1 00:00:00,210 --> 00:00:05,820 Hello, everybody, welcome to my advanced ethical hacking, networking, penetration testing costs. 2 00:00:15,990 --> 00:00:24,960 OK, so now let's continue let's go to the next application so we can come here and we can close everything 3 00:00:25,590 --> 00:00:26,430 close. 4 00:00:29,270 --> 00:00:37,020 OK, so will we have already downloaded the ten applications, so we're going to come here. 5 00:00:37,040 --> 00:00:37,870 So let's. 6 00:00:38,690 --> 00:00:40,210 Let's delete everything. 7 00:00:42,430 --> 00:00:45,510 Control move to Josh. 8 00:00:47,540 --> 00:00:53,420 OK, so when I come here, they can go to home for the. 9 00:00:55,440 --> 00:00:58,280 All right, so now we're going to try to track it here. 10 00:01:03,070 --> 00:01:10,980 OK, so what we can do now as the first thing you have to try to see how this application looks like, 11 00:01:11,740 --> 00:01:17,320 so it is something interesting that we put anything here and. 12 00:01:18,770 --> 00:01:19,520 Kikongo. 13 00:01:20,630 --> 00:01:23,540 So you need one try again. 14 00:01:23,850 --> 00:01:28,970 OK, let me put some digits, some numbers 15 00:01:33,320 --> 00:01:34,010 and. 16 00:01:35,100 --> 00:01:37,260 So elongated one, try again. 17 00:01:37,290 --> 00:01:47,260 OK, so let us try to open this application using ADA, will you drag it here and put it in a pool? 18 00:01:47,690 --> 00:01:48,300 Sixty four. 19 00:01:52,800 --> 00:01:54,540 Now, just please. 20 00:01:54,890 --> 00:01:55,400 OK. 21 00:01:59,850 --> 00:02:07,320 OK, as the first thing first, this TARP program starts for us, so as soon as Ingworth if you more, 22 00:02:07,350 --> 00:02:14,670 but if you want you can just buy space and to put it back on the eight of you, you just wear space 23 00:02:14,670 --> 00:02:17,450 and do it if if you cannot put it. 24 00:02:17,460 --> 00:02:19,680 So you got to create a function. 25 00:02:19,680 --> 00:02:27,810 And by pressing people just by pricing or by double clicking interest, great function and therefore 26 00:02:27,840 --> 00:02:30,210 you can buy space and boom you get there. 27 00:02:31,030 --> 00:02:33,590 OK, but we don't need it from now. 28 00:02:33,600 --> 00:02:35,160 We just need the government. 29 00:02:35,190 --> 00:02:42,810 So because the government gives us a better understanding of how the courts work. 30 00:02:43,290 --> 00:02:43,950 All right. 31 00:02:44,220 --> 00:02:45,230 So let's come here. 32 00:02:45,870 --> 00:02:52,750 We're going to double click it first thing you can try to see if there is there anything else, nothing. 33 00:02:52,770 --> 00:02:56,080 Or drag it out of nothing. 34 00:02:56,370 --> 00:02:57,660 So let's come here. 35 00:03:00,010 --> 00:03:05,250 We double click and try to see if there are some string text. 36 00:03:06,630 --> 00:03:11,810 Nothing is not as interesting, Joyce Mitchell by lucid dreaming and so on and so on. 37 00:03:12,330 --> 00:03:13,190 So let's come here. 38 00:03:15,120 --> 00:03:23,120 We're going to double click who eats a lot or can analyze it a lot, so let's come here to check in 39 00:03:23,130 --> 00:03:24,240 and check the code. 40 00:03:25,770 --> 00:03:32,610 You guys, if you have this application, if you need an application and you don't understand the assembly 41 00:03:32,610 --> 00:03:39,420 code, so it would be better for you to analyze this code step by step and slowly. 42 00:03:43,340 --> 00:03:51,500 As I said earlier, if you if you open your IRA and you want to find some strings, it would be good 43 00:03:51,500 --> 00:03:58,290 also to just check it from here and open view, open some views and allow. 44 00:03:59,420 --> 00:04:00,680 Come in here, come on. 45 00:04:02,420 --> 00:04:10,280 Here and you get you click on strings and then you will get all the strings which are in that application, 46 00:04:10,280 --> 00:04:13,160 but sometimes you might not get them. 47 00:04:13,520 --> 00:04:16,370 Let me just put it that for you. 48 00:04:16,740 --> 00:04:22,040 OK, but sometimes you may not find all the strings which are there. 