1 00:00:00,280 --> 00:00:05,790 Hello everybody, welcome to my "advanced ethical hacking network and penetration testing course". 2 00:00:16,680 --> 00:00:21,490 when comic into all advanced ethical hacking to date guys. 3 00:00:21,510 --> 00:00:25,100 So we are going to talk about brain pain. 4 00:00:25,140 --> 00:00:26,490 Vulnerable labs. 5 00:00:26,690 --> 00:00:30,610 We are in the system in immigration and exploitation. 6 00:00:30,660 --> 00:00:31,860 So what is it. 7 00:00:32,130 --> 00:00:39,330 So we're going to show you exactly where to where to download disorder as we already provide a descent. 8 00:00:39,390 --> 00:00:42,580 So OK let's go straight forward in this. 9 00:00:42,690 --> 00:00:44,550 We find is 10 00:00:47,820 --> 00:00:50,560 by then OK. 11 00:00:50,750 --> 00:00:58,910 Even this link so you can download it and then you will have to download tool to a beauty system. 12 00:00:58,920 --> 00:01:00,560 The pornhub in the brain. 13 00:01:00,670 --> 00:01:02,160 So you will use the point laughter. 14 00:01:02,180 --> 00:01:04,540 So it's good for you if you have read. 15 00:01:04,540 --> 00:01:19,240 OK so we copied copy and you can minimize it and go to the party Crow and Bowser busted down with it 16 00:01:20,990 --> 00:01:21,350 me. 17 00:01:21,360 --> 00:01:23,100 I have downloaded it in my system. 18 00:01:23,140 --> 00:01:29,040 So in case you didn't have it downloaded so you can try to make it that. 19 00:01:29,730 --> 00:01:30,000 OK. 20 00:01:30,030 --> 00:01:40,930 And then you just went with to gloat just a moment. 21 00:01:41,120 --> 00:01:41,650 OK 22 00:01:46,550 --> 00:01:50,960 just for a demonstration I'm going to go in and download it because I have it already in my system. 23 00:01:50,960 --> 00:01:51,460 OK. 24 00:01:51,500 --> 00:01:52,930 Here you download it. 25 00:01:52,970 --> 00:01:53,900 As I said earlier. 26 00:01:53,930 --> 00:01:58,770 So you will find two who of operating system the pointing of one and then bring pain. 27 00:01:59,290 --> 00:02:01,490 Okay so let's close this stuff. 28 00:02:01,640 --> 00:02:02,880 We can minimize it. 29 00:02:02,900 --> 00:02:11,450 So now let's go to all it's going to do when you have it down not on your system. 30 00:02:11,450 --> 00:02:19,470 Now you go to a directory where it is downloaded and then you double click it is all V A extension. 31 00:02:19,580 --> 00:02:20,440 What does that mean. 32 00:02:20,540 --> 00:02:24,290 You don't need to go to virtual box and step by step. 33 00:02:24,290 --> 00:02:28,740 You create and you add a gigabyte properties. 34 00:02:28,760 --> 00:02:32,340 You don't have to with only one thing you have to do is double click. 35 00:02:32,750 --> 00:02:40,080 So you double click it and then we're going out it will import automatically to reach output. 36 00:02:40,130 --> 00:02:41,510 So now. 37 00:02:41,510 --> 00:02:50,500 So if you want you can make some changes for example you can change and change the name like John pain 38 00:02:51,170 --> 00:02:58,190 to do you need to really be dead and enough to we can make some changes after that. 39 00:02:58,220 --> 00:03:02,540 Now it is going to be imported in of veteran box machine. 40 00:03:03,400 --> 00:03:06,860 So let's wait a moment. 41 00:03:06,880 --> 00:03:07,540 All right. 42 00:03:07,780 --> 00:03:08,530 So we have it. 43 00:03:08,620 --> 00:03:09,610 What next. 44 00:03:09,610 --> 00:03:18,070 The next thing First be aware that you're clearly your killing machine version should be configured 45 00:03:18,160 --> 00:03:21,940 exactly as the one that you are trying. 46 00:03:21,970 --> 00:03:28,840 I mean the one the renewable operating system that you trying to export and emulate what I see there. 47 00:03:29,020 --> 00:03:37,890 So let's check for a little bit what color looks much in detail as to what in general so it does it 48 00:03:37,910 --> 00:03:38,440 politically. 49 00:03:38,640 --> 00:03:40,110 Does it matter to us. 50 00:03:40,720 --> 00:03:52,120 What is does matter to us is network whether we are on which network in E and Z will Wi-Fi make sure 51 00:03:52,540 --> 00:03:56,950 that you wouldn't do it would be pain or buddy system. 52 00:03:56,950 --> 00:04:02,080 It will be exactly configure it the same way as it clearly looks. 53 00:04:02,710 --> 00:04:04,100 So that's it guys. 54 00:04:04,150 --> 00:04:07,760 Now let's go to two avoid pain. 55 00:04:07,870 --> 00:04:08,740 What is it. 56 00:04:09,110 --> 00:04:13,830 Is it generally been one. 57 00:04:14,890 --> 00:04:15,460 OK. 58 00:04:16,930 --> 00:04:24,200 You still we don't need to do it but what if you want you can put it as a bi directional so and drag 59 00:04:24,210 --> 00:04:25,770 and drop as well. 60 00:04:25,920 --> 00:04:26,480 OK. 61 00:04:27,500 --> 00:04:27,910 OK. 62 00:04:27,950 --> 00:04:29,330 Now we go to storage. 63 00:04:29,330 --> 00:04:32,550 We have it already we don't need anything else because we are not going to. 64 00:04:32,550 --> 00:04:34,660 Input is all fine here. 65 00:04:34,700 --> 00:04:36,180 We don't even need to go there. 66 00:04:36,280 --> 00:04:47,100 So network widget adapter e and see well that is good because that's what we need it. 67 00:04:47,120 --> 00:04:48,650 Well here it's nothing. 68 00:04:48,880 --> 00:04:50,230 It's not being used. 69 00:04:50,240 --> 00:04:50,820 Not a thing. 70 00:04:50,860 --> 00:04:51,980 OK but yeah. 71 00:04:52,030 --> 00:04:58,060 So if we want we can put it on the tree to put it doesn't matter because we are not going to work with 72 00:04:58,060 --> 00:05:04,900 it and then we just want to hack it and exploit it so that we don't even need this thing so we can say 73 00:05:04,930 --> 00:05:06,220 what if you want you can. 74 00:05:06,300 --> 00:05:06,620 OK. 75 00:05:06,640 --> 00:05:07,710 So it doesn't matter. 