but that's my project to clean up medical billing good on you

03:16:53.300 --> 03:16:59.380
go ahead and do it need help let me know maybe i can help who knows these are my interns that work

03:16:59.380 --> 03:17:04.580
with me for the summer the work they did was fantastic but anyway that's just the article i

03:17:04.580 --> 03:17:16.410
just showing you um we made it into the machine you know how to do it that excites me i would um

03:17:17.370 --> 03:17:29.530
maybe can i give you homework okay um try basic pen testing too when if you have a question ask

03:17:29.530 --> 03:17:38.890
chat gpt absolutely now in that one you're going to learn how to actually um you're going to be

03:17:38.890 --> 03:17:47.130
using i think john the ripper so that you can actually um brute force some passwords you're

03:17:47.130 --> 03:18:02.700
also going to do ssh this particular website i'm going to give it to you will teach you a lot about

03:18:02.700 --> 03:18:12.140
ssh and how to actually pin test into with the ssh command into a url or server

03:18:13.820 --> 03:18:27.850
i demonstrated it yesterday all it is we have 34 different levels 33 it is fantastic

03:18:27.850 --> 03:18:37.350
hands-on stuff that you can do right from your kali machine so when i type in ssh

03:18:39.030 --> 03:18:40.630
Oh, let me see, SSH.

03:18:41.470 --> 03:18:43.210
I've already done it many times.

03:18:44.950 --> 03:18:46.570
You just follow the steps.

03:18:48.010 --> 03:18:52.250
Bandit zero, you got to read, will get you in.

03:18:53.470 --> 03:18:56.350
Do a list, you're going to cat the readme.

03:18:57.730 --> 03:19:01.050
This is the password to the next level.

03:19:01.890 --> 03:19:03.670
You write it in your notes, you copy it.

03:19:04.270 --> 03:19:06.430
You're going to learn how to exit out of this.

03:19:06.430 --> 03:19:16.290
you hit the up arrow control a you're gonna change the zero to a one press enter you're

03:19:16.290 --> 03:19:28.280
gonna paste that password and yes now you're in who am i your bandit one this was bandit zero

03:19:28.280 --> 03:19:34.720
before you remember seeing that right and then what you do from there is you learn what's going

03:19:34.720 --> 03:19:41.880
on? You have a dash there. How do you open that? You have to screenshot all this or you search for

03:19:41.880 --> 03:19:49.680
it. How do you open the dash? And then from there, that's the password to level two.

03:19:52.840 --> 03:19:59.880
It gets more difficult. You have questions or issues because you're struggling with it.

03:19:59.880 --> 03:20:09.020
you have my phone number right um thank you and you can always call me ask me questions

03:20:09.020 --> 03:20:15.400
because i want to make sure that especially if you've been in my class or if i'm teaching you

03:20:15.400 --> 03:20:21.000
something i want to make sure that you have access to me for when you need to do something

03:20:21.000 --> 03:20:26.900
else there's another wire shark command but the cool thing about this and pico ctf

03:20:26.900 --> 03:20:37.060
you have years of um these are years i've been doing this thing i would put it like this i was

03:20:37.060 --> 03:20:45.020
doing pico ctf since like 2017 they didn't have this website back then don't know how i found it

03:20:45.020 --> 03:20:50.360
i just know it was a huge blessing and um and now we have 2025

03:20:50.360 --> 03:21:04.260
five. And there are tons of different challenges. Yes. So, oh, excuse me. I'll take that out.

03:21:04.260 --> 03:21:09.460
The one I can find. And these are all things that you can just click on,

03:21:11.650 --> 03:21:32.650
read the challenge and then work it with the hints and then work it. No one ever gives you

03:21:32.650 --> 03:21:39.710
all the information you need i got the true i got the hiccups all of a sudden bless you

03:21:39.710 --> 03:21:48.370
thank you you'll be fine i'm trying to hold my breath okay what questions do you have what do

03:21:48.370 --> 03:21:58.940
you want to do next yes i'm gonna hang out and do the uh basic pen testing too on the desktop

03:21:58.940 --> 03:22:04.280
just for the heck of it because it's gonna be available okay so go ahead you want me i'm gonna

03:22:04.280 --> 03:22:06.400
hang out right here and watch if you need. I'm here to five

03:22:06.400 --> 03:22:07.460
or however long you need me.

