1 00:00:00,280 --> 00:00:05,790 And Lou everybody when it comes to my advanced ethical hacking networking penetration texting cause 2 00:00:16,140 --> 00:00:23,400 in this lab we are going to cover the process of innovation and exploitation of the. 3 00:00:23,640 --> 00:00:26,260 I am f vulnerable machine. 4 00:00:26,400 --> 00:00:33,100 I am f is that provision of the impossible mission forces. 5 00:00:33,390 --> 00:00:36,550 First let's go and download it. 6 00:00:37,090 --> 00:00:43,470 Okay so you're going to go and download divided it which I have provided you with in some previous videos 7 00:00:43,470 --> 00:00:45,400 for the downloadable link. 8 00:00:45,990 --> 00:00:50,690 And then you likely go what is in you and then you choose. 9 00:00:51,030 --> 00:01:03,220 I am f this one and then you just copy it copy until I see occupancy and then you just go down and pass 10 00:01:03,270 --> 00:01:04,150 it there. 11 00:01:04,860 --> 00:01:07,830 It was under no ID. 12 00:01:08,140 --> 00:01:14,450 And then you have to download it after they don't want to know it is complete so you're going to import 13 00:01:14,450 --> 00:01:20,980 it into your virtual box machine and then there you're going to make some few changes social configuration 14 00:01:21,020 --> 00:01:27,570 so that you configure it exactly according to your color and machine network js. 15 00:01:28,070 --> 00:01:35,600 Until this lab is there to be much more heavy than the other ones because it went and how did gigabytes. 16 00:01:35,600 --> 00:01:36,010 Okay. 17 00:01:36,050 --> 00:01:41,390 So if you're going to click here to download it and this video I'm not going to click on download because 18 00:01:41,420 --> 00:01:43,240 I have already downloaded on my computer. 19 00:01:43,490 --> 00:01:48,890 So what I have to do is I have a choice to go to my virtual box machine and then I have to click to 20 00:01:48,890 --> 00:01:51,960 open it and then. 21 00:01:52,070 --> 00:01:57,080 So when you have your downloaded file and then you can go and double click on it. 22 00:01:57,460 --> 00:01:58,580 Why would I want to click on it. 23 00:01:58,580 --> 00:02:02,060 And then you imported into a virtual book machine. 24 00:02:02,080 --> 00:02:02,660 Okay. 25 00:02:02,780 --> 00:02:07,190 So I can just to define it. 26 00:02:07,310 --> 00:02:12,720 Which you will have downloaded so that you can make sure exactly how would you look. 27 00:02:13,280 --> 00:02:15,760 OK all right. 28 00:02:15,790 --> 00:02:16,070 OK. 29 00:02:16,070 --> 00:02:19,630 He is defined which I have downloaded I am evident. 30 00:02:19,660 --> 00:02:20,660 Oh okay. 31 00:02:20,730 --> 00:02:21,590 So. 32 00:02:21,580 --> 00:02:28,060 So when I double click on it and then it will be automatically imported into each one box machine in 33 00:02:28,060 --> 00:02:28,760 there. 34 00:02:28,890 --> 00:02:30,340 I make so few configurations. 35 00:02:30,650 --> 00:02:35,840 OK so let log do so. 36 00:02:35,870 --> 00:02:37,540 So you have two being imported. 37 00:02:37,550 --> 00:02:41,040 You just click here and right click and click setting. 38 00:02:41,060 --> 00:02:47,920 All you can just go here on details and then you go here to make your configuration go to you. 39 00:02:47,990 --> 00:02:50,690 There are so many things information. 40 00:02:51,140 --> 00:02:51,560 OK. 41 00:02:51,560 --> 00:02:52,110 Nothing. 42 00:02:52,130 --> 00:02:54,560 It's OK with you on green okay. 43 00:02:54,690 --> 00:03:00,400 Storage is empty and things are but never mind because you already have it imported as over a. 44 00:03:00,580 --> 00:03:02,510 It's not in I will fire. 45 00:03:02,510 --> 00:03:03,410 So it doesn't matter. 46 00:03:04,090 --> 00:03:06,930 We can't go here and go to a network. 47 00:03:06,980 --> 00:03:15,350 Now as you can see on it we've got up to it is sitting as Brigitte adapter and on a Wi-Fi airport so 48 00:03:16,160 --> 00:03:25,490 that someone of ID or candy machine as being a machine must be in septic on this same network environment. 49 00:03:25,610 --> 00:03:32,310 But you may ask me so but how will I know then if my victim will be on December just as I am. 50 00:03:32,310 --> 00:03:39,440 But no he doesn't mean to be on on the same network as e must be on this network as you but Matt on 51 00:03:39,440 --> 00:03:39,840 this. 52 00:03:39,950 --> 00:03:46,010 I mean breached up to we use bridge adapter for a virtual machine. 53 00:03:46,070 --> 00:03:53,170 So when you use virtual machines so that we have the same network which are on your machine in the automation 54 00:03:53,210 --> 00:03:55,230 so that we can get a connection. 55 00:03:55,250 --> 00:04:04,760 Also you can so that you can get the IP address because your host network will share the network with 56 00:04:04,850 --> 00:04:06,190 audio for each Redbox. 57 00:04:06,280 --> 00:04:10,760 So this is exactly what we did to the means to your host network. 58 00:04:10,790 --> 00:04:19,610 I mean here you have a new nukes version as well as operating system or you have Mac or you of system 59 00:04:19,670 --> 00:04:27,030 as your host machine and then it would share its network which would reach Redbox. 60 00:04:27,110 --> 00:04:33,230 So that every quick view you can go and turning on and then you would die but you can it can be. 61 00:04:33,770 --> 00:04:40,640 And when he was in there and then you try to try to go in and to find something for you. 62 00:04:40,740 --> 00:04:49,620 And then finally it's 19 O K not e in and it will go down. 63 00:04:50,580 --> 00:04:59,700 It's the early lead you find it on O K in it. 64 00:04:59,970 --> 00:05:04,030 So this is it this one this one. 65 00:05:04,320 --> 00:05:17,250 So as it counts it is 1 9 2 1 6 2 1 as the seed in 1 or 8 so it will share the same seed though 1 May 66 00:05:17,280 --> 00:05:27,990 2 1 9 2 in 2 1 and then D only this board will be changed if we didn't put it on budget director or 67 00:05:27,990 --> 00:05:35,260 return box machine you might have ten dot Zi war dot 1 or something blah blah blah and so on and so 68 00:05:35,260 --> 00:05:35,390 on. 69 00:05:35,440 --> 00:05:37,650 OK so that's just a quick show about it. 70 00:05:37,890 --> 00:05:40,200 So here you see it. 71 00:05:40,590 --> 00:05:45,030 And then you can click on the key concerns and it's an important now and then your ticket cutting machine 72 00:05:45,030 --> 00:05:45,630 of course. 