76 00:05:07,750 --> 00:05:09,070 Yeah okay. 77 00:05:09,400 --> 00:05:14,180 So now it started. 78 00:05:14,640 --> 00:05:22,090 Now wait a minute wait a moment you start the operating system and we went in includes 79 00:05:31,580 --> 00:05:41,760 working with pensions. 80 00:05:42,860 --> 00:05:48,560 Meanwhile we can go on track to to launch the next machine as well. 81 00:05:48,890 --> 00:05:49,580 So let's do it. 82 00:05:49,580 --> 00:05:52,180 So what we did was Time's cutting makes 83 00:05:57,540 --> 00:05:58,390 you do 84 00:06:04,610 --> 00:06:08,480 I think it's one in here. 85 00:06:09,000 --> 00:06:10,010 We still have to wait 86 00:06:23,020 --> 00:06:27,060 now okay we can replace the. 87 00:06:27,750 --> 00:06:28,520 All right. 88 00:06:28,540 --> 00:06:35,270 So now when you if you try to click inside of this operating system your mouse can be frozen. 89 00:06:35,350 --> 00:06:37,810 But boy if only my book. 90 00:06:37,810 --> 00:06:45,850 So you just with com left command and then you will get your mouse back difficult then yeah and then 91 00:06:46,030 --> 00:06:47,060 I would try again. 92 00:06:47,060 --> 00:06:50,560 A Greek colleague I don't see anything. 93 00:06:50,590 --> 00:06:53,710 So I just can type what it's doing nothing. 94 00:06:54,100 --> 00:06:58,030 So I place command again I get my mouse. 95 00:06:58,060 --> 00:06:58,980 Exactly. 96 00:06:59,200 --> 00:06:59,430 So. 97 00:06:59,460 --> 00:07:00,050 Well OK. 98 00:07:00,080 --> 00:07:01,630 So next is lunch. 99 00:07:02,040 --> 00:07:04,360 So I would. 100 00:07:04,630 --> 00:07:15,410 And your password is go. 101 00:07:19,330 --> 00:07:19,810 Key. 102 00:07:20,460 --> 00:07:28,160 So now we have both operating system grunge or Kelly machine or brain pen. 103 00:07:28,640 --> 00:07:30,050 And then the host machine of work. 104 00:07:30,050 --> 00:07:32,900 So we are known in my book. 105 00:07:32,900 --> 00:07:33,350 So. 106 00:07:33,400 --> 00:07:34,060 Okay 107 00:07:38,820 --> 00:07:39,380 okay. 108 00:07:39,470 --> 00:07:49,650 No but we have to do we have to find a way to get the IP address of the vulnerable machine. 109 00:07:49,910 --> 00:07:51,230 How can we see that. 110 00:07:51,230 --> 00:07:52,780 Yes of course we would actually do. 111 00:07:53,210 --> 00:08:00,200 And then being in mine when you want to act something or when you want to to scan something or when 112 00:08:00,200 --> 00:08:06,120 you want to explode some information for me system. 113 00:08:06,170 --> 00:08:14,660 You always have to check and use your brain as if you get to any page. 114 00:08:14,660 --> 00:08:21,620 Try in such a way to get the code to view the source code because it's obviously needed something can 115 00:08:21,620 --> 00:08:26,070 be hidden on BHP file or something like that. 116 00:08:26,090 --> 00:08:32,300 So to get as much as the information that you need of course probably you will not find all the information 117 00:08:32,330 --> 00:08:37,220 but it didn't show information which would help you for your task. 118 00:08:37,220 --> 00:08:41,470 So you have to always try to view the source code no matter what. 119 00:08:41,840 --> 00:08:42,130 OK. 120 00:08:42,140 --> 00:08:47,590 Now let's see how we can check the IP address of that machine. 121 00:08:47,620 --> 00:08:50,030 We've gone terminal here. 122 00:08:50,200 --> 00:08:53,880 GREG Okay. 123 00:08:53,980 --> 00:09:01,910 Now first thing first we have to take these net this quarter minus E and then your interviewees my indifference 124 00:09:01,950 --> 00:09:04,620 Misty t h zero. 125 00:09:04,690 --> 00:09:05,530 How can I get it. 126 00:09:05,830 --> 00:09:08,170 So OK I'm going to show you how you can get it. 127 00:09:08,320 --> 00:09:12,100 So we should order already and the previews allowed but if you forget it. 128 00:09:12,310 --> 00:09:15,370 But I think you will not forget it just for the sake of this video. 129 00:09:15,370 --> 00:09:17,110 So we will try it again. 130 00:09:17,220 --> 00:09:21,120 You take this a W config and then put it there. 131 00:09:22,060 --> 00:09:22,360 Yeah. 132 00:09:22,720 --> 00:09:24,550 So an awareness extension. 133 00:09:24,610 --> 00:09:28,930 That means my water awareness is not connected yet because I don't use it. 134 00:09:28,940 --> 00:09:33,330 No I don't need it either for this demonstration. 135 00:09:33,330 --> 00:09:36,610 But when we get to the Wi-Fi we will need it. 136 00:09:36,620 --> 00:09:42,150 And so so so and good and guys I'm telling you you will see. 137 00:09:42,430 --> 00:09:52,380 No let's go back and then we type discover discover I notice of race and mind if we see in every person 138 00:09:52,630 --> 00:09:55,470 and then we grow it. 139 00:09:56,200 --> 00:10:01,990 So he would get a lot of IP address of computers which are in my vicinity. 140 00:10:02,740 --> 00:10:10,900 So oh we can enjoy to phone owners need to know OK. 141 00:10:10,960 --> 00:10:11,710 This is it. 142 00:10:11,710 --> 00:10:18,080 So now we can use control to see so that we stop it control. 143 00:10:18,090 --> 00:10:18,580 See. 144 00:10:19,260 --> 00:10:19,750 OK. 145 00:10:25,240 --> 00:10:32,270 Now what we can try to do so since we have the IP address of it so we can try to go to a web browser 146 00:10:32,330 --> 00:10:34,210 and then type to IP address. 147 00:10:34,250 --> 00:10:37,780 But one thing we can't we leave fine. 148 00:10:37,820 --> 00:10:45,800 We will not find so good information and we will not be able to connect because we don't know yet on 149 00:10:46,070 --> 00:10:50,630 which port that is server machine is winning. 