1 00:00:00,280 --> 00:00:05,790 And Lou everybody when it comes to my advanced ethical hacking networking penetration texting cause 2 00:00:16,260 --> 00:00:17,800 and all but again. 3 00:00:18,040 --> 00:00:23,790 So in this video we are going to cover the part of shell shock attack. 4 00:00:24,120 --> 00:00:34,080 Okay so we can try to use MSF consortia so that we can try to make it we first DCP attack so we can 5 00:00:34,080 --> 00:00:37,820 try to find someone to decode information about what is it exactly. 6 00:00:38,070 --> 00:00:47,190 So it can go on your Google all on a list stop Virginia and then you try to type CV in which is a common 7 00:00:47,190 --> 00:00:48,720 one abbreviation for. 8 00:00:48,750 --> 00:00:49,790 Come on. 9 00:00:49,800 --> 00:00:52,900 Well no airborne exposure. 10 00:00:54,060 --> 00:01:02,550 And then you can try to degrade he'll look for this scanning as always so we are going to use and map 11 00:01:02,550 --> 00:01:06,620 Tor and Mottola can be used on television picture vulnerabilities. 12 00:01:06,630 --> 00:01:09,750 What number of some mashing. 13 00:01:10,830 --> 00:01:21,590 We are going also to try not only to map the IP address but we will try to inject a shared shell shock 14 00:01:21,890 --> 00:01:27,920 script and side of the comment so that we can get much more information and then and then it will show 15 00:01:27,980 --> 00:01:31,640 us some pause in some vulnerabilities of that mushy 16 00:01:35,340 --> 00:01:36,010 okay. 17 00:01:36,090 --> 00:01:40,080 So now it can go to stop Virgin's thought 18 00:01:47,360 --> 00:01:48,450 and then you put another 19 00:01:51,890 --> 00:01:54,630 cone can go to go to this first 20 00:02:02,180 --> 00:02:07,950 it's gonna take your idea and destroy our society to the year 2014 year again. 21 00:02:11,950 --> 00:02:12,290 Okay. 22 00:02:12,340 --> 00:02:12,700 Okay. 23 00:02:12,730 --> 00:02:13,170 It's here. 24 00:02:13,450 --> 00:02:13,720 So. 25 00:02:13,780 --> 00:02:14,180 Yeah. 26 00:02:14,920 --> 00:02:16,180 So what are gonna do. 27 00:02:16,180 --> 00:02:24,310 You're going to go and try to download it after being downloaded and then you have to start it on your 28 00:02:24,310 --> 00:02:25,420 virtual box machine 29 00:02:28,360 --> 00:02:30,790 we have to go here and then we dive. 30 00:02:31,780 --> 00:02:36,350 Yes of course. 31 00:02:58,850 --> 00:02:59,250 OK. 32 00:02:59,280 --> 00:02:59,970 And then here. 33 00:03:00,000 --> 00:03:03,390 So you just click on downloads that you can download it. 34 00:03:03,530 --> 00:03:03,990 Okay. 35 00:03:04,230 --> 00:03:07,990 So we have it already downloadable on all computer. 36 00:03:08,000 --> 00:03:11,580 So now it's just a matter of started it and you're in a virtual box. 37 00:03:11,910 --> 00:03:17,260 So we we go there you know which our box machine then he uses. 38 00:03:17,400 --> 00:03:20,610 He of course we get on with some food changes as usual. 39 00:03:20,720 --> 00:03:26,790 Your first and first since the Kelly is or attack with machine is or we are going to check on which 40 00:03:26,970 --> 00:03:35,610 network adapter it is connected so that we can set up or CVA in 2014 in the same on the same network. 41 00:03:36,030 --> 00:03:36,410 Okay. 42 00:03:36,420 --> 00:03:42,410 So here we are in the network our network forward with carry machine is on glitched adapter so we gonna 43 00:03:42,450 --> 00:03:43,770 do the same thing as well. 44 00:03:44,160 --> 00:03:49,310 And then for us it's the here net new it's me. 45 00:03:49,350 --> 00:03:50,610 It should be here. 46 00:03:50,670 --> 00:03:51,930 OK good. 47 00:03:51,930 --> 00:03:52,800 So now we can check. 