73 00:05:45,930 --> 00:05:47,310 Then you go to network out there. 74 00:05:47,400 --> 00:05:47,780 OK. 75 00:05:47,850 --> 00:05:49,860 You get a free Wi-Fi network. 76 00:05:50,120 --> 00:05:50,650 OK. 77 00:05:50,730 --> 00:06:01,770 So now we can start cutting machine and then so we can start off to be launching again. 78 00:06:01,880 --> 00:06:05,600 So what we don't know is it can 79 00:06:09,950 --> 00:06:15,320 do you can start your I am f machine clicking 80 00:06:18,580 --> 00:06:23,110 one provision here so yeah. 81 00:06:23,170 --> 00:06:30,050 So after it as we were going our way deal it loads now or two machines they are warning. 82 00:06:30,300 --> 00:06:39,320 Why do we why did you have to do as I always advise you guys in order if you are going into weekend 83 00:06:39,330 --> 00:06:49,620 attack you have to try to grab the information which are for you the basic information so you intend 84 00:06:49,800 --> 00:06:56,910 to hack a machine the first thing first you have to hack the IP address of that matching of the MAC 85 00:06:56,910 --> 00:06:58,850 address of the machine or things like that. 86 00:06:59,070 --> 00:07:07,380 So in such a way you have to scan the network and then try to get the IP after you get the IP then you 87 00:07:07,380 --> 00:07:11,940 have to try to scan the IP address and how to do that. 88 00:07:11,970 --> 00:07:16,930 It's always the same process because we are still under some network. 89 00:07:17,160 --> 00:07:23,700 So what you going to do when I go to attack a machine to call news and then type net discover. 90 00:07:23,850 --> 00:07:30,790 But first of all you have to determine my origin of which you are like you type either you contain any 91 00:07:30,810 --> 00:07:31,380 wasn't there. 92 00:07:31,710 --> 00:07:31,970 OK. 93 00:07:32,020 --> 00:07:34,210 We are on the 18th each. 94 00:07:34,240 --> 00:07:39,770 Oh so now we're going to take net discover and discover which tab. 95 00:07:39,930 --> 00:07:40,530 So that it. 96 00:07:40,590 --> 00:07:40,860 Right. 97 00:07:40,870 --> 00:07:48,680 It's for you and then minus E or in their places this and putting it in and now it's cunning it's capturing 98 00:07:48,820 --> 00:07:52,270 packet and then scanning or network seed. 99 00:07:52,280 --> 00:07:56,160 Oh yeah our so now it was cancelled. 100 00:07:56,350 --> 00:08:01,040 See to cancel it's coming because we get IP entries. 101 00:08:01,090 --> 00:08:01,790 It's this one. 102 00:08:02,980 --> 00:08:03,570 Okay. 103 00:08:03,670 --> 00:08:06,700 So now what we're gonna do is so. 104 00:08:07,140 --> 00:08:16,660 So we we see that it is on 12 16 Easy will for one entry is so we can try to NYPD by doing so you can 105 00:08:16,660 --> 00:08:24,720 type in Mother minus B minus minus on and then you copy and paste the IP address there. 106 00:08:25,180 --> 00:08:30,110 So the IP is this one you just copy or a click copy and paste it there. 107 00:08:31,400 --> 00:08:34,010 And then present it. 108 00:08:35,060 --> 00:08:37,610 So now this kind is started. 109 00:08:38,120 --> 00:08:38,610 Okay. 110 00:08:38,720 --> 00:08:46,170 So it might take sometimes and sometimes two it can take just a few seconds. 111 00:08:46,220 --> 00:08:46,520 Yeah. 112 00:08:46,850 --> 00:08:52,010 So we've just got to wait a little bit to see how long it will take. 113 00:08:55,510 --> 00:08:56,160 So no 114 00:09:03,160 --> 00:09:04,880 you know mean really being 115 00:09:12,380 --> 00:09:14,640 usually it shouldn't take so long. 116 00:09:14,660 --> 00:09:17,050 It depends. 117 00:09:17,050 --> 00:09:18,020 All right. 118 00:09:18,030 --> 00:09:19,620 Now what is coming is complete. 119 00:09:19,980 --> 00:09:27,520 So what we have to do we have to have we have to check what kind of information that we get our kids 120 00:09:27,570 --> 00:09:34,510 or no go oh of and then try to read it on each word or communities. 121 00:09:34,540 --> 00:09:39,280 You in a posh server is only one point eighty. 122 00:09:39,370 --> 00:09:46,810 Let's go below the mike address is this one key it's too weird. 123 00:09:46,810 --> 00:09:49,440 It's Janet so. 124 00:09:49,560 --> 00:09:50,060 Okay. 125 00:09:50,100 --> 00:09:53,430 So much much more than that much of information. 126 00:09:53,500 --> 00:09:55,170 So that's enough for us now. 127 00:09:55,230 --> 00:09:55,560 Okay. 128 00:09:55,580 --> 00:09:56,710 Now what can I do. 129 00:09:56,800 --> 00:10:03,350 Gonna have to open firefox right now seems or Firefox is open. 130 00:10:03,660 --> 00:10:04,790 So what can I do. 131 00:10:04,960 --> 00:10:10,260 Well can I just go to or terminal and it could be the IP address and then we will pass it there. 132 00:10:10,470 --> 00:10:16,110 But in our case or we don't even need to copy the port address and pleasant day because as deferred 133 00:10:16,240 --> 00:10:18,720 so a report is a deal. 134 00:10:18,840 --> 00:10:22,410 So we just copy you just copy and then you pass it. 135 00:10:22,410 --> 00:10:23,820 The first thing first. 136 00:10:23,850 --> 00:10:26,500 Let's change the color. 137 00:10:26,690 --> 00:10:36,080 Got you will five preferences and then we can change the color is black or white and black. 138 00:10:36,090 --> 00:10:41,920 All right in closing Okay so you copied and then you question there. 139 00:10:45,550 --> 00:10:46,770 So as always. 140 00:10:46,830 --> 00:10:52,450 Different thing that you have to have in your mind is you have to say for Firefox. 141 00:10:52,580 --> 00:10:58,480 Exactly according to the suite as default it your purpose it is sitting on as on 8 1880. 142 00:10:58,690 --> 00:11:02,910 So you can set up your Firefox on roll call proxy. 143 00:11:02,950 --> 00:11:03,260 Yeah. 144 00:11:03,490 --> 00:11:03,940 OK. 145 00:11:04,030 --> 00:11:06,290 So let's let's. 146 00:11:06,910 --> 00:11:08,520 Let's type here. 147 00:11:08,560 --> 00:11:11,770 Proxy server or something like that so that we can get into it. 148 00:11:11,800 --> 00:11:13,120 OK. 149 00:11:13,500 --> 00:11:14,380 We'll see. 150 00:11:14,440 --> 00:11:17,050 And then we go here we set a manual port C 151 00:11:19,550 --> 00:11:22,210 likewise and it's on AT&T. 152 00:11:22,250 --> 00:11:24,880 Good good. 153 00:11:25,120 --> 00:11:27,210 No proxy for so we don't need this stuff. 