150 00:10:50,660 --> 00:10:52,270 So to find important ways. 151 00:10:52,280 --> 00:10:55,910 So you have to in must be I mean you Skynet. 152 00:10:55,940 --> 00:10:57,980 So let's do it now. 153 00:10:58,040 --> 00:11:00,830 Where does this come in. 154 00:11:01,650 --> 00:11:06,450 Do you end up with a means. 155 00:11:06,800 --> 00:11:18,830 And then the IP address is going to shift because we or we will just like that and then we enter by 156 00:11:18,830 --> 00:11:21,170 pissing it doing so it will Skynet. 157 00:11:21,170 --> 00:11:28,790 But if we want to find much more information out to make it more efficient we type B and then we place 158 00:11:29,100 --> 00:11:30,000 in there. 159 00:11:30,020 --> 00:11:34,690 So let's put it in there starting in map. 160 00:11:35,090 --> 00:11:42,090 So we have the vision save and wait to see what is the latest version. 161 00:11:42,090 --> 00:11:42,920 So again 162 00:11:47,050 --> 00:11:49,560 it's leading it's trying to destroy in its word 163 00:11:53,640 --> 00:11:57,000 and its worst moment in this country is complete 164 00:12:03,480 --> 00:12:04,740 damn good. 165 00:12:05,220 --> 00:12:10,360 So now we have to read or write it gives us. 166 00:12:10,410 --> 00:12:12,000 To get out. 167 00:12:12,010 --> 00:12:15,750 I'm sure that's all kit. 168 00:12:15,870 --> 00:12:19,970 We have 9 9 9 9 9. 169 00:12:20,430 --> 00:12:25,290 God which is open to people which is open so good. 170 00:12:25,470 --> 00:12:27,590 So how much closed. 171 00:12:27,770 --> 00:12:34,770 Some say sixty five thousand and something close to my end of the line. 172 00:12:34,800 --> 00:12:36,280 It's not important to us. 173 00:12:36,360 --> 00:12:39,510 It's good to own to find more. 174 00:12:39,600 --> 00:12:48,620 We've got numbers ten thousand DCP European all key here. 175 00:12:48,770 --> 00:12:52,550 This is the server on which the operating system. 176 00:12:52,610 --> 00:12:53,860 WAYNE Payne is running. 177 00:12:54,260 --> 00:12:55,730 So now we have it. 178 00:12:55,730 --> 00:12:57,310 It's 10000. 179 00:12:57,320 --> 00:13:02,900 Now we can just go to Firefox and then type the adjacent IP address. 180 00:13:02,900 --> 00:13:08,620 I mean you typed in IP address. 181 00:13:08,970 --> 00:13:14,550 No no no it again. 182 00:13:14,880 --> 00:13:18,300 And then we posted here 183 00:13:25,890 --> 00:13:28,690 what number was 10000. 184 00:13:28,870 --> 00:13:35,350 If we want we can try it out again just quickly. 185 00:13:35,560 --> 00:13:39,650 Quickly given away. 186 00:13:40,150 --> 00:13:40,400 Yeah. 187 00:13:40,430 --> 00:13:42,400 So that's what we can go. 188 00:13:42,500 --> 00:13:42,960 We did it. 189 00:13:42,960 --> 00:13:48,460 We did it a bit but it is simple issue TCO. 190 00:13:48,580 --> 00:13:49,620 Exactly. 191 00:13:50,150 --> 00:14:03,200 So now we're going to go to to Firefox then we passed it must then go and then before that we have to 192 00:14:03,860 --> 00:14:04,990 die. 193 00:14:06,980 --> 00:14:09,380 Yeah I figured it might. 194 00:14:10,190 --> 00:14:10,630 OK. 195 00:14:10,640 --> 00:14:11,490 Here we are. 196 00:14:11,780 --> 00:14:22,790 So now since we get you know what we can do we can check for some information we did it is look like 197 00:14:23,260 --> 00:14:32,190 it looks like it page not so much of the information but the best thing for us in case you have to wait 198 00:14:33,530 --> 00:14:38,340 and then try to figure out something. 199 00:14:38,380 --> 00:14:38,740 OK. 200 00:14:38,770 --> 00:14:39,580 So yeah. 201 00:14:39,610 --> 00:14:44,620 So we can right click then view page source. 202 00:14:45,880 --> 00:14:46,450 OK 203 00:14:49,680 --> 00:14:52,890 well those are not things important here. 204 00:14:52,920 --> 00:14:53,460 Nothing. 205 00:14:53,550 --> 00:14:56,900 So we can just close the page and then. 206 00:14:57,020 --> 00:15:07,270 Why now to find if we can find some more directories and how can we do that you can type so into the 207 00:15:07,270 --> 00:15:19,240 address of course let's say contravene and then you type here and then any day will tell you but you 208 00:15:19,240 --> 00:15:26,110 don't know them how to look for them or using Dobie is in is it terminal tool. 209 00:15:26,200 --> 00:15:33,620 So that helps us to con Web site or IP address of some notable operating system. 210 00:15:33,670 --> 00:15:44,650 And then I mean several and then we we we try to kind of to find if we could find some directories so 211 00:15:44,770 --> 00:15:50,770 let's go back to auto we know and dad and 212 00:15:54,330 --> 00:16:05,130 Kay now we will type to do B and then we will press into. 213 00:16:06,040 --> 00:16:06,950 OK. 214 00:16:07,210 --> 00:16:17,200 So we type do narrow and it seems to be slash slash the IP address of the machine. 215 00:16:17,530 --> 00:16:19,710 It was good. 216 00:16:19,850 --> 00:16:22,820 So let's put it last. 217 00:16:23,310 --> 00:16:27,280 And then the port where the silver is warning. 218 00:16:27,390 --> 00:16:28,600 So it was 10000. 219 00:16:28,960 --> 00:16:32,380 One two three one two three four. 220 00:16:32,380 --> 00:16:40,740 And then to enter into where it is testing is coming that you were going to ID 221 00:16:45,550 --> 00:16:46,450 we are going to do it. 222 00:16:46,540 --> 00:16:47,390 I won't do it. 223 00:16:47,450 --> 00:16:58,580 I'm going to wait O K now what we've got to do since we get the information so more information why 224 00:16:58,580 --> 00:17:08,250 it is scanning the user so we can we did look at it see it just gave was it your base or kill was second 225 00:17:08,290 --> 00:17:17,070 in the need o k d CS they do it totally. 