48 00:03:52,800 --> 00:03:54,090 Okay so there you go. 49 00:03:54,120 --> 00:03:56,100 Okay now it's getting replace it. 50 00:03:56,310 --> 00:04:06,430 So now we can start it like that in so where would demand you really shouldn't take so long. 51 00:04:08,780 --> 00:04:09,310 Okay. 52 00:04:09,470 --> 00:04:09,730 Okay. 53 00:04:09,750 --> 00:04:10,420 Here we are. 54 00:04:10,640 --> 00:04:13,390 Stood Up here we can type some comment. 55 00:04:13,680 --> 00:04:21,030 But as usual so we can try to type we thing because it's the terminal appearance so that we don't need 56 00:04:21,030 --> 00:04:22,010 to blow again. 57 00:04:22,020 --> 00:04:23,460 It's not a matter of that. 58 00:04:23,460 --> 00:04:28,630 In the meantime you OK your IP address is 1 7 4. 59 00:04:28,650 --> 00:04:31,820 Okay now we can try to start okay. 60 00:04:32,010 --> 00:04:38,720 As the attack machine and internet can use the midterms board to make the Weavers share to 61 00:04:42,240 --> 00:04:51,370 so we start cutting machine e we can minimize it. 62 00:04:55,630 --> 00:04:57,140 So it's going to take a while. 63 00:04:58,790 --> 00:05:00,910 So yeah 64 00:05:05,630 --> 00:05:14,080 you can read much more information about this what it is but was the New Ability Found in 2014 and how 65 00:05:14,120 --> 00:05:21,330 now it is much more secure and the stuff right that Okay so. 66 00:05:21,330 --> 00:05:26,500 Okay lean machine is really tight before you show name of UPS. 67 00:05:26,520 --> 00:05:32,560 We had a mistake come so again for us. 68 00:05:35,640 --> 00:05:37,320 Okay now what we going to do. 69 00:05:37,530 --> 00:05:47,210 We are going to try if in cutting machine we can which the IP address of the shell shock machine and 70 00:05:47,210 --> 00:05:49,410 then we are going to put it through another it. 71 00:05:49,630 --> 00:05:55,160 We know we can change all the colors. 72 00:05:55,470 --> 00:06:02,910 Would it mean the difference is oh I don't need clothes. 73 00:06:03,680 --> 00:06:05,140 Green I'm black. 74 00:06:05,630 --> 00:06:06,210 Not. 75 00:06:06,330 --> 00:06:07,730 All right. 76 00:06:07,950 --> 00:06:10,440 Quotas okay. 77 00:06:10,500 --> 00:06:11,180 No. 78 00:06:11,220 --> 00:06:15,510 First thing first thing when I try to define or interface. 79 00:06:15,510 --> 00:06:24,480 Okay then now I can try to be the IP address of the shell shock machine. 80 00:06:24,630 --> 00:06:28,470 So what was it. 81 00:06:28,620 --> 00:06:29,030 Yeah. 82 00:06:30,390 --> 00:06:35,460 Okay. 83 00:06:41,610 --> 00:06:44,840 This is okay. 84 00:06:44,860 --> 00:06:50,910 If you see something like that that means it is warning and all kind of machine can reach it. 85 00:06:50,910 --> 00:06:55,250 So now we're going up with control controversy in stop is common. 86 00:06:55,470 --> 00:06:56,430 What can now. 87 00:06:56,670 --> 00:07:02,720 We are going to use a tool which name is and map from previous videos. 88 00:07:02,730 --> 00:07:10,980 We use it a lot for coming any IP so that we can find those port on which these servers are wanting 89 00:07:11,070 --> 00:07:17,940 us to find that much more information which port opened or which one we all which ones are closed and 90 00:07:17,940 --> 00:07:19,180 map will help us. 91 00:07:19,190 --> 00:07:20,440 So in all concerned. 92 00:07:20,670 --> 00:07:25,790 So we're going to try to map this IP address so start it. 93 00:07:26,250 --> 00:07:29,310 If you want as well you can use it z map. 94 00:07:29,370 --> 00:07:32,080 It's a graphical interface forthcoming. 95 00:07:32,960 --> 00:07:33,430 OK. 96 00:07:33,480 --> 00:07:47,330 So and map planes this the B and B minus in a year we are going to see if that is knowable much. 97 00:07:47,370 --> 00:07:53,440 I mean if our target matching is a renewable two shell shock attack. 98 00:07:53,610 --> 00:08:00,120 So by the sound of it we are going to inject a squib in Cali build machine. 