154 00:11:27,370 --> 00:11:35,870 You just click on OK OK now you can launch your proxy community or or anything as if you have your C 155 00:11:36,150 --> 00:11:36,780 professional. 156 00:11:36,920 --> 00:11:38,980 It might be a better choice for us now. 157 00:11:38,990 --> 00:11:43,790 So we were downgraded it so we are working on it in committee. 158 00:11:44,510 --> 00:11:47,990 Okay so now always remember. 159 00:11:47,990 --> 00:11:55,020 So on every page that we get after typing the IP address along with the port or E since we avoid it 160 00:11:55,280 --> 00:11:59,720 we have already seen that the port is on 80 so we don't need it either anymore. 161 00:11:59,720 --> 00:12:07,470 So you just type it there always trying to find some types and then click on view page source. 162 00:12:07,550 --> 00:12:08,720 Yeah. 163 00:12:14,100 --> 00:12:21,540 Okay in being there scroll down and try to find if you get some information I mean some encrypted file 164 00:12:21,560 --> 00:12:24,350 or some encoded fight so we don't. 165 00:12:24,370 --> 00:12:30,970 So let's go and let's click on another tab let's go on contact and in view page source so you can just 166 00:12:30,970 --> 00:12:38,170 type review a reference source and then dot to point and then you type this IP address. 167 00:12:38,220 --> 00:12:38,820 Oh OK. 168 00:12:38,850 --> 00:12:39,630 Interesting. 169 00:12:39,630 --> 00:12:41,340 We find a flag. 170 00:12:41,610 --> 00:12:45,750 So it is on comment on Comment tag. 171 00:12:45,780 --> 00:12:50,000 That means it would appear on the screen as displayed. 172 00:12:50,760 --> 00:12:52,350 So we've gone obsolete. 173 00:12:52,650 --> 00:12:59,380 And then we just copy and paste it there and decode as base 64. 174 00:12:59,590 --> 00:12:59,940 OK. 175 00:12:59,970 --> 00:13:02,000 This is the text that we have. 176 00:13:02,070 --> 00:13:03,150 That's great. 177 00:13:03,150 --> 00:13:11,560 So now what we have to do is scroll down again to find we if we have some more until this thing. 178 00:13:11,750 --> 00:13:13,820 Let's see let's see. 179 00:13:14,240 --> 00:13:17,120 Let's go. 180 00:13:17,830 --> 00:13:19,860 Let's try this call. 181 00:13:19,930 --> 00:13:27,290 It looks like again base64 but they just put it as a fire. 182 00:13:27,390 --> 00:13:30,480 You see it start from here to these things. 183 00:13:31,090 --> 00:13:31,500 Okay. 184 00:13:31,540 --> 00:13:37,950 So it's copied and we're going to open up it takes it takes finding in passage there so that we have 185 00:13:37,950 --> 00:13:46,440 a note on it so that we don't forget it in the next future of this video and Okay I tried to remember 186 00:13:46,440 --> 00:13:47,280 it in the. 187 00:13:47,300 --> 00:13:53,320 You see how they make it and how you have a full base 64 encoded text. 188 00:13:53,340 --> 00:13:57,670 Now just copied and again go back to your worksheet you'll see. 189 00:13:57,770 --> 00:13:59,010 Interesting. 190 00:13:59,040 --> 00:14:03,060 Now you get a blue flag with an order BS encrypted text. 191 00:14:03,240 --> 00:14:05,450 That's so crazy. 192 00:14:05,640 --> 00:14:09,130 And then you just copy that dates again. 193 00:14:09,250 --> 00:14:11,570 I see the DS boom. 194 00:14:11,850 --> 00:14:12,510 I am. 195 00:14:12,840 --> 00:14:13,970 I am administer it. 196 00:14:13,980 --> 00:14:15,210 Oh okay. 197 00:14:15,390 --> 00:14:17,050 Let's do a thing that's so great. 198 00:14:18,000 --> 00:14:18,430 Yeah. 199 00:14:23,720 --> 00:14:26,300 They decoded text that we have obtained. 200 00:14:26,440 --> 00:14:38,540 I am a I destroyed or can be represented as a password as a user name or as any path I am in any directory 201 00:14:38,540 --> 00:14:38,930 path. 202 00:14:39,200 --> 00:14:45,790 So you're going to try your maximum ways to get it is this if it is that. 203 00:14:46,130 --> 00:14:46,670 OK. 204 00:14:46,700 --> 00:14:52,930 So first thing first we're going to try to go to two or Firefox so that we can try. 205 00:14:53,030 --> 00:15:01,640 If E.D. is a directory path if not so we would keep not on it and then we will after we will have a 206 00:15:01,640 --> 00:15:06,620 way to to know if it is a user name or if it is a password. 207 00:15:06,620 --> 00:15:07,200 All right. 208 00:15:07,250 --> 00:15:08,500 So so let's go. 209 00:15:09,540 --> 00:15:09,950 Yeah. 210 00:15:13,680 --> 00:15:16,410 You open up your Firefox. 211 00:15:16,480 --> 00:15:17,100 I mean it's not. 212 00:15:17,250 --> 00:15:17,700 Yep. 213 00:15:18,060 --> 00:15:18,530 OK. 214 00:15:18,750 --> 00:15:21,690 So this is the content that we get. 215 00:15:21,690 --> 00:15:22,540 Absolutely. 216 00:15:22,620 --> 00:15:23,100 Nice. 217 00:15:23,100 --> 00:15:29,020 And then try to find always the view source code. 218 00:15:29,130 --> 00:15:33,350 It couldn't begin to look into what it is you know villages. 219 00:15:33,930 --> 00:15:42,310 What we would see is a user name like hard I would put in the password is the military key since we 220 00:15:42,310 --> 00:15:44,250 get to the wrong page. 221 00:15:44,290 --> 00:15:46,060 So we're going to trade things out. 222 00:15:46,450 --> 00:15:49,390 Okay so let's try. 223 00:15:49,570 --> 00:15:55,840 Let's try to intercept or grab suite so that you mean to say we do own. 224 00:15:55,900 --> 00:15:56,460 All right. 225 00:15:57,180 --> 00:16:04,780 And the mic is on Jesse and then tried to log in and get the intercept in the screen. 226 00:16:05,010 --> 00:16:05,580 Okay. 227 00:16:05,610 --> 00:16:07,660 So we have to username and password. 228 00:16:07,680 --> 00:16:09,370 So we're going to try it. 229 00:16:09,390 --> 00:16:16,320 And I clicked to send it to Twitter and then now you're going to try to bypass it and then try to set 230 00:16:16,320 --> 00:16:21,330 it injection point footpath added as the injection point. 231 00:16:21,390 --> 00:16:23,390 So now we have some least. 232 00:16:23,670 --> 00:16:25,830 And then you're going to go and pass it there. 233 00:16:25,950 --> 00:16:29,620 Of course everything is provided in their language. 