﻿1
00:00:00,330 --> 00:00:06,990
‫OK, everybody, I admitted I made a mistake in a previous scan and I disable the windows plug ins,

2
00:00:06,990 --> 00:00:14,250
‫although two of my three targets are Windows, it's just a really big mistake that affects results.

3
00:00:14,250 --> 00:00:20,430
‫So that clearly shows that we should be very careful while configuring the tools such as a vulnerability

4
00:00:20,430 --> 00:00:20,880
‫scanner.

5
00:00:22,260 --> 00:00:28,320
‫Now, I scanned the target machines once again and I didn't disable the windows plug ins this time.

6
00:00:29,210 --> 00:00:35,480
‫So these are the result, two zero seven is Windows XP and two to three is Windows eight.

7
00:00:36,400 --> 00:00:39,140
‫I click on the Windows XP to see the vulnerabilities.

8
00:00:39,590 --> 00:00:43,460
‫As you see, there are a lot of critical vulnerabilities.

9
00:00:44,390 --> 00:00:46,640
‫I'll click on one of them just to see its details.

10
00:00:47,600 --> 00:00:53,040
‫So here is the name in the description about the vulnerability and scrolling down.

11
00:00:53,570 --> 00:00:57,850
‫Yes, it says the vulnerability is exploitable with Métis Point.

12
00:00:59,390 --> 00:01:00,990
‫Let's go back to vulnerabilities.

13
00:01:01,340 --> 00:01:04,310
‫I want to show you another vulnerability for XP system.

14
00:01:05,540 --> 00:01:12,590
‫This is a vulnerability M0, a Dash 067, which has a very stable exploit.

15
00:01:14,100 --> 00:01:21,000
‫Rolling down a bit and Nessus says we can exploit this vulnerability using motor sport, so let's do

16
00:01:21,000 --> 00:01:21,130
‫it.

17
00:01:21,630 --> 00:01:22,860
‫I think it's an invitation.

18
00:01:24,090 --> 00:01:26,850
‫Open a terminal screen and start MSF console.

19
00:01:31,790 --> 00:01:33,920
‫Search for the vulnerability, Ms.

20
00:01:34,340 --> 00:01:36,650
‫08 six 067.

21
00:01:39,000 --> 00:01:41,400
‫Here is the exploit let's use.

22
00:01:46,600 --> 00:01:49,570
‫Look for the available payloads using show payloads.

23
00:01:59,190 --> 00:02:03,330
‫I want to use Shell payload with buying TCP Stager for this time.

24
00:02:04,560 --> 00:02:05,400
‫Joe options.

25
00:02:08,080 --> 00:02:10,180
‫Set the remote host, that was.

26
00:02:12,910 --> 00:02:14,950
‫Well, let me look at the Nessa's page again.

27
00:02:17,170 --> 00:02:19,030
‫Yes, two zero 07.

28
00:02:26,590 --> 00:02:33,550
‫And the board is for four or five, the default value is correct, so the options again and we're ready

29
00:02:33,550 --> 00:02:34,450
‫to run the XPoint.

30
00:02:39,380 --> 00:02:44,270
‫Here is the shell of the target system, exploitation is successful once again.