99 00:08:00,150 --> 00:08:02,600 So Kylie comes with this quick like that. 100 00:08:03,360 --> 00:08:07,990 If we take D squared she will be. 101 00:08:08,210 --> 00:08:21,930 So for each GDP then it is to be shell shock like it described is a build script. 102 00:08:21,960 --> 00:08:28,830 So if Why are you trying it and it does it work for you it's just a matter of updating your Kali machine 103 00:08:28,830 --> 00:08:30,520 because it should be there. 104 00:08:30,600 --> 00:08:31,000 Okay. 105 00:08:31,020 --> 00:08:36,620 And then now we take the IP address and send it to us. 106 00:08:37,680 --> 00:08:46,920 This one and then I'm going to present or present them and then I'm going to put it injury ticks on 107 00:08:47,190 --> 00:08:49,950 about one minute two minutes. 108 00:08:50,600 --> 00:08:51,500 Okay. 109 00:08:51,540 --> 00:08:55,660 He doesn't even that long. 110 00:08:55,710 --> 00:09:05,030 So we have some board which are open to get open it assesses is open and a patch server is open there. 111 00:09:05,030 --> 00:09:05,870 All right. 112 00:09:05,880 --> 00:09:09,270 So now the next to what are we going to do. 113 00:09:13,750 --> 00:09:22,270 No we want to get to the command of this machine formerly of whom disk Kali machine. 114 00:09:22,280 --> 00:09:25,710 This copy machine represents what was the attacker machine. 115 00:09:26,000 --> 00:09:27,160 So how can we do that. 116 00:09:27,400 --> 00:09:27,840 Okay. 117 00:09:27,850 --> 00:09:32,910 So we're good at showing you we have a famous myth that's brought me that spot as a common console. 118 00:09:32,920 --> 00:09:37,490 We should have to tape estimate MSF console in New casino. 119 00:09:39,310 --> 00:09:47,950 If your meter spot is old we will require you to update the version because as you update your version 120 00:09:47,980 --> 00:09:53,880 and the new you have much more qualities you have much more possibilities so that you can cook or you 121 00:09:53,880 --> 00:09:58,510 so that you can get access to to any new reliability system. 122 00:09:59,140 --> 00:10:00,910 OK so. 123 00:10:01,250 --> 00:10:04,660 OK so before getting here to auction. 124 00:10:05,380 --> 00:10:05,560 OK. 125 00:10:05,830 --> 00:10:06,210 OK. 126 00:10:06,720 --> 00:10:07,280 OK. 127 00:10:07,280 --> 00:10:17,780 And if I am forgetting there as in we are life in we already you would have access of the victim machine 128 00:10:18,220 --> 00:10:21,630 but since who since we are here on virtual books. 129 00:10:21,670 --> 00:10:24,180 So that means physically we have access to do it. 130 00:10:24,220 --> 00:10:24,760 OK. 131 00:10:24,790 --> 00:10:31,940 So we can just show a really quick comment that we have type it to here on the victim machine. 132 00:10:32,030 --> 00:10:36,410 Uri you can take it in me and give it to machine. 133 00:10:36,430 --> 00:10:36,720 OK. 134 00:10:36,760 --> 00:10:45,760 Assuming that for me for me here for meters but you already have the full control of this machine you 135 00:10:45,760 --> 00:10:53,230 already have the to give full control of this machine and then you can inject some script there from 136 00:10:53,230 --> 00:10:53,710 here. 137 00:10:54,010 --> 00:10:54,460 All right. 138 00:10:54,670 --> 00:10:55,400 So let's go. 139 00:10:55,580 --> 00:11:07,580 So look it up Ian me and then X equal stuff and then the bone disease and could work its curing proteins 140 00:11:08,170 --> 00:11:22,510 and then we can type space does not work and then we take a clone or an equal and put up a block so 141 00:11:22,560 --> 00:11:29,460 anything we type after what it could do is usually when you type in court and then Bruce is tween. 