234 00:16:29,810 --> 00:16:39,430 So before that we wrote a video and then you could start after posting it there and then just wait take 235 00:16:39,430 --> 00:16:41,540 a look on those ones. 236 00:16:41,580 --> 00:16:46,050 What we get we get in valued use. 237 00:16:46,350 --> 00:16:47,210 Care. 238 00:16:47,890 --> 00:16:53,760 You can just stand still wait till the attack is ended. 239 00:16:53,810 --> 00:16:58,250 Kim. 240 00:16:58,710 --> 00:16:59,300 Yes. 241 00:16:59,520 --> 00:17:01,380 You can just wait there. 242 00:17:01,510 --> 00:17:05,180 Oh and just to just try one by one. 243 00:17:05,280 --> 00:17:09,660 How do we get Yeah. 244 00:17:10,010 --> 00:17:10,760 So good 245 00:17:13,710 --> 00:17:14,840 that's China would it. 246 00:17:14,850 --> 00:17:18,070 If only Georgia know what we have to do. 247 00:17:18,130 --> 00:17:25,450 So we're going to try to go to a contact page then try to see if a place we can go up some information 248 00:17:25,450 --> 00:17:29,440 there if there exists some information. 249 00:17:29,440 --> 00:17:29,770 All right. 250 00:17:30,100 --> 00:17:32,350 So now we can try to go there. 251 00:17:33,070 --> 00:17:33,670 So. 252 00:17:33,670 --> 00:17:34,320 Okay. 253 00:17:34,330 --> 00:17:35,980 So at the bottom the list. 254 00:17:36,010 --> 00:17:46,650 So we see some things until this thing like voyagers as the micros Becky and Elizabeth Stone. 255 00:17:46,780 --> 00:17:51,190 So let's try all of them if we can get into it on purpose. 256 00:17:51,400 --> 00:17:52,640 So we can try. 257 00:17:52,960 --> 00:18:04,910 My columns to find okay we grab some confirmations or we bypass deep authentication again seeing that 258 00:18:04,950 --> 00:18:07,000 BHP is your name on. 259 00:18:07,380 --> 00:18:11,730 So let's go and copy the flag and and then. 260 00:18:11,770 --> 00:18:14,830 So go up to worksheet and pass it there. 261 00:18:14,840 --> 00:18:16,410 Continue to see ominous. 262 00:18:16,440 --> 00:18:18,690 So grab the information. 263 00:18:18,690 --> 00:18:27,520 So now widening the hearing so you can win cases in water station and you just copy. 264 00:18:28,200 --> 00:18:28,510 Okay 265 00:18:31,300 --> 00:18:34,620 in close those tabs it's needed anymore. 266 00:18:34,650 --> 00:18:37,460 So I do create a new. 267 00:18:38,080 --> 00:18:41,430 So now in three days here we are. 268 00:18:43,050 --> 00:18:49,520 So as we see now we're going to try to intercept the kids here. 269 00:18:49,560 --> 00:18:57,270 We are going to make this obscure map so that we can try to find if we can get in to this escort injection. 270 00:18:57,990 --> 00:18:59,920 So now we can put it on. 271 00:19:00,550 --> 00:19:08,650 Okay looking now we're going click when we switch icons so that we we first appeared and then so that 272 00:19:08,650 --> 00:19:15,490 we can have the intersection between these web blank and birth suite. 273 00:19:15,820 --> 00:19:16,330 All right. 274 00:19:16,600 --> 00:19:19,770 So you have a gate. 275 00:19:19,870 --> 00:19:24,290 Here we go again. 276 00:19:24,670 --> 00:19:27,600 Now let's see the name is equal home. 277 00:19:27,640 --> 00:19:30,910 So let's put it as the injection point. 278 00:19:31,580 --> 00:19:32,200 OK. 279 00:19:32,290 --> 00:19:38,800 And then you can mix feel changes is change changes that Jim 280 00:19:44,430 --> 00:19:58,470 with now kind of as there was no I clicked then anywhere and then copy to find me to try it try to put 281 00:19:58,470 --> 00:20:05,010 it in a square in something like to zero again and now go back to a terminal 282 00:20:08,010 --> 00:20:18,050 so you would take the asteroid minus for the mob minus r s to lie to minus minus or risk equal to equality 283 00:20:18,340 --> 00:20:28,170 live all equal five and then minus minus that amaze and then minus might have done in batch and tweet 284 00:20:28,380 --> 00:20:34,200 is called ten and then two within a Let's go. 285 00:20:34,380 --> 00:20:35,980 We are waiting. 286 00:20:39,180 --> 00:20:39,780 Good. 287 00:20:40,520 --> 00:20:42,480 Very good. 288 00:20:42,620 --> 00:20:43,840 So. 289 00:20:44,140 --> 00:20:44,540 OK. 290 00:20:45,230 --> 00:20:46,150 Let's check. 291 00:20:46,250 --> 00:20:46,560 What. 292 00:20:46,570 --> 00:20:47,150 Get 293 00:20:50,020 --> 00:20:51,720 as we can observe here. 294 00:20:52,240 --> 00:20:55,120 So we get some information. 295 00:20:55,270 --> 00:20:55,970 OK. 296 00:20:56,110 --> 00:20:56,640 So. 297 00:20:56,840 --> 00:21:00,230 So the information that we get we get it back. 298 00:21:00,720 --> 00:21:10,060 Images in good GP so we copy it and then we will try to do it to Firefox and I need you behind the IP 299 00:21:10,120 --> 00:21:16,160 address of the vulnerable machine and wouldn't be cited behind it. 300 00:21:16,180 --> 00:21:20,490 I m f a re strudel so we get an image there. 301 00:21:21,300 --> 00:21:24,190 Pumpkin. 302 00:21:24,490 --> 00:21:25,430 That's nice. 303 00:21:26,410 --> 00:21:27,240 All right 304 00:21:29,590 --> 00:21:30,770 okay. 305 00:21:31,640 --> 00:21:33,080 So do we. 306 00:21:33,120 --> 00:21:34,170 We get it cute. 307 00:21:34,180 --> 00:21:34,840 I'll quit. 308 00:21:34,870 --> 00:21:42,650 So now you're going to go there to go on and then try to find how to decode it on Google. 309 00:21:43,360 --> 00:21:46,130 Well okay. 310 00:21:46,170 --> 00:21:46,890 So now. 311 00:21:46,920 --> 00:21:47,380 Good. 312 00:21:48,300 --> 00:21:59,040 So again to click on your first link this is the scene so it's gonna kill y. 313 00:21:59,850 --> 00:22:07,470 Okay so now a we're going to upload it fine and then it will scan it and then gave us the words. 314 00:22:07,860 --> 00:22:11,540 So go to your browser and watch it. 315 00:22:11,590 --> 00:22:24,440 I mean literally directory and then you trade whiteboard in blood submitted Oh great. 316 00:22:24,480 --> 00:22:26,780 So now we have something. 317 00:22:26,780 --> 00:22:27,680 All right. 318 00:22:27,690 --> 00:22:31,780 Word tags and possibly for last resort. 