226 00:17:17,090 --> 00:17:22,530 So we will just copy eat and pass it into oh where was it. 227 00:17:23,000 --> 00:17:32,400 So since I have read here already so I can just type being invoicing over Oh excellent. 228 00:17:32,400 --> 00:17:36,440 Well now we get more information. 229 00:17:36,440 --> 00:17:41,480 This is a win on that X so we can try to download it. 230 00:17:41,600 --> 00:17:49,250 But bear in mind this course will teach you how to make some exploitation but in some other Web sites 231 00:17:49,430 --> 00:17:53,120 which you not own these might be a virus. 232 00:17:53,180 --> 00:17:54,710 So you have to be careful too. 233 00:17:54,840 --> 00:17:55,240 OK. 234 00:17:55,310 --> 00:18:01,100 But he goes Well I know it's not going to affect us so we can try to download it we download downloaded 235 00:18:01,850 --> 00:18:07,950 and then we save it like that kid. 236 00:18:07,990 --> 00:18:12,840 So now we should go to or don't know Derek talk cooking. 237 00:18:12,940 --> 00:18:22,490 Why do we went under we did what we went under rated we have it let's minimize them minimize minimize. 238 00:18:22,900 --> 00:18:29,540 OK here we would open this page with immunity. 239 00:18:29,570 --> 00:18:30,890 Immunity debugger. 240 00:18:31,190 --> 00:18:34,000 So if you have it installed on your candidate next. 241 00:18:34,030 --> 00:18:34,590 That's great. 242 00:18:34,590 --> 00:18:39,800 But if you don't have an instant and you have it and start on your windows machine it's not a problem. 243 00:18:39,800 --> 00:18:50,120 You can use as well but debugger so it will help you to analyze descent behind the x file extension. 244 00:18:50,120 --> 00:18:52,340 So let's not waste our time. 245 00:18:52,380 --> 00:18:54,000 Let's go deeply into it. 246 00:18:54,560 --> 00:18:55,440 Okay. 247 00:18:55,550 --> 00:19:01,760 Double click it will click it again. 248 00:19:04,930 --> 00:19:07,450 Key key. 249 00:19:07,780 --> 00:19:13,970 Now on its hand let's go to call and do as much in Tennessee. 250 00:19:14,020 --> 00:19:22,260 This is way too much in when fun kids that we have to do now as I don't see error days. 251 00:19:22,270 --> 00:19:30,970 So we have immunity on Cunningham's machine and then we have ID on Windows as well because so we we 252 00:19:30,970 --> 00:19:35,520 just downloaded it just to make sure we have it on both sides. 253 00:19:35,710 --> 00:19:37,390 If we want to have windows. 254 00:19:38,140 --> 00:19:42,670 So now we can try to find its IP address. 255 00:19:44,260 --> 00:19:49,470 But I've been completely. 256 00:19:50,240 --> 00:19:53,390 1 6 weeks so we can try again. 257 00:19:53,390 --> 00:19:56,180 But learning is common. 258 00:19:58,460 --> 00:20:03,790 Just a quick view 66 with this one. 259 00:20:03,800 --> 00:20:08,400 Okay so I can stop it no control see Stop. 260 00:20:08,460 --> 00:20:12,580 This is really here. 261 00:20:12,690 --> 00:20:18,270 So all weighing on when money is this one okay doesn't change. 262 00:20:18,270 --> 00:20:20,030 So what cookie. 263 00:20:20,060 --> 00:20:25,630 Now let's try to open in you We know you would do on 264 00:20:28,590 --> 00:20:29,620 any. 265 00:20:29,990 --> 00:20:32,950 Okay now we're going to fine okay. 266 00:20:33,150 --> 00:20:34,000 Do we have it here. 267 00:20:34,270 --> 00:20:37,220 Let's see. 268 00:20:37,540 --> 00:20:38,560 No no. 269 00:20:40,860 --> 00:20:42,520 No. 270 00:20:43,260 --> 00:20:59,830 Okay now so we can try to to continue to code or join genetic code or we can put it right on bug wide. 271 00:20:59,880 --> 00:21:01,370 Good luck. 272 00:21:01,840 --> 00:21:02,300 Okay. 273 00:21:02,910 --> 00:21:06,120 So Wiggins calls it no. 274 00:21:06,710 --> 00:21:07,020 So. 275 00:21:07,290 --> 00:21:07,680 Okay. 276 00:21:09,080 --> 00:21:10,020 Okay. 277 00:21:10,350 --> 00:21:17,100 Now let's go and jump to all kinds of news machine. 278 00:21:27,190 --> 00:21:31,230 For us so we can try net discover. 279 00:21:31,260 --> 00:21:41,340 So to find the IP address of a Windows machine being mine guys if you take your computer and then you 280 00:21:41,340 --> 00:21:47,860 move from place to place your IP network might get changed. 281 00:21:47,910 --> 00:21:55,890 So always when you are working on color Unix and with an order lab you have to save your version for 282 00:21:55,890 --> 00:21:59,940 example if you want to leave your color Unix for five minutes. 283 00:21:59,940 --> 00:22:06,210 Save it and close it while you save the state and then do the same for other labs. 284 00:22:06,240 --> 00:22:10,070 Otherwise when you start again in another place. 285 00:22:10,080 --> 00:22:17,710 For example in your school or at home the IP that you saved will be of course changed. 286 00:22:17,760 --> 00:22:24,900 It's not a bubble but you have to remember that because sometimes you can we warn that I do victim IP 287 00:22:25,140 --> 00:22:28,140 when your carry machine and then it's not working. 288 00:22:28,140 --> 00:22:34,890 The reason behind that is because the IP get changed it doesn't mean that you had a mistake but that 289 00:22:34,980 --> 00:22:37,140 IP get changed always be minimized. 290 00:22:37,640 --> 00:22:38,020 Okay. 291 00:22:38,040 --> 00:22:38,760 Thank you. 292 00:22:38,760 --> 00:22:40,530 So let's go for it. 293 00:22:41,310 --> 00:22:42,270 So as we did your 294 00:22:49,060 --> 00:22:50,180 input here 295 00:22:52,860 --> 00:23:01,390 okay. 296 00:23:02,100 --> 00:23:05,130 Now in its wall and up against the windows 297 00:23:09,950 --> 00:23:18,650 you know it's the port number we see disappearing at least is 9 9 9 9 298 00:23:23,050 --> 00:23:23,230 2. 