1 00:00:00,260 --> 00:00:05,700 And look everybody when it comes to my advanced ethical hacking networking penetration testing cause 2 00:00:16,900 --> 00:00:23,870 this or we going to be focused on the immigration and exploitation of this stuff pro food and a web 3 00:00:23,870 --> 00:00:25,190 of motion. 4 00:00:25,330 --> 00:00:30,610 It's going to be very interesting because it has so many ways so that we can get to we've just shared 5 00:00:30,700 --> 00:00:33,790 access so that we can hack this system. 6 00:00:34,150 --> 00:00:40,280 OK so let's go and try to go on audit and then configure it according to color and expression. 7 00:00:40,300 --> 00:00:43,500 I mean the machine so that we can work with this sub. 8 00:00:43,570 --> 00:00:46,610 Okay let's go first of all to the link that I have provided you. 9 00:00:47,650 --> 00:00:48,660 It's this one. 10 00:00:48,700 --> 00:00:51,520 So you go and search for stuff right. 11 00:00:51,520 --> 00:00:52,360 It is. 12 00:00:52,560 --> 00:00:52,920 OK. 13 00:00:53,260 --> 00:01:00,570 And then you could be displaying copy and copy and you can minimize it again. 14 00:01:01,980 --> 00:01:04,890 And then you go here and pass it the 15 00:01:07,840 --> 00:01:09,990 control the entire 16 00:01:13,190 --> 00:01:13,880 okay. 17 00:01:13,960 --> 00:01:18,030 So you click here to download it after being downloaded. 18 00:01:18,100 --> 00:01:24,880 So you have to go to the derrick toy fire and then you double click on it to import it to your virtual 19 00:01:24,880 --> 00:01:29,810 box as we can see it is as a zip file. 20 00:01:29,980 --> 00:01:35,480 So first thing first you want to have to extract it obviously. 21 00:01:35,500 --> 00:01:36,020 OK. 22 00:01:36,130 --> 00:01:38,900 So no one is or path. 23 00:01:39,490 --> 00:01:41,720 Can you. 24 00:01:42,060 --> 00:01:50,640 And then we have it already here or we can try to go to Google which books machine is standing right 25 00:01:51,940 --> 00:01:53,620 where it is. 26 00:01:53,850 --> 00:01:54,650 Come on. 27 00:01:55,150 --> 00:01:55,530 OK. 28 00:01:55,870 --> 00:02:04,540 So you double click it since I'm a Mac so I know how to right click and then find its target because 29 00:02:04,630 --> 00:02:06,460 it's just a double click and then that's it 30 00:02:09,640 --> 00:02:09,960 OK. 31 00:02:10,000 --> 00:02:10,580 Go with him. 32 00:02:10,620 --> 00:02:15,540 And it will be so quick Oh good. 33 00:02:15,550 --> 00:02:17,810 So here we are. 34 00:02:17,830 --> 00:02:20,470 Now we go here to this tablet. 35 00:02:20,830 --> 00:02:31,080 And then we have to click on the oh the F Fi and we double click it OK so here we're going to make some 36 00:02:31,290 --> 00:02:34,540 few changes. 37 00:02:35,080 --> 00:02:37,300 You can be made according to what you want. 38 00:02:37,650 --> 00:02:45,600 So let's say John Stouffer stop it and then click on import import 39 00:02:49,160 --> 00:02:54,990 again it's going to be imported going to Ed 40 00:02:58,110 --> 00:03:03,800 as we try to defrost them after importing it is to start your operating system. 41 00:03:04,200 --> 00:03:07,070 So you'll go down in there you click Start. 42 00:03:07,170 --> 00:03:13,550 But before we have to be aware of the current Unix network adapter on which network it is wanted. 43 00:03:13,770 --> 00:03:21,830 So let's go to you click on color machine in details to see if it is unweighted adapter Wi-Fi OK is 44 00:03:21,840 --> 00:03:25,080 or or stumble one must be the same. 45 00:03:25,320 --> 00:03:29,060 So let's go to your first display. 