49 00:04:22,070 --> 00:04:22,940 Oh, look. 50 00:04:25,260 --> 00:04:34,930 This software X sixty four DB G helps you find all these things which are in the applications. 51 00:04:35,260 --> 00:04:41,740 So let's come back here and again, so we come back here again. 52 00:04:42,370 --> 00:04:47,880 We can just go down to analyze it, to analyze it, to analyze it. 53 00:04:48,030 --> 00:04:50,960 Let me put it back on. 54 00:04:51,570 --> 00:04:52,320 Where was it? 55 00:04:54,260 --> 00:04:55,030 OK. 56 00:04:57,760 --> 00:04:59,140 All right, so. 57 00:05:01,830 --> 00:05:06,750 Going down below, down below with our left. 58 00:05:09,550 --> 00:05:14,980 Again, he didn't want to live, so you can just keep pressing our left, put it to the right, because 59 00:05:15,160 --> 00:05:18,060 as you can see, this is not a white line. 60 00:05:18,070 --> 00:05:23,580 And so we've got to find all the codes and all the functions are there. 61 00:05:24,980 --> 00:05:27,200 But probably not the strings. 62 00:05:27,380 --> 00:05:28,040 Let's see. 63 00:05:30,770 --> 00:05:40,850 OK, so 47 19 system, Fred, OK, anyways, so let's go here in the representa or just double clicking. 64 00:05:42,420 --> 00:05:51,780 OK, so this one might look interesting, we don't know let's try so we don't even have to go disposer 65 00:05:51,780 --> 00:05:54,060 because there are not caught inside. 66 00:05:54,490 --> 00:05:56,130 So let's come here to the outside. 67 00:06:00,120 --> 00:06:09,000 So we don't even have to go down this path as well because they are not good, so only we stay in the 68 00:06:09,000 --> 00:06:09,510 middle. 69 00:06:11,850 --> 00:06:15,300 OK, there are some strings and everything. 70 00:06:15,530 --> 00:06:26,130 And OK, what we can detect is that this twins was this twins in Minnesota that we have got earlier 71 00:06:26,250 --> 00:06:33,810 when we tried to warn that this application, therefore we have to find a way to interrupt this conformal 72 00:06:33,810 --> 00:06:34,580 going here. 73 00:06:34,830 --> 00:06:42,900 So we got to make this call going from here because here it is within the password for H h is blah, 74 00:06:42,900 --> 00:06:43,220 blah, blah. 75 00:06:43,230 --> 00:06:43,850 We don't know. 76 00:06:43,860 --> 00:06:45,390 So let's try to go down below. 77 00:06:46,800 --> 00:06:54,990 And after all those operations, it jumps to dislocation and dislocation. 78 00:06:54,990 --> 00:06:58,710 Dislocation is here and also this one, jobs here. 79 00:06:59,250 --> 00:07:09,600 So what we can do, we can assemble this code just wide, wide up right above it, this one. 80 00:07:09,600 --> 00:07:12,600 And instead of going here, we wanted to come here. 81 00:07:12,870 --> 00:07:20,490 So we're going to say jump not not equal zero, but jump if it is equal to zero. 82 00:07:20,910 --> 00:07:23,850 So therefore we can try to assemble it and. 83 00:07:26,200 --> 00:07:35,830 What is this week, OK, and can so we can type it on, we can put it on green because we make some 84 00:07:35,830 --> 00:07:37,630 changes, OK? 85 00:07:38,440 --> 00:07:42,240 He'll just where will we see a kind of text? 86 00:07:42,250 --> 00:07:49,870 We don't know what is it yet, but after that, it moves this upset to the aid register and then after 87 00:07:49,870 --> 00:07:59,730 it moves that 10, then edge into the county register and then it is it a wee bit disturbed by comparing. 88 00:08:00,430 --> 00:08:05,680 So therefore we can see that we have some comparison. 89 00:08:06,910 --> 00:08:12,910 What we can do, we can try to put some kind of web point so that it doesn't compare or but first thing 90 00:08:12,910 --> 00:08:19,690 first, let's try to go into that stream, into the applications and copy it first. 