1 00:00:00,210 --> 00:00:06,160 Hello, everybody, welcome to my advanced ethical hacking, networking, penetration testing, costing. 2 00:00:14,830 --> 00:00:17,790 Welcome to the application of Potful. 3 00:00:17,980 --> 00:00:29,440 We're going to have a very brief talk about ADA or the debugger and some student with me that they don't 4 00:00:29,440 --> 00:00:37,720 exactly know what is the concept of ADA, what what it is standing for, what is already Berga and so 5 00:00:37,720 --> 00:00:37,840 on. 6 00:00:37,840 --> 00:00:43,450 So, so, so we're going to have it with talk about it so he can discourse. 7 00:00:43,460 --> 00:00:53,160 So we have to talk about we have explained how how we can make an attack using Linux and made us proud 8 00:00:53,170 --> 00:00:56,950 and how the setup works and how we can prevent yourself. 9 00:00:57,640 --> 00:01:02,230 So and then we have tried to elaborate on many concepts. 10 00:01:02,510 --> 00:01:08,500 OK, but the questions was about application one, two, three, four, five and six. 11 00:01:08,710 --> 00:01:18,820 So what is it that some some students a day said they would really want to know how how we can how they 12 00:01:18,820 --> 00:01:26,240 can work applications using ADA or the debugger and then what's better to use what's the best? 13 00:01:26,860 --> 00:01:36,790 So as we can say that knowing how this software, I mean, ADA analytic program works is very big plus. 14 00:01:37,070 --> 00:01:40,180 So let me just tell you what is ADA. 15 00:01:41,170 --> 00:01:49,330 ADA is a software that we can use to check the code behind behind some applications because sometimes 16 00:01:49,570 --> 00:01:56,530 you might one when those systems and then you want to use this software, let's say let's say, for 17 00:01:56,530 --> 00:02:01,630 example, freedom of software or Microsoft or some stuff like that. 18 00:02:01,630 --> 00:02:07,670 And then they ask you for a key of your wages, tuition, no key. 19 00:02:07,960 --> 00:02:10,640 So you don't have that key. 20 00:02:10,660 --> 00:02:13,450 That means you will see it on a trial version. 21 00:02:13,450 --> 00:02:17,720 So you will not be able to have the full access or the full control of that software. 22 00:02:18,100 --> 00:02:26,200 So this is exactly what we are going to try to tell you, that if you knew ADA or already Bougere or 23 00:02:26,200 --> 00:02:27,910 some debugging software. 24 00:02:28,030 --> 00:02:33,070 So it is very helpful because you can push it the cracking and then you have the full access of that 25 00:02:33,070 --> 00:02:33,520 software. 26 00:02:33,850 --> 00:02:37,630 So let me tell you some key points of ADA. 27 00:02:38,140 --> 00:02:46,930 So it is able to debug any files supported by the Windows interface so it can benefit from all the features 28 00:02:46,930 --> 00:02:54,460 of the Windows disassembly, including some indoor activities and scripting and plug ins in only the 29 00:02:54,460 --> 00:02:56,420 broker or sixty four. 30 00:02:56,680 --> 00:03:00,760 Let me show you, for example, what is X 64? 31 00:03:00,790 --> 00:03:02,740 Let me open this application. 32 00:03:05,640 --> 00:03:09,360 So we can just try to start this machine. 33 00:03:14,720 --> 00:03:23,540 So I'm using this software guys, this software, 32 or 64, so it doesn't matter, and it is depending 34 00:03:23,540 --> 00:03:30,360 on it depends on what kind of system you have and you can lose as well already. 35 00:03:31,100 --> 00:03:32,570 We're going to talk about it. 36 00:03:32,570 --> 00:03:38,600 And I had a poor Arabo is is about when it is what it means is sportfishing. 37 00:03:38,600 --> 00:03:41,030 Also, more tools are added. 