46 00:03:29,070 --> 00:03:33,370 Can you go on to see some discussion. 47 00:03:33,600 --> 00:03:40,530 You know we have enjoy have fun filling in multiple methods to do this at least to this both. 48 00:03:40,670 --> 00:03:41,120 OK. 49 00:03:41,610 --> 00:03:44,320 It's just the discussion doesn't matter. 50 00:03:45,250 --> 00:03:45,720 Okay. 51 00:03:46,760 --> 00:03:47,630 OK. 52 00:03:47,720 --> 00:03:49,510 To this system. 53 00:03:49,700 --> 00:03:51,030 OK. 54 00:03:51,090 --> 00:03:52,370 Everything is OK on green. 55 00:03:53,130 --> 00:03:53,660 Okay. 56 00:03:53,950 --> 00:03:55,070 Okay. 57 00:03:55,230 --> 00:03:56,520 Network was on. 58 00:03:56,550 --> 00:03:58,800 So we have to change it according to carry machine. 59 00:03:59,040 --> 00:04:03,920 So the old Carly was on Wichita return and we have to put it exactly on Bridget. 60 00:04:03,960 --> 00:04:05,560 Here we are on Wi-Fi. 61 00:04:05,640 --> 00:04:08,970 We are on cable but we don't need cable now. 62 00:04:09,150 --> 00:04:10,470 We change it to Wi-Fi. 63 00:04:10,470 --> 00:04:17,090 This is why I always advise you guys to check your network adapter because on a kind of. 64 00:04:17,150 --> 00:04:18,210 Well when Wi-Fi. 65 00:04:18,210 --> 00:04:23,310 And then now it is automatically set setup as a n. 66 00:04:23,460 --> 00:04:24,630 So we have to change it. 67 00:04:24,650 --> 00:04:30,890 Otherwise it will not work when we are trying to discover the IP address of this stuff. 68 00:04:31,310 --> 00:04:35,510 OK and in no case with cocaine OK. 69 00:04:35,520 --> 00:04:36,210 Here we go. 70 00:04:36,210 --> 00:04:37,590 Now we can start it. 71 00:04:37,780 --> 00:04:38,660 We started. 72 00:04:38,670 --> 00:04:43,430 And then after we have to start all candy machine that's where I go to. 73 00:04:43,470 --> 00:04:44,160 And then we start. 74 00:04:44,160 --> 00:04:45,470 Both of them. 75 00:04:45,470 --> 00:04:48,180 And then we can minimize this window. 76 00:04:48,320 --> 00:04:48,890 All right. 77 00:04:48,900 --> 00:04:50,880 Oh again just crazy to put whatever it might. 78 00:04:51,580 --> 00:04:52,980 So we've got a place in there. 79 00:04:52,980 --> 00:04:54,800 Oh it's so weak. 80 00:04:54,920 --> 00:04:55,410 It's OK. 81 00:04:57,050 --> 00:04:58,100 It's working. 82 00:04:58,200 --> 00:05:02,100 So we're going to wait till all operating systems are loading. 83 00:05:03,150 --> 00:05:03,850 OK. 84 00:05:03,990 --> 00:05:11,040 So our carry machine is okay so that we can enter our credentials so that we can log in. 85 00:05:11,040 --> 00:05:11,520 Of course. 86 00:05:12,730 --> 00:05:13,750 Yes check. 87 00:05:13,940 --> 00:05:14,650 OK. 88 00:05:14,690 --> 00:05:19,260 So stop the machine is there to straighten something. 89 00:05:19,340 --> 00:05:33,350 The password being let's see you go with me would would response one. 90 00:05:34,010 --> 00:05:34,550 OK. 91 00:05:34,790 --> 00:05:39,040 So our task is to find a way to get into this system. 92 00:05:39,050 --> 00:05:45,870 Let's go back to our carry machine old password. 93 00:05:46,210 --> 00:05:57,070 Oh I have to put my Wi-Fi on because we are on we should add up the Wi-Fi on in great okay. 94 00:05:57,100 --> 00:06:07,750 So as usual your first task is going to be that search of the IP address of that StubHub result. 95 00:06:07,750 --> 00:06:15,860 Now when I open up or turn on don't quote me on and then fine. 96 00:06:15,870 --> 00:06:20,570 First things first on which wireless network. 