319 00:22:31,800 --> 00:22:33,330 It's a look. 320 00:22:33,390 --> 00:22:38,720 It looks like it base64 again because of the quote at the end you passed it down. 321 00:22:38,740 --> 00:22:44,960 Or perhaps Brexit would be seven sixty four. 322 00:22:45,120 --> 00:22:50,780 We have three and a retaliatory path so let's good. 323 00:22:50,820 --> 00:23:02,600 But to a function then pass it behind the IMF administrator and then present would get in good form. 324 00:23:02,660 --> 00:23:03,260 Okay. 325 00:23:04,760 --> 00:23:05,550 That's great. 326 00:23:06,170 --> 00:23:10,410 So we have to find a way to upload it peaceably with first share. 327 00:23:10,700 --> 00:23:14,630 So let's go back to autonomy not and use it tool on it. 328 00:23:14,750 --> 00:23:16,890 It's built on Kylie lending so much. 329 00:23:16,910 --> 00:23:19,170 Which name is Waverly. 330 00:23:19,340 --> 00:23:25,300 So we can find to find a back door and then try to explode grab information. 331 00:23:25,570 --> 00:23:25,930 Okay. 332 00:23:25,940 --> 00:23:27,900 So we're going to use it. 333 00:23:28,760 --> 00:23:29,840 It's a steal. 334 00:23:30,080 --> 00:23:34,220 BHP won't shut that similar Internet like connection. 335 00:23:34,340 --> 00:23:39,350 It is an essential tool for replication past exploitation and others where it is. 336 00:23:39,410 --> 00:23:43,040 It can be used as a backdoor as we said earlier. 337 00:23:43,040 --> 00:23:44,220 All right. 338 00:23:44,330 --> 00:23:48,130 So now we have a site 339 00:23:55,590 --> 00:24:01,020 well after your version is winning so when I click on Boylston to begin the fight. 340 00:24:01,020 --> 00:24:01,710 OK. 341 00:24:01,800 --> 00:24:14,150 So now we can just click on wells online and then go go to a directory and then check it back. 342 00:24:14,180 --> 00:24:18,510 So the one that you have created using the Waverly and uploaded there. 343 00:24:18,800 --> 00:24:21,140 Okay. 344 00:24:21,400 --> 00:24:22,980 Good good good. 345 00:24:22,980 --> 00:24:28,950 So we have a post we get because here we have the content and he is the payload. 346 00:24:28,950 --> 00:24:32,870 So let's click on forward to see what happens again. 347 00:24:33,040 --> 00:24:36,590 You are invalid file type. 348 00:24:36,610 --> 00:24:41,630 That means we have a kind of restriction filter there. 349 00:24:41,650 --> 00:24:44,740 So we're gonna have a way to bypass this. 350 00:24:44,740 --> 00:24:49,930 Let's check in again in Kenya. 351 00:24:50,080 --> 00:24:53,550 Now type application XP should be fine. 352 00:24:53,810 --> 00:24:55,040 Okay. 353 00:24:55,190 --> 00:25:01,620 We have to change that in such a way and find the best way pass it. 354 00:25:01,710 --> 00:25:04,310 Just try to create a security system. 355 00:25:04,400 --> 00:25:06,990 China quoted in it. 356 00:25:07,410 --> 00:25:08,070 Okay. 357 00:25:09,030 --> 00:25:11,610 So go back to terminal and 358 00:25:21,200 --> 00:25:21,720 say. 359 00:25:22,880 --> 00:25:33,460 You changed it on me changed today the name as against by OK so now so what are we going to do. 360 00:25:33,550 --> 00:25:36,780 So we're going to hide a key. 361 00:25:37,320 --> 00:25:38,830 Eighty nine doubt. 362 00:25:38,860 --> 00:25:40,730 So it will work. 363 00:25:40,810 --> 00:25:45,630 It will work there because so we are going to tweak this system security. 364 00:25:46,220 --> 00:25:46,840 Okay. 365 00:25:48,550 --> 00:26:03,930 So again we can save it now and go back now to do a code page and then try it out in total bloated files 366 00:26:03,930 --> 00:26:04,980 successfully. 367 00:26:05,190 --> 00:26:06,270 So it's very good. 368 00:26:06,270 --> 00:26:08,980 So now we bypass the system security a filter. 369 00:26:09,660 --> 00:26:10,390 OK. 370 00:26:10,410 --> 00:26:23,250 And I try to do this to the source page and then is do you have to get node 0 0 0 0 over the stream 371 00:26:23,280 --> 00:26:25,050 which is in the contained 372 00:26:31,790 --> 00:26:33,890 some food or OK. 373 00:26:34,040 --> 00:26:35,310 So before going food. 374 00:26:35,690 --> 00:26:42,740 Let's try to explain the reason behind sin why it's in the previous step. 375 00:26:43,010 --> 00:26:53,750 So we had two converted to a gift by the reason behind this end is to be able to we did it the piece 376 00:26:53,750 --> 00:26:54,610 should be fine. 377 00:26:55,130 --> 00:26:56,580 I mean the extension. 378 00:26:56,660 --> 00:26:57,700 Don't be happy. 379 00:26:57,770 --> 00:26:58,960 So it is a peach we find. 380 00:26:58,960 --> 00:27:03,770 So we had to eat it because we we were not able to eat it. 381 00:27:03,770 --> 00:27:07,820 So that's why we converted it into a GIF file. 382 00:27:08,240 --> 00:27:08,830 All right. 383 00:27:09,140 --> 00:27:15,450 So this one this is what so we don't know. 384 00:27:15,530 --> 00:27:18,510 But as a tactic. 385 00:27:18,560 --> 00:27:25,390 So you will convert it a peach be fired into a GIF file so that you can with the data inside. 386 00:27:25,400 --> 00:27:26,950 I mean the information. 387 00:27:27,020 --> 00:27:37,490 So now you have if you have something you have extreme inside a command so you can try to put dot gift 388 00:27:37,550 --> 00:27:46,250 behind it and then try to put it behind the I.P. address of the IMF and the slash I am if administrator 389 00:27:46,460 --> 00:27:53,840 slash uploads and then the tags here that you get and then put DOD gif behind it and then you press 390 00:27:53,920 --> 00:27:54,340 into. 391 00:27:54,560 --> 00:28:01,370 So it will be a very good tactic a very good way so that we can go up much more information then after 392 00:28:01,640 --> 00:28:05,000 we're going to go to all tell me now. 393 00:28:05,120 --> 00:28:11,390 And then using Waverly again of course not only the password that we have created earlier in the previous 394 00:28:11,390 --> 00:28:14,390 steps so that we can get much more information. 395 00:28:14,690 --> 00:28:15,260 OK. 396 00:28:15,290 --> 00:28:17,830 So let's get into it. 397 00:28:17,900 --> 00:28:18,380 All right. 398 00:28:18,410 --> 00:28:24,920 And so now you're going to use your terminal and then type Waverly tested to be and in the IP address 399 00:28:24,920 --> 00:28:28,560 of course of the venerable machine and an IMF administrator. 400 00:28:28,610 --> 00:28:31,190 So much applause up there. 401 00:28:31,190 --> 00:28:31,780 Yes. 402 00:28:31,790 --> 00:28:38,200 And then you copy and paste the tags the green tags there and along with the gift extension and then 403 00:28:38,200 --> 00:28:45,110 you present it See okay you funds information. 