299 00:23:23,240 --> 00:23:25,320 We do need some simple item. 300 00:23:25,510 --> 00:23:34,300 So I will provide them of course until we sources of this course. 301 00:23:35,230 --> 00:23:40,670 Let's go let's go and open one for the analysis and 302 00:23:47,450 --> 00:23:57,950 get to wanted to really do is so it's an 100 kilometres and then the maximum buffer is for toes and 303 00:23:58,600 --> 00:24:05,270 it's the maximum when when you do a quest Wendy Brinkman would quash 304 00:24:08,220 --> 00:24:09,850 it's much more so. 305 00:24:09,880 --> 00:24:19,860 This is to go to land for less or equal the maximum before ending up in the counter and come to an agreement. 306 00:24:21,390 --> 00:24:22,360 On its own. 307 00:24:27,050 --> 00:24:29,740 Kids is the connection. 308 00:24:34,080 --> 00:24:39,080 So Dad said okay no let's go for the test. 309 00:24:44,070 --> 00:24:47,290 Of course for phoning any pirate I'm fine. 310 00:24:47,320 --> 00:24:49,860 So we have the time we have. 311 00:24:50,130 --> 00:24:50,660 Done. 312 00:24:50,710 --> 00:24:58,570 And then defy and the IP address of your windows machine. 313 00:24:58,570 --> 00:24:59,160 And then deport. 314 00:24:59,170 --> 00:24:59,920 No. 315 00:25:00,580 --> 00:25:10,720 Let's see. 316 00:25:13,250 --> 00:25:13,880 Okay. 317 00:25:15,040 --> 00:25:18,740 Attempting to catch on trade. 318 00:25:19,240 --> 00:25:21,360 It's good to know you went to the broker. 319 00:25:28,770 --> 00:25:34,140 It's analyzed the wood Mr Sun that the resource to 320 00:25:39,620 --> 00:25:43,480 find what you can check the check it. 321 00:25:43,990 --> 00:25:45,060 Okay. 322 00:25:45,220 --> 00:25:46,060 As we can see. 323 00:25:46,110 --> 00:25:48,700 So do we just we have e a eggs. 324 00:25:48,820 --> 00:25:57,080 It is composed of eight convicted f f f so he'll D but he's on about 8 characters. 325 00:25:57,080 --> 00:26:03,270 If you can see 0 3 1 1 7 1 1 1 if it counted. 326 00:26:03,330 --> 00:26:09,490 Okay so before going into the diff so let's go backing into all color and expansion 327 00:26:19,080 --> 00:26:19,460 k. 328 00:26:19,670 --> 00:26:21,450 Now we have Dale. 329 00:26:21,910 --> 00:26:27,040 So get it first thing is so we are trying to create where we gonna find her. 330 00:26:27,620 --> 00:26:29,060 Okay. 331 00:26:29,450 --> 00:26:33,730 So give me 332 00:26:36,690 --> 00:26:45,210 time you can go out and create I can wi fi need. 333 00:26:45,240 --> 00:26:49,500 So we copied and then we go here. 334 00:26:51,970 --> 00:26:56,620 We need 900 bad to to quash debate. 335 00:26:57,000 --> 00:27:02,990 So as we have seen in the I god it's when 336 00:27:06,940 --> 00:27:08,040 I need. 337 00:27:08,580 --> 00:27:11,360 So we copy this dude. 338 00:27:14,550 --> 00:27:18,060 Let's try to open one in it takes a little. 339 00:27:18,570 --> 00:27:22,990 You can only need in g e d a d. 340 00:27:23,040 --> 00:27:34,950 Get it get it do it as a. 341 00:27:35,730 --> 00:27:37,010 We have to analyze it. 342 00:27:38,380 --> 00:27:42,630 And then we can change the API trace of course but. 343 00:27:42,730 --> 00:27:43,800 Okay. 344 00:27:43,830 --> 00:27:48,070 You you've changed according to yours. 345 00:27:49,900 --> 00:27:53,330 D was already quite so in it. 346 00:27:53,600 --> 00:27:54,640 And we study 347 00:28:00,560 --> 00:28:05,090 in New will need to plate. 348 00:28:05,330 --> 00:28:05,870 Good. 349 00:28:06,200 --> 00:28:06,640 Okay. 350 00:28:06,890 --> 00:28:08,070 Yeah. 351 00:28:08,200 --> 00:28:11,360 No it's a looking into leading watching 352 00:28:14,760 --> 00:28:25,600 so again later when they screwed on so we didn't do it eventual King such a ticket machine oil well 353 00:28:25,650 --> 00:28:35,680 you're paying your debugger and Deepika you see key right. 354 00:28:39,240 --> 00:28:45,540 Go it's go to E A B ratings. 355 00:28:45,800 --> 00:28:46,260 B. 356 00:28:46,350 --> 00:28:47,000 B. 357 00:28:47,000 --> 00:28:47,540 Okay. 358 00:28:47,630 --> 00:28:48,150 Okay. 359 00:28:48,220 --> 00:28:48,760 Yeah. 360 00:28:52,570 --> 00:28:57,570 And beat it 35 72. 361 00:28:57,580 --> 00:29:02,840 Okay so next step is going back to a cutting machine. 362 00:29:03,960 --> 00:29:04,290 Okay 363 00:29:07,250 --> 00:29:12,010 try to keep it in unity 364 00:29:14,680 --> 00:29:21,640 and your mind is skillful but a query and an O E IP number as we have seen earlier in our community 365 00:29:21,650 --> 00:29:33,390 into bigger exact might kill ideas admit to it and it's taking its no moods 5 to four Okay 366 00:29:37,180 --> 00:29:37,660 okay. 367 00:29:37,690 --> 00:29:39,860 So let's take a look at a number. 368 00:29:40,800 --> 00:29:41,170 Good 369 00:29:43,830 --> 00:29:45,370 that's key. 370 00:29:47,870 --> 00:29:51,050 Change e 371 00:29:58,860 --> 00:30:02,040 we analyzed it guys to see 372 00:30:07,440 --> 00:30:13,950 we have to find two overjoyed that the ABC is going to do bigger to find 373 00:30:18,090 --> 00:30:25,120 so it's win again this fight again begins this again. 374 00:30:27,420 --> 00:30:28,730 Again with 375 00:30:32,180 --> 00:30:32,480 one 376 00:30:36,610 --> 00:30:40,540 in let's mention declining it gives it 377 00:30:51,560 --> 00:30:54,850 completed great 378 00:30:58,870 --> 00:31:09,600 or ERP now is 4 2 4 2 4 2 4 2. 379 00:31:14,910 --> 00:31:16,140 What we can do. 380 00:31:16,670 --> 00:31:19,300 Okay let's begin to analyze it. 381 00:31:20,430 --> 00:31:20,790 Okay. 382 00:31:22,650 --> 00:31:24,760 And then we have we have to study 383 00:31:40,490 --> 00:31:40,770 in 384 00:31:46,100 --> 00:31:51,400 this again to own or notified what is within their 385 00:31:55,120 --> 00:31:56,100 what it really does. 386 00:31:56,100 --> 00:31:59,900 It all is sensible can't do to 0 windows. 