91 00:08:20,050 --> 00:08:29,260 Could be eight to 10 to try to one and control C control. 92 00:08:30,100 --> 00:08:33,220 Let me see if it is if it is the way. 93 00:08:34,180 --> 00:08:35,230 Well, come on. 94 00:08:36,190 --> 00:08:47,200 OK, so Condorcet and we will try to pass the code when we open the application and then we will just 95 00:08:47,200 --> 00:08:53,650 check if by accident we don't get the passwords or we get to put on weight based on the comparison or 96 00:08:53,650 --> 00:08:54,520 on some calls. 97 00:08:55,030 --> 00:08:59,860 So let's go first to apply this budget to the five. 98 00:09:02,610 --> 00:09:08,630 Is that if everything's all right, so now we can come back here and try it out again. 99 00:09:10,610 --> 00:09:11,900 Now we can put. 100 00:09:13,750 --> 00:09:24,000 We can w we can just put anything, but we got to put that the text that we have copyright earlier, 101 00:09:24,100 --> 00:09:27,670 but we will just try to find what it is. 102 00:09:28,570 --> 00:09:32,710 The password for each age is what we have put. 103 00:09:33,710 --> 00:09:34,780 This is one step. 104 00:09:35,350 --> 00:09:43,900 OK, so let me put it now be or let me put just me and go. 105 00:09:45,090 --> 00:09:50,760 The buzzword for Asia is the first one, and the password for this is the second one. 106 00:09:51,120 --> 00:10:01,200 OK, so that you see and I can just leave it here, it doesn't matter that now we see we get another 107 00:10:01,200 --> 00:10:01,800 password. 108 00:10:02,760 --> 00:10:10,290 But this password is probably the comparison when we put the first password here and then the second 109 00:10:10,290 --> 00:10:15,560 password here and then it compares it and then give us some kind of syntax. 110 00:10:15,730 --> 00:10:17,390 Let's see how many digit it has. 111 00:10:17,400 --> 00:10:25,650 One, two, three, four, five, six, seven, eight, nine, 10, 11, 12, 13, 14, 15. 112 00:10:25,800 --> 00:10:26,480 Wait a minute. 113 00:10:27,000 --> 00:10:37,600 One, two, three, four, five, six, seven, eight, nine, 10, 11, 12, 13, 14, 15, 16 or K, 114 00:10:37,950 --> 00:10:38,910 16 digit. 115 00:10:40,330 --> 00:10:42,760 We don't want you, we don't want you. 116 00:10:43,390 --> 00:10:46,510 Let me close this application and let's try to reopen it. 117 00:10:48,200 --> 00:10:57,770 And now we're going to past the text that we have conveyed, look, OK, this is one step. 118 00:10:58,250 --> 00:11:02,990 The password for this one is the thing that we put. 119 00:11:03,290 --> 00:11:03,770 We see. 120 00:11:04,890 --> 00:11:09,460 E one six four six zero twenty two. 121 00:11:09,870 --> 00:11:13,800 Listen to me, one six zero three two and one is one. 122 00:11:14,230 --> 00:11:15,010 This is one step. 123 00:11:15,030 --> 00:11:16,230 Let us click again. 124 00:11:18,350 --> 00:11:23,990 This is the second one, so it is the same, you see. 125 00:11:25,220 --> 00:11:25,980 The same thing. 126 00:11:26,270 --> 00:11:31,070 So let let us try again and then so that the court will compel them. 127 00:11:33,650 --> 00:11:37,290 All right, now we get something new. 128 00:11:37,670 --> 00:11:40,470 Let me put it like this for you. 129 00:11:41,380 --> 00:11:42,430 We get something new. 130 00:11:42,770 --> 00:11:49,510 What we have is that so the password for each page is the first thing that we have into it. 131 00:11:49,820 --> 00:11:53,240 And then this again, password, of course, is this one. 132 00:11:53,240 --> 00:11:57,620 What the comparison, as you might see, is this password. 133 00:11:58,190 --> 00:12:06,110 So we don't know if it if it is the good password, but we will just try it because it is interesting. 134 00:12:06,140 --> 00:12:08,170 It is just a testing. 135 00:12:08,180 --> 00:12:12,200 So we are going to try everything that we found interesting. 136 00:12:12,530 --> 00:12:13,080 All right. 