404 00:28:45,280 --> 00:28:48,440 Okay great. 405 00:28:48,520 --> 00:28:49,340 Great though. 406 00:28:49,980 --> 00:28:52,500 All right. 407 00:28:52,560 --> 00:28:56,900 So now what are gonna do we are going to do it. 408 00:28:57,180 --> 00:29:00,450 So we have it to try to find a password. 409 00:29:00,450 --> 00:29:08,190 So the password which is chancy so that we have created it earlier and then we get into this shell game. 410 00:29:08,200 --> 00:29:10,560 Is that what one did. 411 00:29:10,560 --> 00:29:11,060 Good. 412 00:29:11,070 --> 00:29:16,820 So now I can try to see you would find under the friends you can. 413 00:29:17,190 --> 00:29:19,050 That's great. 414 00:29:19,050 --> 00:29:22,540 You can use the card command so that we will ban it. 415 00:29:22,560 --> 00:29:28,140 It's an order of business 64 and then just copy it and then go back to your Pepsi guys and then you 416 00:29:28,140 --> 00:29:36,090 click on decode tabs and then pass it down to the insurers decoded as base 64 so that you can get the 417 00:29:36,090 --> 00:29:39,420 brain takes different X's agent services. 418 00:29:39,450 --> 00:29:40,790 Good. 419 00:29:40,810 --> 00:29:41,630 Okay. 420 00:29:41,670 --> 00:29:44,280 So now what I'm going I try to do 421 00:29:46,940 --> 00:29:56,720 so supernatural is fine come in so that we fine so that we can switch for the screen age and OK. 422 00:29:57,220 --> 00:30:08,140 So let's go and take filing time name agent and then they're renewal and imprisonment right. 423 00:30:08,170 --> 00:30:14,100 And the new plan would just move a little meet. 424 00:30:14,200 --> 00:30:19,240 Q Is the word realistic Were you waiting. 425 00:30:19,250 --> 00:30:19,870 All right. 426 00:30:19,870 --> 00:30:24,970 So yeah good. 427 00:30:25,070 --> 00:30:25,730 All right. 428 00:30:26,510 --> 00:30:29,070 So now we on our way out of the question into. 429 00:30:29,290 --> 00:30:30,090 Okay. 430 00:30:30,240 --> 00:30:35,690 So that's what we have that we could not try to find much more information about which services are 431 00:30:35,690 --> 00:30:36,560 wanting there. 432 00:30:37,160 --> 00:30:37,760 So. 433 00:30:38,460 --> 00:30:39,200 Okay. 434 00:30:40,570 --> 00:30:48,810 So what we are going to type now we are going to type net net start minus and and then you will question 435 00:30:48,810 --> 00:31:02,530 in order so that you got the information game and then CHEERING Oh yeah my a it's this image well can 436 00:31:04,910 --> 00:31:07,050 so we don't know this service. 437 00:31:07,060 --> 00:31:15,600 So let's look at it as an ad type and seeing and ended it was all one and that forward you type it 7 438 00:31:15,600 --> 00:31:25,970 7 8 8 and then you connect into that boat to try to access the binary system with porting agent okay. 439 00:31:30,260 --> 00:31:33,350 So we did see that. 440 00:31:33,500 --> 00:31:34,890 When we won in math. 441 00:31:35,280 --> 00:31:36,470 OK. 442 00:31:37,040 --> 00:31:39,510 So let's say something more. 443 00:31:39,850 --> 00:31:49,590 It's gotten used to be called being so that's where each and I know is OK here we see it. 444 00:31:49,690 --> 00:31:50,590 OK. 445 00:31:50,650 --> 00:31:52,020 We have a file which go. 446 00:31:52,030 --> 00:31:53,910 Which name used access code. 447 00:31:54,260 --> 00:31:54,970 Let's use it. 448 00:31:55,810 --> 00:32:03,210 And check it O K. we find something. 449 00:32:03,430 --> 00:32:07,590 Look like put some poll numbers but we don't know. 450 00:32:07,860 --> 00:32:09,310 We will see. 451 00:32:09,310 --> 00:32:16,930 It's a kind of the road that you promised us to access that connection so that we get the access again. 452 00:32:17,180 --> 00:32:18,150 But we need to do it. 453 00:32:18,180 --> 00:32:20,760 And then suddenly you don't get it. 454 00:32:21,280 --> 00:32:29,340 So you Max and so we will try to paint Max so on. 455 00:32:29,450 --> 00:32:33,440 So we pull it back to no proxy or your system proxy does it matter. 456 00:32:33,440 --> 00:32:42,680 So if it's not on local or boxes or do find that knack tool grab it or don't just download it and then 457 00:32:43,080 --> 00:32:47,020 you put it in the direct path which we could actually do so after. 458 00:32:47,020 --> 00:32:52,950 And then I get and then get on typing. 459 00:32:53,340 --> 00:32:58,860 Plus they had their and then go to the downtown but 460 00:33:02,560 --> 00:33:03,510 in religions. 461 00:33:04,510 --> 00:33:12,860 So we really wanted along with those numbers that we have had earlier in the term we know what we thought 462 00:33:12,890 --> 00:33:15,070 this without the comma. 463 00:33:15,070 --> 00:33:24,600 Now this because when we use that point seven seven eight eight so we get those information. 464 00:33:24,680 --> 00:33:33,560 Now let's try to verify if it's OK then it's in map I have in B and then see if it's an eight and the 465 00:33:33,560 --> 00:33:35,940 AP of course up on the map. 466 00:33:37,940 --> 00:33:39,640 See if it's a bang. 467 00:33:40,490 --> 00:33:42,950 Okay great open. 468 00:33:43,850 --> 00:33:46,040 So we saw it not me you would not care. 469 00:33:46,050 --> 00:33:49,000 What do we find the state is open on gay 470 00:33:54,920 --> 00:33:57,830 we will try to download it. 471 00:33:58,010 --> 00:34:00,410 It's a very very good tool. 472 00:34:00,410 --> 00:34:06,370 So go back to Firefox and then we will provide of course by the length of days. 473 00:34:07,100 --> 00:34:23,820 And in the lead again and good luck to me out of off terms though again still of age and go get it. 474 00:34:24,190 --> 00:34:25,520 Go on. 475 00:34:25,620 --> 00:34:26,730 We're learning because I know 476 00:34:29,510 --> 00:34:30,580 right. 477 00:34:34,180 --> 00:34:44,990 So I'll go we have to try to answer the dependencies that if yours were not here already OK. 478 00:34:45,100 --> 00:34:52,090 So if you go to the find which we have provided and then copy and paste this quote there and was in 479 00:34:52,110 --> 00:34:56,040 order to discard it just totally start dependencies. 480 00:34:56,170 --> 00:34:57,160 This one. 481 00:34:57,230 --> 00:34:57,760 All right. 