387 00:32:01,140 --> 00:32:02,160 Data nine eight eight 388 00:32:11,820 --> 00:32:20,560 again we take this in command to run sheet against it to run to describe it against windows of course. 389 00:32:20,580 --> 00:32:22,390 Yeah. 390 00:32:22,620 --> 00:32:23,750 Now let's go back there. 391 00:32:26,050 --> 00:32:41,490 To see if any bicarb data is launched against it we will going to check it at the bottom. 392 00:32:41,750 --> 00:32:51,960 It's the content that we have sent on the list in 0 4 you will do okay let's see. 393 00:32:56,130 --> 00:33:00,660 Okay if it is there let's go on. 394 00:33:00,670 --> 00:33:02,920 Okay okay. 395 00:33:03,520 --> 00:33:07,240 But it's moved to find it. 396 00:33:07,270 --> 00:33:08,850 John code. 397 00:33:09,030 --> 00:33:10,300 We'll wait. 398 00:33:10,480 --> 00:33:10,810 Jump. 399 00:33:10,870 --> 00:33:18,210 I mean the G can be so good in school but again to killing machine. 400 00:33:18,840 --> 00:33:25,850 And we have to use a shell script and then destroyed numbers. 401 00:33:25,900 --> 00:33:28,640 And Charlotte is the change that we need. 402 00:33:28,640 --> 00:33:30,170 And then we locate Sure. 403 00:33:30,850 --> 00:33:39,890 And then up to a copy and we wanted Joan ESB. 404 00:33:40,400 --> 00:33:41,670 It is. 405 00:33:42,590 --> 00:33:52,920 So if you feel is the ESB in we'll try again to go back. 406 00:33:53,040 --> 00:33:56,890 Do you mean you will go to the Windows machine 407 00:34:04,480 --> 00:34:08,700 among insurgent type. 408 00:34:08,780 --> 00:34:09,580 More now 409 00:34:15,750 --> 00:34:16,010 we 410 00:34:26,180 --> 00:34:30,190 men and women in the X 411 00:34:33,690 --> 00:34:42,740 located Team B and Jason for Brain Bank came forward and got out of one pointers. 412 00:34:49,050 --> 00:34:52,450 So this is the address we want to repeat. 413 00:34:52,630 --> 00:34:56,230 Could we do one. 414 00:35:01,560 --> 00:35:02,860 And Giannis 415 00:35:08,210 --> 00:35:11,770 Lindsay see Ben 416 00:35:15,960 --> 00:35:16,290 need 417 00:35:23,990 --> 00:35:32,690 sonority study I mean really sooner he started okay as we have stated earlier MSM fandom is a pay or 418 00:35:32,710 --> 00:35:33,160 boys. 419 00:35:33,630 --> 00:35:42,500 It's a tool of mine that's brought that can be used for creating viruses or malware. 420 00:35:42,720 --> 00:35:51,680 So now when I use it all these common guys they are going to be provided in their resources right. 421 00:35:52,260 --> 00:35:57,180 So when you type any seven on a minus B windows show we regress DCP and port. 422 00:35:57,180 --> 00:36:05,580 Of course you can type any port in the host IP the IP I just carry much in and we we send it back. 423 00:36:05,590 --> 00:36:14,350 It is minus B is the to X as he was a war and then minus stuff done so now. 424 00:36:14,550 --> 00:36:29,690 So we compete on for them but characters day when you copy it and let's check it on so we can open it 425 00:36:29,780 --> 00:36:30,410 as you want. 426 00:36:30,410 --> 00:36:39,400 If you are familiar with the V view v EDIT Also you can use v editor if you are familiar we'd get into 427 00:36:39,450 --> 00:36:41,770 detail so you can use it to do it. 428 00:36:41,840 --> 00:36:43,540 It really doesn't matter guys. 429 00:36:49,400 --> 00:36:49,830 Again 430 00:36:52,450 --> 00:36:56,920 let's take a no bid in what he does next month. 431 00:37:05,320 --> 00:37:12,600 You said to five hundred and twenty four cartoons over this backlog tickets. 432 00:37:12,720 --> 00:37:13,210 OK. 433 00:37:19,660 --> 00:37:20,200 Okay. 434 00:37:22,690 --> 00:37:24,030 Yeah. 435 00:37:29,110 --> 00:37:39,330 So that's all we need you to do we shall swap a string that K and E T C2. 436 00:37:40,020 --> 00:37:40,370 Cut 437 00:37:44,490 --> 00:37:50,300 the IPO on target machine and boom. 438 00:37:50,370 --> 00:37:58,560 Get it saw now and get him to do Windows Server OK. 439 00:37:58,780 --> 00:38:05,590 And then try to go to some fights to avoid it being the ATM machine. 440 00:38:09,920 --> 00:38:10,910 It's gonna take 441 00:38:15,330 --> 00:38:18,840 now it's Linux instead of windows. 442 00:38:19,020 --> 00:38:25,030 So we may notice that puts it on sender and then we copy the buffering in 443 00:38:35,190 --> 00:38:41,780 and then opened it on it. 444 00:38:41,850 --> 00:38:46,240 No he. 445 00:38:46,470 --> 00:38:48,760 Now we have a new. 446 00:38:48,960 --> 00:38:49,980 And save it. 447 00:38:49,980 --> 00:39:04,100 And when it again woman. 448 00:39:04,310 --> 00:39:09,570 Now we try to open with desperate by using meet us both. 449 00:39:09,570 --> 00:39:13,950 So we'll have a lot of options to do so only time myself. 450 00:39:14,030 --> 00:39:24,630 Consultant for sugar men is one to monitor indoor centipede Road said the horse and said deport or you 451 00:39:24,640 --> 00:39:25,820 get and we can. 452 00:39:25,860 --> 00:39:32,800 After everything I said that's it as I said earlier you can always type show Ocean's shore auctions 453 00:39:32,800 --> 00:39:39,970 and then we'll show you your number your IP and then everything that you have taped just to make sure 454 00:39:40,090 --> 00:39:42,730 that everything was well settled. 455 00:39:42,790 --> 00:39:44,280 Take one or explode. 456 00:39:44,290 --> 00:39:46,020 It doesn't matter. 457 00:39:46,020 --> 00:39:50,390 So then do reverse the reverse TCB we started. 458 00:39:50,450 --> 00:40:02,580 Warned to win upon which we have saved indeed v.i. to the V.A. as we go now. 459 00:40:02,990 --> 00:40:06,510 It as lunch let's make it bigger. 