142 00:11:29,470 --> 00:11:42,300 So it is it prints this tweet that you take after equal care to brother John and then it grows it it 143 00:11:42,310 --> 00:11:51,860 grows it will stop and take mine will see it go oh I am doing in time here. 144 00:11:51,920 --> 00:11:53,250 Anything. 145 00:11:53,560 --> 00:12:00,530 I mean that's the items that these nice gain is intended to close it again. 146 00:12:00,880 --> 00:12:01,420 Okay. 147 00:12:05,370 --> 00:12:13,160 If Y depressing Inder it gives you two string blah blah blah and all right men. 148 00:12:13,200 --> 00:12:17,840 That means this machine is already who knowable were discrete Shell 149 00:12:22,210 --> 00:12:34,930 can only imagine it was into the we were s o k we could it was it's. 150 00:12:35,200 --> 00:12:41,220 Okay people were really having Mr. Gale like that. 151 00:12:42,410 --> 00:12:42,950 Okay. 152 00:12:43,190 --> 00:12:51,890 So you see guys it it brings the truth trees the two streams that we have that we have area the Brad 153 00:12:51,890 --> 00:12:53,480 Rajan and blah. 154 00:12:53,490 --> 00:12:55,100 White men and that is nice. 155 00:12:55,100 --> 00:13:00,260 So that means this machine is really vulnerable little shell shock attack. 156 00:13:00,650 --> 00:13:03,590 So in what if they had go said to himself. 157 00:13:03,620 --> 00:13:04,040 Okay. 158 00:13:04,070 --> 00:13:10,390 So if I can inject some squib like that so I'm going to try to find something more. 159 00:13:10,460 --> 00:13:11,000 Which one. 160 00:13:11,000 --> 00:13:14,640 Everything in D in his computer you know. 161 00:13:14,660 --> 00:13:22,220 And then we try this one again and say Now I don't need to see blah blah blah blah. 162 00:13:22,640 --> 00:13:31,730 So I need to see some face inside is instead of a system and then he can just type it for example not 163 00:13:31,790 --> 00:13:41,540 equal but this this technique used car come in and then try to go to the C BTC and password password 164 00:13:42,940 --> 00:13:50,870 and this fire on Carly mentioned mostly on a Linux machine contains a lot of information about the username 165 00:13:50,870 --> 00:13:53,420 and password of the log in mashing. 166 00:13:53,420 --> 00:13:56,230 So I you know we're going to poison her. 167 00:13:56,930 --> 00:13:58,650 Here we are. 168 00:13:58,650 --> 00:14:00,280 Here she was me. 169 00:14:00,620 --> 00:14:02,920 So we see you. 170 00:14:03,140 --> 00:14:10,360 It has a user name as wood and then the password is as wood as well. 171 00:14:10,430 --> 00:14:13,860 And then you know how to use it and nobody. 172 00:14:13,940 --> 00:14:23,120 And we as we have said earlier everything that is before the ex everything that is before the eggs for 173 00:14:23,120 --> 00:14:34,940 example here here we have wood with a moment I have the joke of my mind here. 174 00:14:35,330 --> 00:14:46,660 OK here here we have wood EEGs everything that is before the Eagles is considered as being a user here. 175 00:14:46,740 --> 00:14:49,470 This is one music I don't use it or lose it. 176 00:14:49,500 --> 00:14:51,490 I don't use it and I'll use it. 177 00:14:51,940 --> 00:14:52,590 Okay it. 178 00:14:52,620 --> 00:14:54,030 So this is fun. 179 00:14:54,030 --> 00:14:54,840 Does think so. 180 00:14:55,030 --> 00:14:55,910 But is someone I. 181 00:14:55,980 --> 00:14:57,150 It is. 182 00:14:57,150 --> 00:14:59,970 It is vulnerable to suit too shell shock attack. 183 00:15:00,100 --> 00:15:00,470 Okay. 184 00:15:00,510 --> 00:15:03,780 No let's go back to all emotion and then we can type. 185 00:15:03,810 --> 00:15:12,600 We can try to find out how to interpret his B.S. from our own side. 186 00:15:13,110 --> 00:15:13,690 All right. 187 00:15:14,010 --> 00:15:20,830 Okay so now for grant type use use expert muti Hendra. 