38 00:03:41,420 --> 00:03:48,530 OK, and so already broken and 60 40 biographer's all free under the same category. 39 00:03:49,310 --> 00:03:57,510 The main strength is debugging without some polling information or iboga hasn't been maintained since. 40 00:03:57,510 --> 00:03:59,620 That seems a long time now. 41 00:03:59,660 --> 00:04:02,990 It is limited to x 86. 42 00:04:03,260 --> 00:04:14,090 I mean 32 bit on the other at 60 40 is actively maintained open source and can handle both and x 86 43 00:04:14,090 --> 00:04:15,980 and x 64. 44 00:04:16,700 --> 00:04:17,140 All right. 45 00:04:17,270 --> 00:04:20,120 But I strength is that it is an interactive. 46 00:04:20,360 --> 00:04:21,230 These are Sombra. 47 00:04:21,560 --> 00:04:28,760 You can interrogate them by no more precisely the database generated from the binary in many ways from 48 00:04:28,760 --> 00:04:29,720 Python script. 49 00:04:30,710 --> 00:04:34,970 It is also supported debugging by itself or through orderings. 50 00:04:35,210 --> 00:04:41,930 And one of the best popery, I mean characteristic that I have. 51 00:04:41,930 --> 00:04:44,600 And then we use it often in application. 52 00:04:44,600 --> 00:04:49,370 Kirkenes is that the graphical interface? 53 00:04:49,670 --> 00:04:58,220 The graphical interface helps us a lot, guys, so we can try to open it here or let me go to my machine 54 00:04:58,220 --> 00:05:04,730 so that I can show you exactly who you want to open an application and then. 55 00:05:05,790 --> 00:05:07,350 It asks you for a key. 56 00:05:07,980 --> 00:05:08,650 Let me show you. 57 00:05:08,730 --> 00:05:11,130 So let me call you. 58 00:05:18,840 --> 00:05:24,510 OK, it's OK again, say that let's open supplication with the word Claygate. 59 00:05:27,240 --> 00:05:28,940 So we double kick it, OK? 60 00:05:29,250 --> 00:05:37,290 As you can see, it escosa for a single key, we don't know what is it, but let me try some key, which 61 00:05:37,290 --> 00:05:42,800 was B, let's say I don't know, but let me put some letters about it with some numbers. 62 00:05:42,810 --> 00:05:43,250 I don't know. 63 00:05:43,290 --> 00:05:49,800 So we're going to try to passenger so the application fails because it is only it isolator. 64 00:05:49,800 --> 00:05:55,770 So it's just in that application and the resource implications might be different. 65 00:05:56,100 --> 00:06:02,390 OK, now let me put something like this and then I put in a good job. 66 00:06:02,400 --> 00:06:03,090 You got it. 67 00:06:03,210 --> 00:06:05,470 The password is blah blah blah blah. 68 00:06:05,520 --> 00:06:11,160 So we don't know the process, press any key to it but it's out of it. 69 00:06:11,280 --> 00:06:20,370 We can see that some functions are up inside the application and by using ADA or only Tebogo, you will 70 00:06:20,370 --> 00:06:25,170 be able to find, well, this streams. 71 00:06:25,740 --> 00:06:27,840 How do you work with them in that code? 72 00:06:28,110 --> 00:06:37,680 So this is exactly the main purpose of using only debugger or X 64 or ADA, because in that application 73 00:06:37,680 --> 00:06:40,620 you just see the display. 74 00:06:40,650 --> 00:06:44,020 What you do see the back end inside, the back inside. 75 00:06:44,040 --> 00:06:47,390 I mean, how that goes well with them. 76 00:06:47,700 --> 00:06:56,790 So knowing that somewhere is very, very, very good because most of the applications when you use when 77 00:06:56,790 --> 00:07:02,460 you use it, so you're going to read the code or form as some from some language as well as you might 78 00:07:02,460 --> 00:07:05,730 find it in his supraspinatus if you have a good version of it. 79 00:07:05,750 --> 00:07:11,550 And so you go to the tools and then you view as the C++ code, you might see it. 80 00:07:13,000 --> 00:07:19,870 But these are some body language is vague, but assembly language is very, very good to understand 81 00:07:19,870 --> 00:07:20,010 it. 82 00:07:20,170 --> 00:07:24,010 So I'm not going to quite get here just for what? 83 00:07:24,010 --> 00:07:27,110 I'm just showing you how you can put into this. 84 00:07:27,430 --> 00:07:27,880 All right. 