460 00:40:09,500 --> 00:40:12,650 Cindy opened it. 461 00:40:22,880 --> 00:40:31,710 So let's check the privileges villages see you would change denied. 462 00:40:32,020 --> 00:40:36,900 OK now it's up to us to try to escalate it 463 00:40:39,830 --> 00:40:40,340 worried 464 00:40:44,970 --> 00:40:46,130 so. 465 00:40:57,170 --> 00:41:00,910 Okay now we can notice. 466 00:41:00,920 --> 00:41:06,580 So we have a user which names easy OK. 467 00:41:06,740 --> 00:41:07,430 No let's go. 468 00:41:07,440 --> 00:41:15,630 Type of common which will show us on dip defines which have wood privileges. 469 00:41:15,660 --> 00:41:16,080 Okay. 470 00:41:18,000 --> 00:41:21,580 So fine fine. 471 00:41:21,980 --> 00:41:24,690 Die within each time. 472 00:41:27,720 --> 00:41:28,570 That's good. 473 00:41:28,580 --> 00:41:35,740 On si si o it wide. 474 00:41:36,080 --> 00:41:40,400 Well so these are they. 475 00:41:41,200 --> 00:41:43,780 U u u e d d. 476 00:41:43,800 --> 00:41:44,150 Okay. 477 00:41:44,170 --> 00:41:54,050 It's nice in this vein invalidate again it's it's it's interesting it's a stitch as well so it's good 478 00:41:54,060 --> 00:41:59,470 on. 479 00:42:00,260 --> 00:42:04,850 So you can try to look it up directory and then see 480 00:42:10,420 --> 00:42:11,820 it's good for an input. 481 00:42:12,230 --> 00:42:15,150 Yeah. 482 00:42:15,550 --> 00:42:16,550 Key. 483 00:42:16,950 --> 00:42:22,490 So by this we can try to escalate the privileges. 484 00:42:22,540 --> 00:42:29,090 No no let's try it so we'll try and try. 485 00:42:29,300 --> 00:42:30,750 Oh okay. 486 00:42:33,040 --> 00:42:34,600 So by using that card. 487 00:42:34,650 --> 00:42:38,270 So we are going to try. 488 00:42:38,530 --> 00:42:39,460 STEPHEN KENNY 489 00:42:45,280 --> 00:42:48,160 This bottle of course it's the port that you used 490 00:42:51,300 --> 00:42:53,320 every type body date but he did. 491 00:42:53,350 --> 00:42:54,490 Is it finding him. 492 00:42:54,540 --> 00:42:55,730 Find him. 493 00:42:56,680 --> 00:43:00,130 And then go on to tell me no. 494 00:43:00,180 --> 00:43:03,850 You won't find phantom not then 495 00:43:07,730 --> 00:43:12,570 I'll be doing as much as that Tucker blushing 496 00:43:17,690 --> 00:43:22,770 and then you put deeper on the validate and you see that. 497 00:43:23,110 --> 00:43:27,750 So now let's go back to cut. 498 00:43:27,960 --> 00:43:32,810 Good fight but again. 499 00:43:33,250 --> 00:43:33,740 It's good. 500 00:43:33,750 --> 00:43:38,770 So now we can make some someone that loses. 501 00:43:40,560 --> 00:43:43,420 Okay so let's make it executive. 502 00:43:44,660 --> 00:43:45,350 I mean that right. 503 00:43:48,900 --> 00:43:51,430 We some based on common knowledge you want to force it. 504 00:43:51,670 --> 00:43:53,520 So you can 505 00:44:00,310 --> 00:44:06,370 eat sign it or get it done. 506 00:44:06,870 --> 00:44:07,490 Say 507 00:44:14,070 --> 00:44:14,540 I use 508 00:44:17,720 --> 00:44:22,460 going to be key. 509 00:44:23,450 --> 00:44:30,030 You can try not to place in order to see what happens OK. 510 00:44:30,060 --> 00:44:36,060 But he did thing in the past so that means now it doesn't catch. 511 00:44:36,150 --> 00:44:43,560 Now we are going to tape again validate that was signed by time and see plane now H. 512 00:44:43,890 --> 00:44:47,650 And then we just put it like two hundred Sigmund Freud. 513 00:44:47,920 --> 00:44:49,020 OK. 514 00:44:58,110 --> 00:45:00,430 You can try now to it. 515 00:45:00,540 --> 00:45:04,340 And the debugger to find out how it works. 516 00:45:10,510 --> 00:45:13,450 We can use the same techniques. 517 00:45:13,650 --> 00:45:18,910 A said put it pattern I'm located 518 00:45:28,680 --> 00:45:31,920 can wade. 519 00:45:32,170 --> 00:45:32,680 Who is it. 520 00:45:32,750 --> 00:45:33,260 And then. 521 00:45:33,290 --> 00:45:37,320 So now we can compete. 522 00:45:39,600 --> 00:45:44,680 Now we can take GBP validate 523 00:45:48,030 --> 00:45:56,650 OK now let's try to type one dollar sign and try to stay here. 524 00:45:56,920 --> 00:46:04,900 Gary and Denzel he'll present our go. 525 00:46:05,040 --> 00:46:06,040 This is the refrain. 526 00:46:06,090 --> 00:46:10,950 Know we're going to use. 527 00:46:11,360 --> 00:46:12,580 We have denied it Don. 528 00:46:12,620 --> 00:46:16,980 It's been eight called DOS complete 529 00:46:22,400 --> 00:46:27,740 so we can leave this terminal in. 530 00:46:28,350 --> 00:46:36,500 And again trying to look at the pattern of St. and then after you find a path and then you're copied 531 00:46:36,590 --> 00:46:37,900 and passed it there. 532 00:46:37,970 --> 00:46:53,260 We did que minus que is the que that's what happened except much so now it's great. 533 00:46:54,230 --> 00:46:56,960 So now what would I do. 534 00:46:56,990 --> 00:47:09,060 So we can try to would it be invalidated again to go to the shelter and then we could be in we passed 535 00:47:09,250 --> 00:47:11,150 a despite all code. 536 00:47:11,400 --> 00:47:14,550 I wouldn't give it to you in the resource file. 537 00:47:14,550 --> 00:47:15,090 Of course 538 00:47:21,700 --> 00:47:25,620 we have. 539 00:47:25,710 --> 00:47:26,790 We should see you. 540 00:47:26,790 --> 00:47:33,980 What is the NAACP what is its component of characters so let's play them no. 541 00:47:34,090 --> 00:47:42,860 And then good bloody doesn't have the ability. 542 00:47:42,970 --> 00:47:55,670 You were awarded e x uh well so now we have to. 543 00:47:55,790 --> 00:47:59,430 That's wondered is the maximum that defined the question. 