03:22:08.540 --> 03:22:11.820
You don't really need to hang out.

03:22:12.120 --> 03:22:14.400
I can just bash it out. I'm not

03:22:14.400 --> 03:22:16.440
scared unless you want

03:22:16.440 --> 03:22:16.680
to.

03:22:18.680 --> 03:22:20.220
I feel great.

03:22:20.220 --> 03:22:22.300
I just have a lot more work to do.

03:22:23.740 --> 03:22:29.260
I don't really have

03:22:29.260 --> 03:22:30.000
questions.

03:22:31.080 --> 03:22:33.100
I'm probably

03:22:33.100 --> 03:22:34.540
going to work out,

03:22:35.500 --> 03:22:37.120
but I'll be right here

03:22:37.120 --> 03:22:40.380
and I'll also be on the cell phone.

03:22:42.080 --> 03:22:43.820
I'm going to leave my computer up,

03:22:43.960 --> 03:22:46.060
but I'm going to walk to my basement and work out.

03:22:47.000 --> 03:22:47.400
Yeah.

03:22:47.660 --> 03:22:50.040
So if you have a question, you call me on the cell phone,

03:22:50.120 --> 03:22:51.240
I'll run right back up.

03:22:52.020 --> 03:22:52.780
Don't worry.

03:22:52.920 --> 03:22:53.240
Is that good?

03:22:53.240 --> 03:22:54.300
Have a great workout.

03:22:55.300 --> 03:23:01.160
Can you just remind me where I look for the basic pen testing too?

03:23:01.520 --> 03:23:01.760
Okay.

03:23:02.060 --> 03:23:03.300
Where would I find that?

03:23:03.640 --> 03:23:06.180
Go into your – click on the desktop.

03:23:06.180 --> 03:23:26.550
I'm looking at it right now and I just clicked on interactive so you should be

03:23:26.550 --> 03:23:51.750
able to use it I see you oh I gotta I gotta share all over again I see you in

03:23:51.750 --> 03:24:01.860
desktop so where do I find it let me stop sharing my screen or what you're

03:24:01.860 --> 03:24:10.530
on it you're on it I can see the instructions well just look on um click

03:24:10.530 --> 03:24:25.360
on your virtual box right there oh closed Pico CTF go back click that X

03:24:25.360 --> 03:24:31.940
right there okay there's basic pen test too now you you already got it

03:24:32.120 --> 03:24:38.290
You already downloaded it, so go to your terminal,

03:24:38.290 --> 03:24:41.770
that terminal right up there on the right, yep,

03:24:41.770 --> 03:24:48.890
and type in Change Directory to Downloads,

03:24:48.890 --> 03:24:54.340
capital D, CD space capital D-O-W.

03:24:55.960 --> 03:24:58.980
CD means Change Directory.

03:24:58.980 --> 03:25:00.040
Change Directory capital D.

03:25:00.040 --> 03:25:03.320
And then type the word Downloads.

03:25:03.320 --> 03:25:04.480
C-O-W.

03:25:04.480 --> 03:25:08.540
And hit the tab key, it'll autofill, enter.

03:25:09.540 --> 03:25:16.270
Type LS, and there is your basic pen test too.

03:25:16.270 --> 03:25:18.730
Now you need to unzip that,

03:25:18.730 --> 03:25:23.150
and we type those instructions in the chat GPT,

03:25:23.150 --> 03:25:24.070
how to unzip it.

03:25:25.270 --> 03:25:26.410
Yes.

03:25:26.410 --> 03:25:28.630
Go ahead and unzip it if you need help.

03:25:28.630 --> 03:25:32.290
I'm here.

03:25:32.290 --> 03:25:34.690
Yeah, can we just unzip it?

03:25:34.690 --> 03:25:38.340
Yeah, how do you go?

