1 00:00:00,210 --> 00:00:06,160 Hello, everybody, welcome to my advanced ethical hacking, networking, penetration testing, costing. 2 00:00:18,470 --> 00:00:23,190 Welcome again to our next part of the cooking phase. 3 00:00:23,630 --> 00:00:27,170 So now we are going to into the next part. 4 00:00:27,170 --> 00:00:30,370 So we have been in the previous course and the Pacific. 5 00:00:30,440 --> 00:00:32,840 So now we're going to introduce part seven. 6 00:00:33,260 --> 00:00:37,420 So to do so, we are going to open up to open of our box machine. 7 00:00:38,240 --> 00:00:42,800 And for this tutorial, we're going to use Windows seven. 8 00:00:46,810 --> 00:00:48,580 OK, so let's talk a little bit. 9 00:00:49,690 --> 00:00:56,800 Well, now you're going to go to that application to that website, Hellbound Hackers or Mikahil. 10 00:01:02,030 --> 00:01:08,910 As we go to this event, both, and then you just click and download it, so we use on this event for 11 00:01:08,910 --> 00:01:10,620 this to Toyota and then now we have it here. 12 00:01:10,640 --> 00:01:13,930 So we're going to just like an extra ticket here. 13 00:01:16,220 --> 00:01:17,770 So now it's here. 14 00:01:18,470 --> 00:01:26,980 We can try to open it by double picking company number one or one of its dependencies and correctly 15 00:01:26,990 --> 00:01:29,470 were destroyed, a file is missing or an invalid. 16 00:01:29,510 --> 00:01:32,130 And look so worried. 17 00:01:32,150 --> 00:01:36,710 This is the application interface all probably it's in Windows. 18 00:01:36,720 --> 00:01:44,960 So but anyways, we are going to update on Windows seven, so let's try to open it inaudible here. 19 00:01:45,710 --> 00:01:51,920 We come here and we will take you on a administrator and. 20 00:01:53,120 --> 00:01:53,590 Yep. 21 00:01:55,040 --> 00:01:59,780 So what we can do, we will upload this fight here. 22 00:02:02,710 --> 00:02:03,700 I recommend. 23 00:02:07,040 --> 00:02:08,030 I look around. 24 00:02:10,100 --> 00:02:11,300 I mean, what are you. 25 00:02:14,830 --> 00:02:15,140 OK. 26 00:02:18,810 --> 00:02:20,300 So we'll wait here. 27 00:02:21,990 --> 00:02:24,440 It dug it down a bit. 28 00:02:24,750 --> 00:02:27,240 OK, now we can try to find. 29 00:02:29,170 --> 00:02:37,400 How the application works or how it looks like because we are not even to open it by working. 30 00:02:37,780 --> 00:02:41,110 So first thing, first thing going on this application. 31 00:02:41,410 --> 00:02:42,880 Yes, yes. 32 00:02:44,650 --> 00:02:45,210 All right. 33 00:02:45,250 --> 00:02:48,430 So now we don't have that module anymore. 34 00:02:48,440 --> 00:02:55,570 So we have the application APIs, even though we can try to find a text with which the text which are 35 00:02:55,570 --> 00:02:56,620 inside that application. 36 00:02:57,010 --> 00:03:00,220 So we will click and search for. 37 00:03:01,750 --> 00:03:03,630 All reference it takes. 38 00:03:05,020 --> 00:03:12,640 OK, so now a new page is popping up, we're going to try to find some pics inside if it is a bunch 39 00:03:12,640 --> 00:03:15,100 of text so we can just try to wait. 40 00:03:15,110 --> 00:03:16,300 We can stretch for days. 41 00:03:16,660 --> 00:03:21,860 But if we just want to proceed and just try it out first, because it's not that much. 42 00:03:21,860 --> 00:03:29,680 So we can just try to go down on try to go down to see the which are inside. 