137 00:12:13,100 --> 00:12:15,220 So let me close this. 138 00:12:15,230 --> 00:12:16,990 I want you let me close this. 139 00:12:17,000 --> 00:12:22,130 I don't want you let me keep this one that I can put it here, right over here. 140 00:12:22,430 --> 00:12:29,840 So let me come back here and and put it over here. 141 00:12:31,370 --> 00:12:36,110 Oh, let me let me put it down on the on the on. 142 00:12:36,290 --> 00:12:38,570 OK, so that you can see everything. 143 00:12:40,070 --> 00:12:47,120 OK, so now I put it here, the fall, I can just come down a little bit. 144 00:12:47,360 --> 00:12:51,470 OK, now we are in application 10, so we're going to try it out. 145 00:12:52,250 --> 00:13:03,800 So the password is two five six two five six oh, let me put it here and instead let me use it. 146 00:13:07,210 --> 00:13:08,170 Two, five, six. 147 00:13:12,480 --> 00:13:24,330 The password is two, five, six, two, five, six and seven, eight, nine, eight, seven, eight, 148 00:13:24,930 --> 00:13:25,740 nine, eight. 149 00:13:26,340 --> 00:13:28,920 And then E, b. 150 00:13:29,190 --> 00:13:29,760 B. 151 00:13:31,510 --> 00:13:40,990 Eight E five F nine Didi one more time, the D nine F. 152 00:13:43,150 --> 00:13:48,760 Phys ed, ed, ed will be. 153 00:13:51,770 --> 00:14:02,780 E eight eight nine eight nineteen sixty seven, twenty five, six, seven twenty five, okay, so select 154 00:14:02,780 --> 00:14:04,130 all control X. 155 00:14:05,630 --> 00:14:08,000 So we're going to come here, ambassador, here, so let's see. 156 00:14:11,850 --> 00:14:14,980 Invalid password, please enter the password. 157 00:14:15,240 --> 00:14:17,310 So we got to find the best one. 158 00:14:17,590 --> 00:14:24,510 OK, so what we can do now, we can just try to put a blueprint on on that and the computers and try 159 00:14:24,510 --> 00:14:24,960 it out. 160 00:14:25,710 --> 00:14:26,140 Okay. 161 00:14:29,570 --> 00:14:35,840 OK, so, no, as you've seen that we have enjoyed any valid password, so we get to figure it out to 162 00:14:35,840 --> 00:14:40,430 know how to check or to see how we can get the password. 163 00:14:41,030 --> 00:14:45,260 OK, so I wouldn't want you to go here. 164 00:14:45,260 --> 00:14:51,260 And after putting this file, of course, here, so you upload it somewhere and then you go to your 165 00:14:51,260 --> 00:14:59,720 Windows machine if you're already there and try to download it and then we're going to put it in our 166 00:14:59,720 --> 00:15:00,400 Windows machine. 167 00:15:00,770 --> 00:15:11,010 So let's try first to just save this machine vision or we can just leave it here so it doesn't matter. 168 00:15:11,050 --> 00:15:12,520 So let's go to our Windows machine. 169 00:15:14,470 --> 00:15:18,070 OK, so you downloaded the illegal. 170 00:15:18,820 --> 00:15:25,720 This is the application eight, OK, so we can turn everything off, OK? 171 00:15:26,710 --> 00:15:32,320 Now what we can do, you have to try to open this application. 172 00:15:33,190 --> 00:15:36,210 We are using only debugger, so. 173 00:15:36,220 --> 00:15:37,060 All right. 174 00:15:37,180 --> 00:15:44,320 Let me make this modification first, Delate. 175 00:15:49,780 --> 00:15:51,080 Don't need them. 176 00:15:52,380 --> 00:15:52,920 Even. 177 00:16:02,650 --> 00:16:04,510 Well, so let me increase it. 178 00:16:10,430 --> 00:16:14,440 Therefore, we're going to try to click and drag this application there. 179 00:16:16,510 --> 00:16:19,540 This one we have, we decided to continue to. 180 00:16:25,430 --> 00:16:29,360 With which one we are working, which one we are working with. 181 00:16:32,150 --> 00:16:34,130 OK, so we are there. 182 00:16:35,030 --> 00:16:36,590 Let's jog it here. 183 00:16:44,850 --> 00:16:48,930 So let's check how obligation is in go. 184 00:16:49,080 --> 00:16:54,360 So let's just go here and click one just one time. 185 00:16:55,170 --> 00:16:57,310 OK, so now you're going to click right? 186 00:16:57,400 --> 00:16:59,850 Click here and check for text. 187 00:17:01,910 --> 00:17:05,290 As usual, and make it let's can be bigger. 