188 00:15:22,560 --> 00:15:36,280 It's empty and replacing No no old dog between enlightenment 189 00:15:38,980 --> 00:15:40,030 okay. 190 00:15:40,160 --> 00:15:45,260 So now what we have to do we can after every comment if we want to take. 191 00:15:45,410 --> 00:15:52,460 Sure auction show auction auctions case and nothing is set up now. 192 00:15:52,520 --> 00:15:55,000 So what are we going to do. 193 00:15:55,040 --> 00:16:02,400 We are going to said Oh we tried to host our look port so that we can send them up. 194 00:16:03,230 --> 00:16:07,520 Okay so we're going to go step by step. 195 00:16:10,640 --> 00:16:17,230 Again day two said Sid it's a demo. 196 00:16:17,620 --> 00:16:25,350 It was the IP address of what cutting machine it is what we don't know yet. 197 00:16:25,360 --> 00:16:27,270 Do we open a new deal we know. 198 00:16:28,060 --> 00:16:33,650 And then we type 1 3 1 5 9. 199 00:16:33,720 --> 00:16:34,680 Okay. 200 00:16:34,900 --> 00:16:45,720 You can just copy us you know positive okay. 201 00:16:46,360 --> 00:16:49,500 So now what are we gonna do with. 202 00:16:49,930 --> 00:16:50,850 Into. 203 00:16:50,890 --> 00:16:51,290 Okay. 204 00:16:51,310 --> 00:16:56,570 So we do the same thing for report for. 205 00:16:56,710 --> 00:16:59,450 You can use any put number it's a ball. 206 00:16:59,980 --> 00:17:00,520 This one. 207 00:17:01,680 --> 00:17:01,990 Okay. 208 00:17:02,010 --> 00:17:02,440 Okay. 209 00:17:02,490 --> 00:17:03,590 Again children's 210 00:17:07,780 --> 00:17:09,220 shoe. 211 00:17:09,540 --> 00:17:10,000 Okay. 212 00:17:10,140 --> 00:17:11,400 So we have the same payload. 213 00:17:11,880 --> 00:17:20,220 Well said we load and then which evolution. 214 00:17:20,510 --> 00:17:22,990 This is the old UNIX invasion. 215 00:17:23,040 --> 00:17:25,840 Okay so now you can try. 216 00:17:26,940 --> 00:17:33,120 Let's say that this in his vision you mean Chinese one Linux 217 00:17:36,590 --> 00:17:53,490 Unix display or you know Linux new media if we do it again lose natural. 218 00:17:53,500 --> 00:18:03,550 This one these X 64 64. 219 00:18:03,780 --> 00:18:10,440 Do you know what you do in the modern world. 220 00:18:10,460 --> 00:18:17,040 Bruce DCP and any presenter became another control option options. 221 00:18:17,850 --> 00:18:18,380 OK. 222 00:18:18,400 --> 00:18:20,930 Yo yo yo yo. 223 00:18:20,950 --> 00:18:22,440 Good so far. 224 00:18:23,220 --> 00:18:23,900 Okay. 225 00:18:24,010 --> 00:18:27,210 Now why do we have to do. 226 00:18:27,560 --> 00:18:29,560 Soon to be there. 227 00:18:29,590 --> 00:18:35,570 We're going to try to set up a file. 228 00:18:35,770 --> 00:18:36,640 That file. 229 00:18:36,640 --> 00:18:45,360 It's a kind of virus so that when the user clicked on that virus on that file automatically we get to 230 00:18:45,520 --> 00:18:55,280 East system so we can use it really when an uncommon for me to explode payload it is named as MSF known. 231 00:18:55,840 --> 00:19:00,330 So for days you will not type MSF in on. 232 00:19:02,330 --> 00:19:07,370 MSF MSF they're known to been on. 233 00:19:07,470 --> 00:19:17,120 And then what you're going to type after you're going to type minus B its. 234 00:19:17,450 --> 00:19:19,130 That you. 235 00:19:19,490 --> 00:19:21,410 Well what do 236 00:19:25,310 --> 00:19:26,410 you do with your 237 00:19:31,230 --> 00:19:36,130 reverse B DCP. 238 00:19:38,280 --> 00:19:44,610 Applause was equal voice control shifting V. 239 00:19:44,980 --> 00:19:50,630 If I stayed there name calling for it. 240 00:19:50,760 --> 00:19:51,190 Easy. 241 00:19:51,190 --> 00:19:53,470 Quite a lot. 242 00:19:53,590 --> 00:19:59,640 Nobody is equal 45 to 54. 243 00:20:00,060 --> 00:20:01,160 All right. 244 00:20:01,270 --> 00:20:05,370 Minus an F Jon minus a B. 245 00:20:05,470 --> 00:20:11,820 Both characters in quotes slash mark leagues. 