97 00:06:20,670 --> 00:06:24,270 We are an indoor first type. 98 00:06:24,420 --> 00:06:29,590 I don't know why this extension is easy. 99 00:06:29,590 --> 00:06:34,930 The issue is when we can type and discover minus I. 100 00:06:34,940 --> 00:06:41,480 And then oh why is it do and request zeal so that we get the IP address. 101 00:06:42,240 --> 00:06:47,580 OK so few changes over on the move move it up. 102 00:06:48,280 --> 00:06:48,560 Whether 103 00:06:51,750 --> 00:06:54,600 Okay now we're going to have to end speed. 104 00:06:54,720 --> 00:06:55,880 Okay. 105 00:06:55,980 --> 00:06:57,500 And map and then minus B. 106 00:06:57,510 --> 00:07:08,220 And then you take the IP address of your stop machine and you enter and then I will go to we'd all kind 107 00:07:08,220 --> 00:07:11,180 of information of that all we get. 108 00:07:11,190 --> 00:07:11,960 Okay. 109 00:07:12,060 --> 00:07:14,700 We have port Tony. 110 00:07:14,850 --> 00:07:18,030 It is closed FTB that FCP that it's closed. 111 00:07:18,230 --> 00:07:18,570 Okay. 112 00:07:18,600 --> 00:07:26,090 The one which is open is 21 DCP FTB look if he s FTB D good luck Ray vision 8. 113 00:07:26,840 --> 00:07:27,680 Okay. 114 00:07:28,010 --> 00:07:34,860 And then let's go below what we know below what 20 to the stage is open. 115 00:07:34,880 --> 00:07:37,090 So that's good that's very good. 116 00:07:37,230 --> 00:07:39,830 Open domain to any fifty two. 117 00:07:39,870 --> 00:07:41,390 Dennis minus again. 118 00:07:42,420 --> 00:07:54,080 So let's go below below on my school offered up Bush is wanting on Twitter and tweet a tweet. 119 00:07:54,360 --> 00:08:02,490 So we're gonna go to all web server to do all but Bowser so we can pass the number there. 120 00:08:03,010 --> 00:08:14,250 Okay so now all I'm gonna do now we're going to try to install the F DP services because as we have 121 00:08:14,250 --> 00:08:20,790 already tested it and we didn't have it yet or cutting machines we have to have it installed can proceed 122 00:08:21,060 --> 00:08:22,270 with the expectation. 123 00:08:23,040 --> 00:08:25,650 And in relation right. 124 00:08:25,830 --> 00:08:27,950 So well ok. 125 00:08:28,290 --> 00:08:29,630 So the process is running. 126 00:08:30,140 --> 00:08:30,620 OK. 127 00:08:31,050 --> 00:08:36,240 So on your wedding day wedding. 128 00:08:36,540 --> 00:08:36,910 Yeah. 129 00:08:37,260 --> 00:08:38,370 So when did it start. 130 00:08:38,400 --> 00:08:45,610 So that type FTB the IP address of the pro and then was in a game. 131 00:08:46,060 --> 00:08:52,140 So now let's try to go as anonymous and then on remorse. 132 00:08:52,270 --> 00:08:52,920 Okay good. 133 00:08:55,740 --> 00:09:00,050 So an industry that is anyone with a run for it. 134 00:09:00,600 --> 00:09:04,170 So and get naughty because they're not 135 00:09:07,150 --> 00:09:07,890 good. 136 00:09:10,600 --> 00:09:10,880 Okay. 137 00:09:10,910 --> 00:09:13,410 Now let's try to read the content of it. 138 00:09:15,850 --> 00:09:16,640 Okay. 139 00:09:17,350 --> 00:09:20,000 So there is a loose end in which name is John. 140 00:09:21,190 --> 00:09:22,460 So good and free so far so good. 141 00:09:22,470 --> 00:09:26,570 Then Emily is one. 142 00:09:26,710 --> 00:09:28,310 John is the third one. 143 00:09:29,020 --> 00:09:29,280 Okay. 144 00:09:29,290 --> 00:09:29,940 So good. 145 00:09:35,890 --> 00:09:36,380 Okay. 146 00:09:36,410 --> 00:09:37,820 So now what are we going gonna do. 147 00:09:37,840 --> 00:09:46,940 We are going to try to find if we can brute force the user name or John using Darby so that we grab 148 00:09:46,990 --> 00:09:49,910 much more information about him. 149 00:09:50,050 --> 00:09:50,400 Okay. 150 00:09:50,710 --> 00:09:54,880 So do we encourage news as we have known already. 