85 00:07:28,060 --> 00:07:31,110 So let me try to put it here down below. 86 00:07:31,120 --> 00:07:33,460 So application for then. 87 00:07:34,420 --> 00:07:37,200 OK, so this is one of the purposes. 88 00:07:37,590 --> 00:07:40,690 Now, let me try to open this application. 89 00:07:40,690 --> 00:07:47,860 If I am trying to do it using either and then I will see the code, I will be able to manipulate the 90 00:07:47,860 --> 00:07:48,130 code. 91 00:07:48,340 --> 00:07:49,440 Let me just show you. 92 00:07:49,810 --> 00:07:54,820 So we come here and then we just go and get to your version. 93 00:07:54,820 --> 00:08:00,410 If you have a 32 to 64 as I get here, what does it matter? 94 00:08:00,860 --> 00:08:02,430 So it can drag it anywhere. 95 00:08:02,440 --> 00:08:08,550 But let me just jump in here and then this is how I pop up and pops up. 96 00:08:08,800 --> 00:08:14,740 So you're going to choose a portable executable for this version and then you click on, OK, I'll leave 97 00:08:14,740 --> 00:08:15,960 everything as default. 98 00:08:16,390 --> 00:08:17,020 All right. 99 00:08:17,620 --> 00:08:20,050 And then now it is longe. 100 00:08:20,260 --> 00:08:24,210 Since we don't see either here, that means it is still launching. 101 00:08:24,550 --> 00:08:26,380 So we put out a little bit. 102 00:08:28,430 --> 00:08:29,340 We have to wait. 103 00:08:29,360 --> 00:08:30,790 So, all right. 104 00:08:30,830 --> 00:08:34,910 So it goes for for something to confirm when we first start or. 105 00:08:35,310 --> 00:08:39,710 We just click on OK, and then we are waiting. 106 00:08:40,580 --> 00:08:43,190 OK, now we see I do is here. 107 00:08:43,490 --> 00:08:47,530 That means the application is already in our software. 108 00:08:47,870 --> 00:08:52,220 Therefore you can try to go to some functions. 109 00:08:52,220 --> 00:08:57,740 Name this one for example, this one for example, this one for example, and then you manipulate the 110 00:08:57,740 --> 00:08:58,080 system. 111 00:08:58,100 --> 00:09:04,580 This is exactly where all the screens that you have seen in your application when you started. 112 00:09:04,610 --> 00:09:11,420 So this is how do we them and then we would encourage you to learn assembly language, because it will 113 00:09:11,420 --> 00:09:16,850 really it will be very helpful for you to understand what's the meaning of move, what's the meaning 114 00:09:16,850 --> 00:09:22,540 of CMB, of Jizzy, of a of ad calling bushing functions. 115 00:09:22,790 --> 00:09:32,390 So, OK, so we just wanted to show you how how what is the importance of using ADA or what is the importance 116 00:09:32,390 --> 00:09:33,020 of using. 117 00:09:33,020 --> 00:09:38,510 All in all, it is quite this is quite the same. 118 00:09:39,230 --> 00:09:42,750 So you will proceed exactly as you put it here. 119 00:09:42,770 --> 00:09:45,680 So if you are familiar with ADA, it's not a problem. 120 00:09:45,710 --> 00:09:51,260 If you are familiar more with authority, it's not a problem, but in a windows working machine. 121 00:09:51,260 --> 00:09:56,420 So we can just give you a very good advice. 122 00:09:56,780 --> 00:10:02,060 X 32 is really, I can say, quite the same as as only people go. 123 00:10:02,240 --> 00:10:09,480 But the thing that it is a very, very manageable for example, some applications might be have enjoyed 124 00:10:09,800 --> 00:10:11,270 lots of students. 