03:25:38.340 --> 03:25:39.900
I have so many, I can't even,

03:25:39.900 --> 03:25:41.620
I don't even know where my chat went.

03:25:41.620 --> 03:25:43.220
I've chatted so many things.

03:25:43.220 --> 03:25:45.060
I know, right?

03:25:45.060 --> 03:26:13.510
I do TACX and then copy the file.

03:26:15.810 --> 03:26:16.330
No.

03:26:17.510 --> 03:26:23.970
I do T-A-R TACXZF in the file name.

03:26:26.200 --> 03:26:26.980
How does that sound?

03:26:27.220 --> 03:26:27.900
Sounds good.

03:26:28.160 --> 03:26:29.540
I just want to see what you're going to do.

03:26:30.840 --> 03:26:32.560
Because here's the thing.

03:26:32.920 --> 03:26:34.720
There's so much to learn in failure.

03:26:35.800 --> 03:26:36.720
Yeah, I know.

03:26:36.720 --> 03:26:42.920
And I want to see if you're going to fail in in in the cry or fail and keep it moving

03:26:43.860 --> 03:26:45.860
I probably won't cry. I'll keep it moving

03:26:48.300 --> 03:26:52.380
Then I'm just gonna copy this file the top one with the Tar Z

03:26:53.200 --> 03:26:56.580
That GV

03:26:56.580 --> 03:26:58.580
Just go ahead and do it

03:26:58.580 --> 03:27:04.440
Do the bottom one basic pen test in two don't do the second one because it's just downloads twice. Oh

03:27:04.440 --> 03:27:19.180
look oh no no no no no no don't copy that type type bas tab and don't forget to put the dot the

03:27:19.180 --> 03:27:30.290
tar to put the parentheses one oh look at it look at look at the red put the period no no backspace

03:27:30.290 --> 03:27:50.020
backspace you don't want that one put the period hit the hit the tab key press enter no something

03:27:50.020 --> 03:28:03.320
is happening okay now do a list ls what happened it extracted that information and made it into

03:28:03.320 --> 03:28:13.240
an ova file see it said basic pen testing to ova okay now i want you to remove the other one so type

03:28:13.240 --> 03:28:24.360
rm space put the uh quotation mark or whatever though so it's a single quote not a double quote

03:28:25.880 --> 03:28:52.860
Press the tab key, put the 2, hit the tab key, hit the parentheses, hit the tab key, press enter, do a LS, cleaning it up.

03:28:54.180 --> 03:28:54.660
See that?

03:28:55.740 --> 03:29:00.740
Now, go to your VirtualBox.

03:29:01.200 --> 03:29:12.180
Go ahead and type VirtualBox in the Dragon.

03:29:21.000 --> 03:29:32.250
okay click on file uh import appliance okay go click on the yellow envelope on the right

03:29:37.780 --> 03:29:47.220
okay i need you to get to downloads go to downloads underneath basic pen test 2 double click it click

03:29:47.220 --> 03:30:12.100
on finish it is important importing the appliance is that eight percent seven oh wow look at that

03:30:12.100 --> 03:30:34.090
go ahead and start basic pen test too hold on click on um change network settings okay oh

03:30:34.650 --> 03:30:43.700
it's on change host only adapter um yeah change the bridge let's see what happens

03:30:44.740 --> 03:30:55.800
and then joe promiscuous mode change deny to allow bms now click okay

03:31:01.320 --> 03:31:11.580
put that orange x and close it yay don't do anything just minimize basic pen test too

03:31:11.580 --> 03:31:24.540
all right inside of your kali linux machine to download leave that there and just go to

03:31:24.540 --> 03:31:46.980
the kali right next to it your downloads um do it ls don't hit enter after ls okay um let's see

03:31:46.980 --> 03:32:08.040
here oh do a um ipa okay 10.0.3.15 interesting okay now you want to do your first command

03:32:08.040 --> 03:32:19.100
which is what what you want to find the ip address of the target yeah so i know this yes you do so

03:32:19.100 --> 03:32:36.970
you know you have two options so i am going to um do a pseudo net discover or a pseudo or scan