151 00:09:54,880 --> 00:10:03,010 It's a very well known tools that can be used that would force some username and password using a dictionary. 152 00:10:03,010 --> 00:10:04,290 Is that dark. 153 00:10:04,300 --> 00:10:05,490 I do. 154 00:10:05,740 --> 00:10:08,620 Let's just go back and then check. 155 00:10:08,620 --> 00:10:14,390 I would put no it was OK to have to be a zero. 156 00:10:14,750 --> 00:10:17,290 And then now go to your terminal. 157 00:10:18,400 --> 00:10:30,720 So type Darby TTP and then the IP address of stable and deployed and present our kin. 158 00:10:30,940 --> 00:10:35,590 So using it to find is some directories or some things like that. 159 00:10:36,400 --> 00:10:36,810 Mm hmm. 160 00:10:38,060 --> 00:10:41,620 Okay let's find if we can put issue to be is 161 00:10:45,740 --> 00:10:47,510 this okay. 162 00:10:47,510 --> 00:10:53,450 It's funny it's one needs money or kill we have even BHP my admin I can write 163 00:10:56,860 --> 00:10:58,380 so I would be HP might. 164 00:10:58,450 --> 00:11:00,200 Yeah. 165 00:11:00,770 --> 00:11:04,960 All right well as you look at this. 166 00:11:06,830 --> 00:11:10,390 So is an exception. 167 00:11:10,400 --> 00:11:10,790 Yeah. 168 00:11:11,780 --> 00:11:19,380 Oh and we have found two notaries just to duplicate it. 169 00:11:19,410 --> 00:11:25,400 OK so we have a pretty good view up on them to see how it looks. 170 00:11:25,400 --> 00:11:26,410 This couldn't be before 171 00:11:30,040 --> 00:11:30,720 case. 172 00:11:30,760 --> 00:11:40,940 We got to pay slowly as we direction market not as good critics in passing their in was an hour to find 173 00:11:40,950 --> 00:11:43,380 what's there. 174 00:11:43,620 --> 00:11:47,480 You look like a blogger. 175 00:11:48,030 --> 00:11:53,080 As the globe one from Sharon. 176 00:11:53,300 --> 00:11:55,090 But it was nice marker. 177 00:11:55,860 --> 00:12:03,180 So let's see what we can try to use the word press can debit to be scandal one. 178 00:12:03,220 --> 00:12:05,370 Kelly can you tell me no. 179 00:12:05,390 --> 00:12:11,210 Okay so go to it because we know that an intelligent peace can and then you to the GDP of their estimate 180 00:12:11,220 --> 00:12:23,390 put it in a million users and our blog ends are plug in a b d it word is what I see toward it because 181 00:12:23,390 --> 00:12:32,720 we have to disallow it as we have seen earlier and define in a failed path of Firefox and then now we 182 00:12:32,720 --> 00:12:36,760 have to try to see opera deltoid. 183 00:12:36,770 --> 00:12:38,600 Okay. 184 00:12:39,420 --> 00:12:40,450 Will be content. 185 00:12:40,460 --> 00:12:41,570 Very nice. 186 00:12:41,570 --> 00:12:43,940 Okay. 187 00:12:44,530 --> 00:12:47,370 Do try to find more information about it. 188 00:12:47,410 --> 00:12:48,320 Let's check it. 189 00:12:48,710 --> 00:12:55,620 Let's go below below below plug ins wound care. 190 00:12:55,640 --> 00:12:56,150 All right. 191 00:12:56,780 --> 00:13:01,470 So let's try it a word or so to pass the link there. 