43 00:03:33,860 --> 00:03:34,430 Kay. 44 00:03:37,730 --> 00:03:44,380 Well, we find something offensive really good takes, John, for way sex or gays. 45 00:03:44,450 --> 00:03:45,430 It might be nothing. 46 00:03:45,430 --> 00:03:47,120 Think look inward looking. 47 00:03:47,150 --> 00:03:48,560 What is that message? 48 00:03:49,010 --> 00:03:55,310 Is that message in all that we are that we will get when the application is not working, for example, 49 00:03:55,310 --> 00:03:58,220 when we try to get some of some stuff like that. 50 00:03:58,760 --> 00:04:06,110 And then the next line, it says that it has some condition that the name and password did not have 51 00:04:06,110 --> 00:04:06,670 a match. 52 00:04:06,680 --> 00:04:09,210 That means Fuseli and Discord. 53 00:04:09,530 --> 00:04:10,940 There are some string. 54 00:04:12,320 --> 00:04:15,180 So let's come down. 55 00:04:17,360 --> 00:04:18,590 And please, which way? 56 00:04:18,650 --> 00:04:25,190 OK, so you made Basswood schools, whatever it might be so easy. 57 00:04:25,200 --> 00:04:29,800 There is a with his screwdriver, we don't know, but let's try it first. 58 00:04:30,110 --> 00:04:36,950 So let's come back to orcharding machines or to do so, we got to open all division cutting machines 59 00:04:36,950 --> 00:04:40,210 or here and then we just going to try a screwdriver. 60 00:04:40,220 --> 00:04:41,660 If it works it would be done. 61 00:04:41,660 --> 00:04:46,130 If not so we will have to do some changes in that application code. 62 00:04:46,510 --> 00:04:50,990 OK, so here we can open up Firefox. 63 00:04:55,130 --> 00:04:56,270 About hackers. 64 00:05:00,630 --> 00:05:09,370 So again, oh, looks like you're using in a book years and what and what we use in I. 65 00:05:10,270 --> 00:05:11,220 You want me to post it? 66 00:05:21,290 --> 00:05:21,930 Again. 67 00:05:23,780 --> 00:05:25,400 So we can try to it. 68 00:05:29,550 --> 00:05:31,830 OK, so we are still here as anything. 69 00:05:31,950 --> 00:05:34,270 So let's see, would you be OK? 70 00:05:34,800 --> 00:05:41,790 Therefore, we're going to try to take your screwdriver and applications safe and let me go up a little 71 00:05:41,790 --> 00:05:42,120 bit. 72 00:05:43,080 --> 00:05:45,540 Or Prop seven. 73 00:05:46,450 --> 00:05:55,420 OK, so now let's come back to those within again, no capital letters, screwdriver altogether. 74 00:05:55,860 --> 00:06:01,050 So let me come here again and get a screwdriver. 75 00:06:01,120 --> 00:06:09,540 Let me type easy for us so that we can see school driver and control a controlled X. 76 00:06:09,840 --> 00:06:10,470 Got it. 77 00:06:11,040 --> 00:06:12,470 And come back here again. 78 00:06:12,930 --> 00:06:14,210 We copy and past. 79 00:06:14,220 --> 00:06:14,850 Let's see. 80 00:06:18,520 --> 00:06:25,570 Concord's tiny print has been added, so it was nothing just opened the publication inaudible ADA or 81 00:06:25,600 --> 00:06:30,000 ADA or Oladipo or that application. 82 00:06:30,010 --> 00:06:31,230 So we will use it and. 83 00:06:31,600 --> 00:06:32,640 This application, guys. 84 00:06:32,740 --> 00:06:41,140 Let me show you X 32 except for this one is it is very helpful for finding all the strings which are 85 00:06:41,140 --> 00:06:42,700 inside your applications. 86 00:06:43,000 --> 00:06:44,950 So that's it guys. 87 00:06:44,950 --> 00:06:49,560 So see you in the next crooking part ok.