125 00:10:11,600 --> 00:10:18,140 Therefore, if you use it already, it might take some time, is to launch all those strings when you 126 00:10:18,140 --> 00:10:22,350 are checking for text or reference strings. 127 00:10:22,550 --> 00:10:27,160 But in in this application study to debugger. 128 00:10:27,290 --> 00:10:36,380 So it it is it is searching for every single screen in that application, which is very, very, very, 129 00:10:36,380 --> 00:10:37,960 very good idea for you. 130 00:10:38,180 --> 00:10:40,070 OK, for example, this application. 131 00:10:40,470 --> 00:10:48,650 So you can just try to go to friends or you find something or you just go to the C.P.U, let me check 132 00:10:48,650 --> 00:10:49,450 it, see you. 133 00:10:49,460 --> 00:10:58,000 And then you use control and then you try for search form, search for now all modules. 134 00:10:58,010 --> 00:11:01,730 And after that you're going to click on stream of frequencies. 135 00:11:01,910 --> 00:11:06,350 It will search for orders for all the strings that is inside the application. 136 00:11:06,350 --> 00:11:08,330 But sometimes it may take some minutes. 137 00:11:08,330 --> 00:11:09,770 It depends on the applications. 138 00:11:10,110 --> 00:11:11,240 It depends on the application. 139 00:11:12,080 --> 00:11:16,630 So you're going to have to wait sometimes. 140 00:11:16,970 --> 00:11:23,120 OK, so this is all what we wanted to show you guys. 141 00:11:23,120 --> 00:11:28,640 And then we are really looking forward to seeing you in the next and the next video, because we are 142 00:11:28,640 --> 00:11:31,370 going to talk about that this application first. 143 00:11:31,370 --> 00:11:40,010 But we are going to take the application of let me check of the No.7, because here we were on board 144 00:11:40,010 --> 00:11:45,410 six and then now we are going to go step by step from Pod seven to Epsilon. 145 00:11:45,620 --> 00:11:54,770 So we will encourage you if you don't have the display first to install and check it on our Facebook 146 00:11:54,770 --> 00:12:04,100 page, you will obviously find some discount if you want to get some discount code for days and for 147 00:12:04,100 --> 00:12:05,120 these courses. 148 00:12:05,180 --> 00:12:10,490 So it would be better to go to your Facebook page at acase or Facebook page is there. 149 00:12:10,490 --> 00:12:14,900 So I'm going to go here and you just type Jedi Academy. 150 00:12:14,900 --> 00:12:15,740 So let me check. 151 00:12:15,740 --> 00:12:16,700 I just know. 152 00:12:18,700 --> 00:12:23,800 You don't have to log in on Facebook or you don't have to be a Facebook users to see or post, because 153 00:12:23,800 --> 00:12:27,460 in your post we usually give some coupon codes. 154 00:12:27,910 --> 00:12:33,660 So we would encourage you before enrolling to check if you want to use the coupon coldly. 155 00:12:33,700 --> 00:12:34,680 It would be better for you. 156 00:12:34,690 --> 00:12:39,940 So you have you will have a discount and then you just check, for example, let me check this. 157 00:12:40,870 --> 00:12:41,560 Check this. 158 00:12:42,230 --> 00:12:46,260 So here it is a cause. 159 00:12:46,270 --> 00:12:49,780 So so we can go like this and then these. 160 00:12:50,050 --> 00:12:51,510 So there are some coupon codes. 161 00:12:51,640 --> 00:12:53,470 You might use them and then. 162 00:12:53,500 --> 00:12:53,890 Yeah. 163 00:12:54,190 --> 00:12:55,360 So you're going to get them. 164 00:12:55,930 --> 00:13:00,580 Now let's move to report seven. 165 00:13:00,850 --> 00:13:02,440 OK, so see what the.