192 00:13:02,130 --> 00:13:03,200 OK. 193 00:13:03,530 --> 00:13:05,080 Protein ding. 194 00:13:05,490 --> 00:13:14,210 And Derek don't get to five something things out there and something is now wrong in terms of blood 195 00:13:15,040 --> 00:13:19,240 care a machine show quote unquote. 196 00:13:19,350 --> 00:13:27,110 And so many key do the this thing. 197 00:13:27,310 --> 00:13:30,970 There is thing you can just. 198 00:13:31,020 --> 00:13:37,080 Just try to google it or stop paging you know using your search engine and then explode you have to 199 00:13:37,080 --> 00:13:44,850 type it as we have done earlier and the previous video I always try to find if there are some exportation 200 00:13:44,850 --> 00:13:46,980 already done in the past. 201 00:13:47,770 --> 00:13:48,370 OK. 202 00:13:52,110 --> 00:13:52,830 Good. 203 00:13:52,830 --> 00:14:01,740 Now I'm going to try to click here to view that world and copy eat and create a new file in this machine 204 00:14:01,770 --> 00:14:08,750 and so that we can put it in our local web directory so we can start all up our server. 205 00:14:08,770 --> 00:14:14,500 So OK so let's let's just quote divide again. 206 00:14:15,260 --> 00:14:25,710 It is a fight on fire since we ended up would be way get we take this so that we can jump to the top. 207 00:14:25,860 --> 00:14:28,100 We tried and put the SSL 208 00:14:31,150 --> 00:14:34,210 on the changes provided the resources. 209 00:14:36,890 --> 00:14:40,230 And then we're going to change the other one as well. 210 00:14:41,030 --> 00:14:51,000 And so we copy and paste this then the code path API enjoys or the brother which used to be Ms. 211 00:14:51,250 --> 00:14:52,300 Once he was a man 212 00:14:55,450 --> 00:15:07,000 so I know put the board slash rug but not get so what it knows we need. 213 00:15:07,140 --> 00:15:12,450 Nothing Mom can save it and quit okay. 214 00:15:12,460 --> 00:15:14,860 So let me explain what is this exactly. 215 00:15:16,760 --> 00:15:27,110 First thing first we really we will really enjoyed you two we did code of divide that we have modified 216 00:15:27,170 --> 00:15:34,310 earlier because without reading it and to understand it you would not exactly know what was his goal. 217 00:15:34,620 --> 00:15:42,710 It to one what difference does is that when we won despite on file in 0 7 it's going to be uploaded 218 00:15:42,740 --> 00:15:48,200 but not as byte on but it's going to be uploading as an image file and JPEG file. 219 00:15:49,040 --> 00:15:57,110 So that's why we use the IP address of this temporary machine along with the port number so that we 220 00:15:57,110 --> 00:16:03,990 can put it inside and then when we want it it's got my degree upload to the directory path there. 221 00:16:04,320 --> 00:16:04,830 OK. 222 00:16:05,120 --> 00:16:06,840 So you can try it now. 223 00:16:09,340 --> 00:16:10,080 Okay. 224 00:16:10,750 --> 00:16:12,550 And then now we we need. 225 00:16:12,690 --> 00:16:23,490 And then let's go to the Firefox or Bourse and then try to foist a page trying to refresh it. 226 00:16:23,510 --> 00:16:25,290 Oh okay here we go. 227 00:16:25,290 --> 00:16:26,520 So this is fine. 228 00:16:26,820 --> 00:16:37,890 So now we're going to wait Craig to find why created and savvy does Japan and then go back to terminal 229 00:16:39,360 --> 00:16:41,500 and then we're going to go through download folder. 