03:32:36.970 --> 03:32:57.370
depending on choose one how fast or how slow you want to go i'm gonna go slow okay that's

03:32:57.370 --> 03:33:05.610
going to take a minute but what you can do is right click split that terminal vertically

03:33:06.490 --> 03:33:14.300
or left and right and do the other command see what what differences you find

03:33:15.660 --> 03:33:20.620
you want last thing you want to do is do a bone hub wait forever and then you go it didn't work

03:33:20.620 --> 03:33:27.020
at all because you need to find out if you can find that joke now you see that type control e

03:33:27.020 --> 03:33:37.640
it'll auto complete the control press enter look at that see how fast that goes

03:33:37.640 --> 03:33:44.820
now one of them is basic pen test one and the other one is basic pen test two

03:33:44.820 --> 03:34:02.410
now the rest of it you have the instruction you can always stop basic pen test one too

03:34:02.410 --> 03:34:15.570
if you want to save resources got it okay what questions do you have i don't have any more

03:34:15.570 --> 03:34:23.870
questions i am available to you for the next two to three hours okay all right thank you very much

03:34:23.870 --> 03:34:26.390
I'm literally just going to be in my basement doing some weights.

03:34:27.050 --> 03:34:28.610
So you call me if you need me, okay?

03:34:29.290 --> 03:34:30.730
I hope you have a great workout.

03:34:31.110 --> 03:34:32.870
Thank you very much for everything.

03:34:33.030 --> 03:34:33.770
You're so welcome.

03:34:34.030 --> 03:34:35.470
I appreciate your instruction.

03:34:35.970 --> 03:34:36.650
You're welcome.

03:34:36.770 --> 03:34:39.750
And thank you for your service to our country.

03:34:39.990 --> 03:34:40.870
Well, thank you very much.

03:34:40.890 --> 03:34:42.550
And to cybersecurity.

03:34:43.230 --> 03:34:44.310
Thank you very much.

03:34:44.350 --> 03:34:45.230
I appreciate you.

03:34:45.310 --> 03:34:46.150
I think you're awesome.

03:34:46.570 --> 03:34:47.590
And I know you'll get it.

03:34:49.590 --> 03:34:50.450
All right, then.

03:34:50.450 --> 03:34:51.450
I'm just going to.

03:34:51.450 --> 03:34:55.910
Have a nice day all. Enjoy yourself. Have a good

03:34:55.910 --> 03:34:59.990
workout. Tear it up. You too. I am still here.

03:35:00.110 --> 03:35:03.170
Okay. I'm going to be here. Just going to mute and

03:35:03.170 --> 03:35:06.890
mute and no picture.

03:35:07.670 --> 03:35:11.970
I'm going to mute too. Alright. Thank you, Doctor. Bye-bye. Have a nice

03:35:11.970 --> 04:51:08.080
day. That's

04:51:08.080 --> 04:51:11.460
fantastic. The only thing is

04:51:11.460 --> 04:51:15.100
You don't report to anyone

04:51:15.100 --> 04:51:16.080
You don't do a presentation

04:51:16.080 --> 04:51:18.220
You don't write papers

04:51:18.220 --> 04:51:21.280
They don't do a whole

04:51:21.280 --> 04:51:22.160
They write papers

04:51:22.160 --> 04:51:23.940
But they don't do

04:51:23.940 --> 04:51:26.500
A whole lot of that other stuff

04:51:26.500 --> 04:51:28.740
Oh man, she dropped offline

04:51:28.740 --> 04:51:30.800
3.23

04:51:30.800 --> 04:51:32.240
So I'm going to end this call

04:51:32.240 --> 04:51:38.930
Send them a note and let them know she's done

04:51:38.930 --> 04:51:42.230
I don't see her do anything

04:51:42.230 --> 04:51:45.680
Oh yeah, she's not in the room

04:51:45.680 --> 04:51:47.600
Okay

04:51:47.600 --> 04:51:59.480
how do i stop this i think she gave up on that fantastic that's what i think i don't see her do

04:51:59.480 --> 04:51:59.800
anything