482 00:35:00,520 --> 00:35:01,120 So. 483 00:35:01,270 --> 00:35:10,080 Well okay so now you get a changed Directory OK. 484 00:35:13,100 --> 00:35:14,730 Oh I get it. 485 00:35:14,730 --> 00:35:16,550 So you're going to change in C make 486 00:35:19,410 --> 00:35:20,700 C make. 487 00:35:21,210 --> 00:35:24,510 And then to where they are and then present. 488 00:35:30,120 --> 00:35:34,450 Disclosing it will take away okay. 489 00:35:36,010 --> 00:35:43,960 So now we have to just try and try to make and we can store another in just it to delete 490 00:35:46,680 --> 00:35:52,460 o get up to Dad we have it in into data. 491 00:35:52,650 --> 00:35:55,870 I am I have and announced it has a lot to do with every show. 492 00:35:56,520 --> 00:36:05,760 And then you will specify the location this location and then also within a specified D location so 493 00:36:05,760 --> 00:36:07,240 that we can put it in case. 494 00:36:07,650 --> 00:36:08,100 All right. 495 00:36:08,190 --> 00:36:11,310 So the plays that we have put it in coordinates. 496 00:36:12,670 --> 00:36:13,510 Okay. 497 00:36:13,560 --> 00:36:18,350 So again I wouldn't give binary against the agent binary. 498 00:36:18,570 --> 00:36:26,860 So I go back through to Ron it's the place that we have put in it. 499 00:36:27,410 --> 00:36:28,070 Okay. 500 00:36:28,070 --> 00:36:33,450 Tiberius Okay so now we have a lot of light on fires. 501 00:36:33,860 --> 00:36:43,980 So now we're gonna use or deg and then you copy and paste this this name here when I wanted an engine. 502 00:36:45,520 --> 00:36:49,150 It was in our game again. 503 00:36:49,160 --> 00:36:49,570 Good. 504 00:36:49,570 --> 00:36:56,400 Done again it has some information bytes onto in July. 505 00:36:56,490 --> 00:36:57,170 Okay. 506 00:36:57,240 --> 00:37:05,370 So now gradually we take this and have a bunch of new files that we have created as we learned okay 507 00:37:06,540 --> 00:37:10,500 from the compiler which was running against the agent. 508 00:37:10,500 --> 00:37:13,860 So now we're gonna take a log of these files. 509 00:37:13,880 --> 00:37:16,480 All right so that's great. 510 00:37:16,690 --> 00:37:23,100 So we're going to use cut just to read some of them to cut all to it or only less. 511 00:37:23,350 --> 00:37:32,650 And and this can OK so now let's go that one. 512 00:37:32,840 --> 00:37:43,340 Let's go to the functions so that we can check all the information let's go here and then let's analyze 513 00:37:43,340 --> 00:37:44,520 it let's call it first 514 00:37:47,920 --> 00:37:50,610 look for stroke. 515 00:37:50,880 --> 00:37:54,760 Put with a sprained. 516 00:37:56,200 --> 00:37:57,800 This one is a. 517 00:37:57,950 --> 00:38:09,550 Gonna be depending on the fire that eggs that eggs a cocktail King. 518 00:38:09,620 --> 00:38:16,820 So I think we have to compete we have to compete. 519 00:38:17,830 --> 00:38:18,880 Let's think Daisy 520 00:38:22,250 --> 00:38:28,510 and try to decode it into decimal because now it's an inside this model. 521 00:38:28,710 --> 00:38:29,930 We can use. 522 00:38:30,610 --> 00:38:38,520 Oh tell me not using equal so we can take a call to narrow assign volunteers as an input that exact 523 00:38:38,520 --> 00:38:44,850 string there was an error so we have the decimal presentation of that string. 524 00:38:45,260 --> 00:38:49,140 Like in so so far so good. 525 00:38:49,140 --> 00:38:58,290 No no we are going to try to use it so that we'll find it in each and tidy game. 526 00:38:58,310 --> 00:39:09,740 J try to make the agent executor will not think it is possible that I copy and paste that string phone 527 00:39:09,830 --> 00:39:11,460 area and then pass the data. 528 00:39:12,170 --> 00:39:13,250 Oh okay. 529 00:39:13,250 --> 00:39:19,780 We have a new extraction plan to create a situation and so many 2 1 0 King. 530 00:39:19,820 --> 00:39:21,290 We have to submit to implode. 531 00:39:21,290 --> 00:39:25,240 So let's try the third option. 532 00:39:26,750 --> 00:39:29,710 We read new king. 533 00:39:30,430 --> 00:39:32,060 So he's going to try. 534 00:39:32,830 --> 00:39:35,280 Slow now. 535 00:39:35,730 --> 00:39:40,450 Let's try to send him a bunch of characters so that we see how it would away. 536 00:39:40,950 --> 00:39:47,560 So we're going to try to send to 100 characters so that we might see how it would be we had. 537 00:39:47,940 --> 00:39:48,740 Oh right. 538 00:39:48,900 --> 00:39:53,500 So I was always like why don't you just copy it from the file. 539 00:39:54,010 --> 00:40:01,030 Okay so we did good of a. 540 00:40:01,580 --> 00:40:04,970 So now we're going to try to win it. 541 00:40:05,660 --> 00:40:13,850 And then we went to board to see how do we and then yeah. 542 00:40:13,880 --> 00:40:21,550 So you know so why did we have you assume influence in addition forward again. 543 00:40:26,660 --> 00:40:31,890 So we're going to try to create a buffer overflow attack. 544 00:40:32,390 --> 00:40:33,550 Oh all right. 545 00:40:34,040 --> 00:40:34,540 No. 546 00:40:35,040 --> 00:40:35,230 Yeah. 547 00:40:37,460 --> 00:40:48,260 So we can try to warn it will be fought so that we fine the extension point of E A B so we will have 548 00:40:48,280 --> 00:40:49,170 a box 549 00:40:51,770 --> 00:41:01,110 type located then and type locate to create what's the number. 550 00:41:01,310 --> 00:41:07,220 And then you just copy a fire and then put it right after you get it. 551 00:41:07,220 --> 00:41:10,190 Hundred percent sure I'm going to meet 552 00:41:14,700 --> 00:41:14,940 it. 553 00:41:14,940 --> 00:41:15,390 Okay. 554 00:41:15,410 --> 00:41:25,440 I know when I use it in your debugger Dee Dee Dee good care agent. 555 00:41:25,650 --> 00:41:32,350 Now we have a tune up so I'm gonna want the binary there and then so we know that that idea or we need 556 00:41:32,470 --> 00:41:39,830 to copy to just bury them and then we just copy this string of 200 it's called. 557 00:41:40,340 --> 00:41:47,830 You can read and see that it wasn't a k. 558 00:41:47,870 --> 00:41:50,680 Now we know devalue it. 559 00:41:51,250 --> 00:41:56,110 It's easy will X O K. 560 00:41:56,180 --> 00:41:56,720 Right. 