230 00:16:42,440 --> 00:16:47,460 And then we have the file there and then we try to eat it is it cut. 231 00:16:47,670 --> 00:16:51,690 You see so now and this is how it looks 232 00:16:54,140 --> 00:16:54,880 you see. 233 00:16:55,140 --> 00:16:56,220 Excellent guy. 234 00:16:56,270 --> 00:17:03,710 I'm telling you Xand you just you just modify your bite on end and wounded uploaded and downloaded from 235 00:17:03,710 --> 00:17:06,300 the server and yeah we get it. 236 00:17:06,320 --> 00:17:14,120 So now we get a boot and a lot of information about it some real coral holes and then my screw and credentials 237 00:17:14,120 --> 00:17:14,990 stuff like that. 238 00:17:15,360 --> 00:17:16,050 Okay. 239 00:17:17,680 --> 00:17:18,070 So 240 00:17:21,870 --> 00:17:25,550 now I'm gonna take the IP address of the of that stapler 241 00:17:28,340 --> 00:17:35,310 along with the board and PSP might add me so that we can see if we will access. 242 00:17:35,350 --> 00:17:36,070 Here we are. 243 00:17:36,340 --> 00:17:44,240 So I can now use the credentials that we have found while downloading the image file from the server. 244 00:17:44,960 --> 00:17:45,520 OK. 245 00:17:45,580 --> 00:17:46,670 So you type would 246 00:17:50,240 --> 00:17:53,650 the password again. 247 00:17:54,430 --> 00:17:56,040 Go. 248 00:17:56,460 --> 00:17:58,560 Very good very good very good. 249 00:17:58,560 --> 00:18:01,190 Now we have access to the PSP my admin. 250 00:18:01,260 --> 00:18:07,020 So now we can try to use my obscure common there in the execution phase. 251 00:18:07,170 --> 00:18:07,910 OK. 252 00:18:07,980 --> 00:18:13,590 So let's try to go there and pass the coding inside inside. 253 00:18:13,810 --> 00:18:15,060 Okay. 254 00:18:15,240 --> 00:18:16,770 Good. 255 00:18:16,770 --> 00:18:19,350 So this could be HP. 256 00:18:19,710 --> 00:18:29,610 It would be in this directory and shared that BHP so that it can execute the commands again. 257 00:18:29,820 --> 00:18:33,860 Could go all right. 258 00:18:33,960 --> 00:18:35,280 Good. 259 00:18:35,280 --> 00:18:39,310 This exclusive comment that we have used that we have diabetes. 260 00:18:39,420 --> 00:18:49,210 It will Quaid if my name is shared at the HP in all operated content path of all web directory link 261 00:18:49,300 --> 00:18:49,690 address. 262 00:18:50,250 --> 00:18:51,860 So now what are we going to do. 263 00:18:51,870 --> 00:18:56,120 We're going to have to go to Firefox and then try to we the page. 264 00:18:57,420 --> 00:18:58,530 OK here we go. 265 00:18:58,530 --> 00:18:59,150 It is. 266 00:18:59,990 --> 00:19:00,370 OK. 267 00:19:00,390 --> 00:19:02,780 Now we can go and test it. 268 00:19:03,450 --> 00:19:04,180 OK. 269 00:19:04,260 --> 00:19:07,680 Just I see an equal on the hostname comment. 270 00:19:07,950 --> 00:19:13,970 So we have you visited and the previous travel before to see if you've got some information. 271 00:19:13,980 --> 00:19:14,520 Good. 272 00:19:15,240 --> 00:19:17,140 So we find something. 273 00:19:17,400 --> 00:19:17,990 OK. 274 00:19:20,930 --> 00:19:30,570 So if if you are if we are able to do that that means we can use some kind of reverse share payload 275 00:19:30,610 --> 00:19:32,300 so that we can be tested. 276 00:19:32,750 --> 00:19:33,170 OK. 277 00:19:34,880 --> 00:19:37,780 So let's see if we can get a connection using that. 278 00:19:37,820 --> 00:19:40,520 So it's open to all. 279 00:19:42,020 --> 00:19:50,060 And then we can try to set up on it kind of command as you draw and say minus Ed repeat and then any 280 00:19:50,060 --> 00:19:53,980 port number that you want avoid. 