246 00:20:11,890 --> 00:20:14,020 There was a. 247 00:20:14,320 --> 00:20:16,000 So this is it was you. 248 00:20:16,720 --> 00:20:20,050 This one is representing what was the back characters. 249 00:20:20,050 --> 00:20:32,600 Okay so now I'm gonna take these e and i they put it in all this though would stop 250 00:20:35,530 --> 00:20:36,170 then yeah. 251 00:20:36,250 --> 00:20:42,690 So they failed the animal if I will be blah blah blah. 252 00:20:43,530 --> 00:20:44,240 No. 253 00:20:46,270 --> 00:20:49,700 Gail it's just it's just pure was it again. 254 00:20:50,140 --> 00:20:50,740 It is 255 00:20:53,940 --> 00:20:54,800 gay. 256 00:20:54,800 --> 00:20:56,190 And then we're gonna put a note 257 00:21:01,050 --> 00:21:01,730 Gail it's 258 00:21:05,420 --> 00:21:06,000 me. 259 00:21:06,140 --> 00:21:13,900 It's only grade no platform to succeed in doing channel. 260 00:21:14,030 --> 00:21:15,870 You couldn't do it each year. 261 00:21:15,880 --> 00:21:16,540 No chance. 262 00:21:17,380 --> 00:21:18,000 Okay. 263 00:21:18,070 --> 00:21:24,660 Now we have to type in midterms both exploit so right away. 264 00:21:24,940 --> 00:21:32,460 How now we can try to figure out a way so that so that the victim may get disciplined. 265 00:21:32,890 --> 00:21:41,650 And then you can try to send him this link to a web browser and then inside him to click on it. 266 00:21:42,040 --> 00:21:43,040 Oh right. 267 00:21:43,730 --> 00:21:46,930 So after that you gonna explode. 268 00:21:47,310 --> 00:21:49,880 But before you can open up a new terminal. 269 00:21:49,940 --> 00:22:04,510 And then you know it's a new start your upper shift server so reset that barge to start start and then 270 00:22:04,780 --> 00:22:07,060 mysteriously it's it's winning. 271 00:22:07,270 --> 00:22:14,140 You can try to put this fine in a little closed server machines and see this grow again. 272 00:22:14,140 --> 00:22:23,530 Then you move to a new demand within there. 273 00:22:24,130 --> 00:22:27,090 So as you can see it's not there anymore. 274 00:22:27,100 --> 00:22:37,420 So if you want to check in goes the middle of the abilities and then it was intended less so that you 275 00:22:37,420 --> 00:22:39,790 can see looking it is there. 276 00:22:39,820 --> 00:22:42,520 So our flash service is already starting. 277 00:22:42,520 --> 00:22:53,170 So now we can try to type you explored explored and then I'm calling machine now is ready for the attack 278 00:22:53,650 --> 00:23:01,120 by any what we want now we want the victim to go in clique of it so that we can get access to his system. 279 00:23:01,750 --> 00:23:07,880 Okay now we have an attack machine. 280 00:23:07,930 --> 00:23:16,090 It's winning the one thing that we have to do is wait to do 15 clicks on a link. 281 00:23:16,120 --> 00:23:24,190 So very way in the next video we are going to show you how criminals exploitation B and B functional 282 00:23:24,370 --> 00:23:33,460 B and B win because for now it's just a matter of how to set up your attacker machine so that you setting 283 00:23:34,000 --> 00:23:42,160 for the particular victim whenever your victim clicks on your own or your fights and get it on Duke's 284 00:23:42,190 --> 00:23:46,810 system automatically you have full control of his computer. 285 00:23:46,810 --> 00:23:54,270 And then while he's doing his stuff while watching YouTube or play games so you can shut him down or 286 00:23:54,310 --> 00:23:56,140 you can even changes password. 287 00:23:56,140 --> 00:23:56,590 OK. 288 00:23:56,710 --> 00:24:01,270 So in this video we are going to show you all these things we are looking forward to seeing you in the 289 00:24:01,270 --> 00:24:01,810 next video. 290 00:24:02,290 --> 00:24:02,620 Thank you.