544 00:47:59,950 --> 00:48:00,460 Okay. 545 00:48:01,980 --> 00:48:05,540 So it when I've been to see how you do. 546 00:48:06,000 --> 00:48:06,300 So 547 00:48:09,520 --> 00:48:18,800 however E X can be too strong and show on injection so now let's see. 548 00:48:18,930 --> 00:48:28,110 Oh gee be Don to find what we need is simply try to find a GS B extension and debugger or a mini debugger 549 00:48:28,260 --> 00:48:31,270 or if you want to use really regret it. 550 00:48:31,280 --> 00:48:36,770 It took two days but it's better to use the same tools as we used here in this video. 551 00:48:37,660 --> 00:48:47,880 Okay now to do that we're going to type all beachy dump minus B that he did in the G M B and glib E 552 00:48:47,920 --> 00:48:55,530 X and so was enter into defining who would always want to know is owed. 553 00:48:55,530 --> 00:49:02,290 Now let's try to go and then present and see it. 554 00:49:02,940 --> 00:49:19,010 Oh I guys we have to go X get them so let's use the first one to two start speed it's got a media address 555 00:49:19,400 --> 00:49:24,140 which we like spot right. 556 00:49:24,230 --> 00:49:28,500 So now we have to find the character which is not good. 557 00:49:28,540 --> 00:49:31,560 I mean I mean the bad characters. 558 00:49:34,400 --> 00:49:44,860 So that would make a good analysis so all of these comments will be provided of course in lectures in 559 00:49:44,990 --> 00:49:46,520 resource so. 560 00:49:46,640 --> 00:49:49,070 Okay. 561 00:49:49,360 --> 00:49:50,220 Okay. 562 00:49:50,470 --> 00:49:59,550 We can take you to meet and validate to go to the Michelle and then when I want this comment it will 563 00:49:59,640 --> 00:50:05,530 send one hundred and sixteen eight counted following my beef for. 564 00:50:05,570 --> 00:50:07,570 Because it is here. 565 00:50:10,770 --> 00:50:11,890 And send it 566 00:50:15,950 --> 00:50:26,010 in so it's only got men and selected one of hundreds the eggs just to see the overlay that when you 567 00:50:26,080 --> 00:50:29,300 stores all you need to begin. 568 00:50:29,760 --> 00:50:32,670 Oh yeah. 569 00:50:34,440 --> 00:50:43,420 Starting from oil from the 0 0 1 0 1 0 1 4 2 Okay we can try intro to food and fade 570 00:50:54,770 --> 00:50:55,810 lives. 571 00:50:56,040 --> 00:50:56,910 We need 572 00:51:05,200 --> 00:51:11,650 Okay now we're going to try to load this this payload using EMRs okay. 573 00:51:14,780 --> 00:51:25,290 Excluding the backlog days does back onto 0 0 0 9 is a 10 is it tiny in forty six. 574 00:51:25,390 --> 00:51:33,290 We try and do four month which would be in the form of Pi done so it was a no so we have a four year 575 00:51:47,350 --> 00:51:47,670 o 576 00:51:50,640 --> 00:51:58,680 necessary to go back again get took know and then past this combined 577 00:52:01,350 --> 00:52:10,870 it sends the payload which would have just created using MSL on and column by 46 578 00:52:13,730 --> 00:52:14,630 uh 579 00:52:18,850 --> 00:52:19,660 we have a payload. 580 00:52:19,820 --> 00:52:21,190 Oh so many bytes. 581 00:52:21,750 --> 00:52:25,460 Okay wrong way. 582 00:52:25,490 --> 00:52:31,540 Call it a X so not it's known. 583 00:52:32,000 --> 00:52:32,430 Okay. 584 00:52:32,490 --> 00:52:35,290 Well here which is shown as rogue 585 00:52:38,810 --> 00:52:40,250 let's use these 586 00:52:45,280 --> 00:52:47,650 we are seen as a bulk user. 587 00:52:47,850 --> 00:52:48,330 Okay. 588 00:52:50,430 --> 00:52:51,980 In and in. 589 00:52:52,330 --> 00:52:53,150 All right. 590 00:52:53,150 --> 00:53:03,440 So let's go to home to see some file let's try to find some directory as it says before and then have 591 00:53:07,080 --> 00:53:08,080 the less 592 00:53:13,070 --> 00:53:13,420 than 593 00:53:16,680 --> 00:53:19,590 2 to. 594 00:53:19,810 --> 00:53:26,030 So let's see if there is some kind of privileges or permissions or something like that taking sort of 595 00:53:26,120 --> 00:53:26,420 minus 596 00:53:29,150 --> 00:53:29,810 one. 597 00:53:32,470 --> 00:53:34,810 Maggie would know buzzword 598 00:53:38,010 --> 00:53:49,460 can use it without using a personal Oh could you do this thing. 599 00:54:03,700 --> 00:54:04,130 Copy 600 00:54:08,100 --> 00:54:18,090 a 9 to 10. 601 00:54:18,150 --> 00:54:30,140 Now we can type sudo command home and just to find and to see dinner and there we were get if you as 602 00:54:30,140 --> 00:54:33,380 would c o care. 603 00:54:33,590 --> 00:54:39,200 Now we have escalated that we are here now as wood as [REMOVED]. 604 00:54:39,520 --> 00:54:41,980 Okay. 605 00:54:43,520 --> 00:54:44,830 Okay that's great. 606 00:54:44,840 --> 00:54:45,920 Okay guys. 607 00:54:45,920 --> 00:54:51,820 So who you know. 608 00:54:54,130 --> 00:54:55,730 You lose 609 00:54:58,960 --> 00:54:59,690 so. 610 00:54:59,780 --> 00:55:00,570 Okay. 611 00:55:00,790 --> 00:55:02,170 By being here. 612 00:55:02,170 --> 00:55:12,350 Now we can find to to read anything any fire just using cut or cut is good common. 613 00:55:12,410 --> 00:55:18,250 That is a very good tool that we use for reading fires inside it coming out of what it's up to you can 614 00:55:18,370 --> 00:55:25,420 Derek go through the path and then try to open you up which are not part of all we do I command it's 615 00:55:25,420 --> 00:55:26,570 up to days. 616 00:55:26,600 --> 00:55:30,210 So no let's check if we can read something. 617 00:55:30,460 --> 00:55:32,520 Oh okay. 618 00:55:32,920 --> 00:55:39,760 So that's all for this nature that we were really thinking that this video was informative for you all 619 00:55:40,570 --> 00:55:48,150 so that we are looking forward to see you in the next video for another exploitation of of a new rule 620 00:55:48,290 --> 00:55:49,840 or clearing system. 621 00:55:49,840 --> 00:55:50,410 Thank you.