561 00:41:57,720 --> 00:42:04,230 So now when I try to find to use the pattern offset so that we can grab more information you can just 562 00:42:04,230 --> 00:42:05,300 type it. 563 00:42:05,490 --> 00:42:06,000 You say no. 564 00:42:06,090 --> 00:42:06,420 Okay. 565 00:42:06,450 --> 00:42:09,070 So not a is it. 566 00:42:09,120 --> 00:42:09,840 Okay. 567 00:42:10,440 --> 00:42:13,370 So look at our own. 568 00:42:13,540 --> 00:42:17,490 You're going to try to offset it was an error. 569 00:42:18,120 --> 00:42:22,650 And then we use the same thing and so I'll be my issue. 570 00:42:23,430 --> 00:42:24,690 And then it would pass now. 571 00:42:25,620 --> 00:42:29,850 So the 80 said I think I could calculate it but an offset. 572 00:42:29,940 --> 00:42:30,920 Right. 573 00:42:31,180 --> 00:42:35,020 So no. 574 00:42:35,120 --> 00:42:35,600 All right. 575 00:42:35,630 --> 00:42:36,830 He did so far so good. 576 00:42:39,990 --> 00:42:48,840 Oh now just go to the file and then copy this comment and then I see that in your term you know what 577 00:42:48,840 --> 00:42:50,040 this woman does. 578 00:42:50,040 --> 00:42:59,810 So if it's going to create a horse they it MSA venom fight only for remakes of course and then he. 579 00:43:00,480 --> 00:43:04,270 It is the IP address of your machine. 580 00:43:04,290 --> 00:43:05,890 I mean what kind of news machine. 581 00:43:05,940 --> 00:43:13,320 And then here you can type a name port number that you want but we have to know that when we are going 582 00:43:13,320 --> 00:43:21,330 to use so net kind of comments or we have to as they say no and then minus F and write on and minus 583 00:43:21,330 --> 00:43:23,260 B it's the bad character. 584 00:43:23,520 --> 00:43:30,850 So X is he was he will usually continue it as the bad character and then he will a is it like for line 585 00:43:30,870 --> 00:43:34,070 feed and then he will DFAT which is stir. 586 00:43:34,600 --> 00:43:35,890 Okay. 587 00:43:35,960 --> 00:43:37,220 Okay well. 588 00:43:37,940 --> 00:43:39,710 And then so far so good. 589 00:43:39,850 --> 00:43:41,320 So now what are we going to do. 590 00:43:41,520 --> 00:43:48,320 So we are going to try to w Inder or it was never O K so good. 591 00:43:48,760 --> 00:43:49,460 Okay. 592 00:43:49,620 --> 00:43:52,570 Now what are we gonna do with the match way over the top. 593 00:43:52,620 --> 00:44:02,190 To try and find if you know nobody who know a reality joint or card so that we can get into it by any 594 00:44:02,450 --> 00:44:13,890 executive chef God so type of we don't mind as they age gender binary and then grab such search for 595 00:44:13,890 --> 00:44:17,670 John Jay MP and grab it and then. 596 00:44:18,100 --> 00:44:20,980 Okay listen you need to go solo. 597 00:44:21,560 --> 00:44:24,730 All right okay. 598 00:44:24,870 --> 00:44:30,210 So you're going to big this address and then we vs. Dallas is 80. 599 00:44:30,390 --> 00:44:31,330 Forty eight. 600 00:44:31,410 --> 00:44:32,670 Six six to eight. 601 00:44:32,730 --> 00:44:36,400 So we have to a we have to reverse it. 602 00:44:36,670 --> 00:44:40,020 Okay so let's let's show you how can you do it. 603 00:44:40,110 --> 00:44:45,550 So now we have to go to Firefox. 604 00:44:45,610 --> 00:44:56,080 Okay so then passed it down you will find this thing in 0 5 guys and then you just copy that. 605 00:44:56,160 --> 00:44:59,970 So after you learn you you just create a new file. 606 00:45:00,540 --> 00:45:02,580 It's up to you and you can use it. 607 00:45:02,700 --> 00:45:13,940 You can create the file which we get it all or we leave bad key. 608 00:45:14,070 --> 00:45:19,620 Now we need it one sixty eight. 609 00:45:19,650 --> 00:45:23,580 So you have to place order by characters. 610 00:45:23,890 --> 00:45:27,630 You have to leave them where you're when we get in. 611 00:45:27,630 --> 00:45:28,770 I'm so vain on 612 00:45:36,810 --> 00:45:41,870 we have some arguments we have some 613 00:45:44,380 --> 00:45:45,120 Wendy 614 00:45:52,460 --> 00:45:57,490 we have some s gone at least live in San kid. 615 00:45:58,900 --> 00:46:00,600 This obviously isn't it. 616 00:46:00,640 --> 00:46:05,460 Then it in politics again. 617 00:46:05,960 --> 00:46:09,590 Send a motel room. 618 00:46:10,710 --> 00:46:11,640 All right. 619 00:46:11,780 --> 00:46:13,490 So we have to look. 620 00:46:13,610 --> 00:46:14,230 Let's go. 621 00:46:14,230 --> 00:46:21,710 Now in one night God because we have there we have put in or MSA van on. 622 00:46:21,850 --> 00:46:23,320 So we have to win. 623 00:46:23,480 --> 00:46:25,490 As I said earlier. 624 00:46:25,930 --> 00:46:32,060 So you copy and evade just copy this book out 625 00:46:35,060 --> 00:46:36,740 and just replace it. 626 00:46:37,570 --> 00:46:38,910 I'll save it 627 00:46:43,410 --> 00:46:43,860 okay. 628 00:46:43,870 --> 00:46:46,130 So now we can try to open up a new terminal 629 00:46:51,050 --> 00:46:57,730 case and now we're going to try and see at minus an MPP and an equal vote for eight. 630 00:46:57,860 --> 00:46:58,360 Exactly. 631 00:46:58,370 --> 00:47:00,050 The port number that we have. 632 00:47:00,050 --> 00:47:01,880 Type in MSO failed on guys. 633 00:47:01,880 --> 00:47:04,330 We have to be out of it then. 634 00:47:04,370 --> 00:47:13,960 So we won the pilot on along with the IP address of that vulnerable Michigan run we didn't port that 635 00:47:13,960 --> 00:47:19,070 we have found 7 7 8 8 8 Yeah. 636 00:47:19,480 --> 00:47:21,310 So let's wasn't there to see 637 00:47:24,120 --> 00:47:24,630 again. 638 00:47:24,700 --> 00:47:28,510 So look it's working in Haiti. 639 00:47:28,680 --> 00:47:29,150 OK. 640 00:47:29,190 --> 00:47:35,720 So now we have a woodshed so we can just try entity wise share. 641 00:47:35,920 --> 00:47:38,470 MICHAEL I got caught and sent there. 642 00:47:39,390 --> 00:47:43,450 So you see we can go to the comment on it. 643 00:47:44,310 --> 00:47:51,750 Oh we can try to go to Bourbon Street so it can be 60 from 644 00:47:54,710 --> 00:47:57,340 gas so we can get privileges. 645 00:47:57,350 --> 00:47:59,320 Oh yes good. 646 00:48:02,160 --> 00:48:03,810 So that's it. 647 00:48:03,810 --> 00:48:04,920 Guys what is video. 648 00:48:04,980 --> 00:48:10,800 I really hope that this video was informed waiting for your call and then see you in the next video. 649 00:48:10,800 --> 00:48:11,590 Thank you. 650 00:48:11,660 --> 00:48:12,250 Bye.