281 00:19:54,490 --> 00:20:04,510 So now go back to your Firefox and then sort so has me if by the operator before we get a pass it and 282 00:20:04,510 --> 00:20:08,600 then we're going to modified the IP address of all attack code machine. 283 00:20:08,610 --> 00:20:15,940 Dick Dick candy machine and then deport that we have put in our net cut again and then we're going to 284 00:20:15,940 --> 00:20:21,880 place the highest number paid on payroll that we have showed you just went out and then we PRESENTER 285 00:20:22,690 --> 00:20:23,560 Here we are. 286 00:20:23,620 --> 00:20:25,850 So we get to have a shot. 287 00:20:25,930 --> 00:20:27,640 Excellent. 288 00:20:28,300 --> 00:20:35,390 So the next step now is that the privileges escalation because we are there as a doctor at word. 289 00:20:35,920 --> 00:20:36,470 OK. 290 00:20:36,940 --> 00:20:43,750 So again deputies might say fine with your version of a one to one to six things. 291 00:20:43,810 --> 00:20:45,660 So we send OK. 292 00:20:45,820 --> 00:20:51,580 Just go to Google and try to explode if there are some exploitation already there. 293 00:20:51,790 --> 00:21:00,270 Type of 1 16 for all privileges coalition it was in our All right. 294 00:21:00,270 --> 00:21:00,780 Great 295 00:21:05,350 --> 00:21:16,550 care we can be worse it Newman in China for us one monkey. 296 00:21:17,210 --> 00:21:31,460 We can try it out of camp some it is a well explained fine we just copied and pasted in a new tab again 297 00:21:32,210 --> 00:21:33,620 and we have to 298 00:21:36,050 --> 00:21:42,300 download these photos and send them on your computer in a computer. 299 00:21:42,930 --> 00:21:50,990 Yeah so both of them and then go on to determine on and then we're going to go to that downloading path 300 00:21:52,100 --> 00:21:59,120 again and then move them to our SDM directory move to 301 00:22:01,570 --> 00:22:13,630 also w w w w e n and then we have phase them there and then we're going to try to extract them does 302 00:22:13,850 --> 00:22:15,130 it get 303 00:22:19,680 --> 00:22:25,640 all right now we are in this tub per share common. 304 00:22:25,650 --> 00:22:33,940 So we have to find a way so that we can get defiance which we have downloaded from Cairo from all colored 305 00:22:34,140 --> 00:22:42,060 news so that we know that we have to start to do a patch server or carry machine so that we can definitely 306 00:22:42,150 --> 00:22:43,470 get them he. 307 00:22:43,830 --> 00:22:46,070 OK so let's go do that. 308 00:22:46,800 --> 00:22:47,700 All right. 309 00:22:49,800 --> 00:22:52,180 So we're gonna go 310 00:22:55,630 --> 00:22:58,450 study service again. 311 00:23:00,240 --> 00:23:02,300 Kissinger OK. 312 00:23:02,710 --> 00:23:10,540 So now we can change our territory to ten and then go in and study and download them here. 313 00:23:13,100 --> 00:23:14,350 OK. 314 00:23:14,520 --> 00:23:25,930 So and then we also have to do a really good issue to be in question for a dog. 315 00:23:26,770 --> 00:23:27,660 All right good. 316 00:23:32,050 --> 00:23:33,910 Now going to the dog command. 317 00:23:34,030 --> 00:23:34,510 OK. 318 00:23:34,570 --> 00:23:43,190 So that we extract them again and do the same thing for to unified question a dog. 319 00:23:43,190 --> 00:23:43,760 It was a.. 320 00:23:43,890 --> 00:23:44,470 OK good. 321 00:23:46,310 --> 00:23:50,530 So now we are going to change a directory. 322 00:23:50,610 --> 00:23:50,870 You 323 00:23:54,390 --> 00:23:58,500 get OK. 324 00:24:00,510 --> 00:24:04,130 So now we're going to try to make a good table. 325 00:24:04,190 --> 00:24:06,330 If I lose X compiler sage 326 00:24:09,820 --> 00:24:14,610 Okay so we're would wouldn't compile it and then a second Bailey. 327 00:24:14,780 --> 00:24:19,360 So we're going to win it. 328 00:24:19,610 --> 00:24:21,020 We now want it. 329 00:24:21,020 --> 00:24:25,990 And then the file will be double put in 330 00:24:30,960 --> 00:24:32,490 okay. 331 00:24:33,060 --> 00:24:34,590 Good good good good. 332 00:24:34,600 --> 00:24:36,420 So now we own it would shed 333 00:24:41,580 --> 00:24:42,580 so we're going to let 334 00:24:45,380 --> 00:24:47,670 it is it takes the time. 335 00:24:47,880 --> 00:24:48,370 Okay. 336 00:24:48,420 --> 00:24:48,660 Good. 337 00:24:48,660 --> 00:24:51,390 We have would be be is now. 338 00:24:51,920 --> 00:24:52,690 A D. 339 00:24:52,710 --> 00:24:54,270 So you got I.D.. 340 00:24:54,510 --> 00:24:54,780 Okay. 341 00:24:54,790 --> 00:24:55,830 We are good. 342 00:24:56,280 --> 00:25:00,260 So we can take this some common again to pay tremendously and put it away. 343 00:25:00,450 --> 00:25:08,130 And it was an urn argue we are as wood fodder we can type say wood and then it s so good. 344 00:25:08,130 --> 00:25:13,600 So now we can use a cut command to finish phase. 345 00:25:13,900 --> 00:25:14,410 Okay. 346 00:25:14,530 --> 00:25:17,570 So that's a big case for this video. 347 00:25:17,730 --> 00:25:25,660 Wi fi which is that there are only fires which are there so you can use the card comment to try to open 348 00:25:25,660 --> 00:25:30,630 them in the toner as well as we did for the flood the deactivated. 349 00:25:30,730 --> 00:25:38,620 So again it said We encourage you to try try try try again and again so that you become a very good 350 00:25:38,630 --> 00:25:46,480 paint Tester because as you might see we have used many commands but sometimes we use the same command 351 00:25:46,600 --> 00:25:56,760 even if we are in some defined rule newer more application of renewable the operating system of renewable 352 00:25:56,770 --> 00:25:57,750 virtual mashing. 353 00:25:57,760 --> 00:26:06,760 So we use this in for example debate on so that we can get the way shell and then go Liberal piece gun 354 00:26:06,970 --> 00:26:09,070 and map you know these comments now. 355 00:26:09,100 --> 00:26:11,020 Very helpful Nick too. 356 00:26:11,060 --> 00:26:15,430 So don't forget to comment if you know some more information. 357 00:26:15,430 --> 00:26:16,020 Everything. 358 00:26:16,030 --> 00:26:24,700 It will be very good for you because sometimes in my old might not had it but Nick go ahead and then 359 00:26:24,790 --> 00:26:25,570 do a b. 360 00:26:25,660 --> 00:26:31,580 May not have and then something that is happening for example if you already have information about 361 00:26:31,580 --> 00:26:39,490 what's on the target list if it is a wordpress powered by one person you can use WP scan so don't you 362 00:26:39,490 --> 00:26:44,860 don't even or want to go to use some of the tools for scanning because you already know that it is it 363 00:26:44,890 --> 00:26:46,090 would post below it. 364 00:26:46,330 --> 00:26:49,510 So you can use a WP scan automatically. 365 00:26:49,600 --> 00:26:50,030 Okay. 366 00:26:50,070 --> 00:26:55,780 So we really hope and we really think that this video was very informative for you all. 367 00:26:55,870 --> 00:26:59,430 And then we are looking forward to see you in the next video. 368 00:26:59,470 --> 00:26:59,980 Thank you.