188 00:17:07,100 --> 00:17:09,980 We're going to just the one quick thing on here, for example. 189 00:17:10,280 --> 00:17:11,230 OK, so we get there. 190 00:17:13,340 --> 00:17:19,250 What we see that the application is built with a default, not a default. 191 00:17:19,250 --> 00:17:20,900 But they do. 192 00:17:22,040 --> 00:17:30,890 The builder of this application put strings here and there for what it says that we don't know. 193 00:17:31,130 --> 00:17:37,060 But we see that here is it ASCII text. 194 00:17:37,580 --> 00:17:40,910 So let's try to see if avision is. 195 00:17:40,910 --> 00:17:41,380 All right. 196 00:17:41,620 --> 00:17:46,130 So let's try to one day the application first. 197 00:17:46,640 --> 00:17:54,170 Let's come back here and listen to it, try to see how it would have been black. 198 00:17:56,890 --> 00:18:06,850 The password is blah, blah, so this is the line that that we have changed this one, I believe that 199 00:18:06,850 --> 00:18:12,580 you see, OK, this is the line that we have changed in Al-Qadi machine using PAIDA. 200 00:18:13,420 --> 00:18:14,520 All right there. 201 00:18:14,590 --> 00:18:19,150 For now, let's try to understand what the code there is. 202 00:18:19,630 --> 00:18:20,020 Let's go. 203 00:18:20,030 --> 00:18:22,450 Up, up, up, up. 204 00:18:24,470 --> 00:18:33,710 After we will that point, but we would just see what we what we should do, it is go up or we can go 205 00:18:33,710 --> 00:18:34,390 faster. 206 00:18:35,660 --> 00:18:36,530 By doing so. 207 00:18:37,630 --> 00:18:38,390 OK. 208 00:18:41,230 --> 00:18:46,770 No, Askey could've flown except on the one that we have found in the. 209 00:18:49,520 --> 00:18:50,600 It's go down below. 210 00:18:53,810 --> 00:19:03,650 Let's go, let's go, let's go, let's go down below when we start seeing some techs looking. 211 00:19:03,680 --> 00:19:10,790 So let's stop here, let's see when we are here or let me go here to the first. 212 00:19:10,820 --> 00:19:15,160 OK, so this is a corruption decision on the corruption, OK? 213 00:19:15,240 --> 00:19:20,590 Now, the court push is a register. 214 00:19:21,110 --> 00:19:26,840 It push into a register and then push the call and register. 215 00:19:29,080 --> 00:19:39,770 Now, what we what it does is it moves this address to it, to that it is it this address on it. 216 00:19:40,040 --> 00:19:45,020 If you want to see how how it works, you just press space to see. 217 00:19:45,410 --> 00:19:46,150 Exactly. 218 00:19:46,520 --> 00:19:57,910 So this address forty thirty seven e it pushes it, it moves it on air, say OK, let's get down below. 219 00:19:57,920 --> 00:20:10,820 And then what it does is this takes us called this Askey and here it pulls something again on the LDA 220 00:20:10,940 --> 00:20:12,710 let let's with space. 221 00:20:13,910 --> 00:20:24,620 OK, this address forty thirty one a full forty two to one before it pushes on eBay. 222 00:20:25,040 --> 00:20:26,480 Let's take what is that. 223 00:20:26,480 --> 00:20:27,710 Our address. 224 00:20:27,920 --> 00:20:32,420 So thirty one A4 for that one. 225 00:20:32,420 --> 00:20:33,680 A feel good. 226 00:20:33,790 --> 00:20:35,360 Good on that one. 227 00:20:38,570 --> 00:20:40,760 Thirty one A4 or. 228 00:20:42,820 --> 00:20:43,510 Get. 229 00:20:46,370 --> 00:20:59,180 OK, what it does, it put this address on ideia, but we know decs, so let's see, it moves then to 230 00:20:59,180 --> 00:21:06,260 the county register and then it be by comparing the bite that we have. 231 00:21:06,260 --> 00:21:14,360 And to it that means obviously here will be some tax strains that when we endured it will compare this 232 00:21:14,380 --> 00:21:21,050 to us because of the tax streams with this with with this ASCII code. 233 00:21:21,470 --> 00:21:27,560 If they match the URL for the string text that we have enjoyed, is that password. 234 00:21:27,560 --> 00:21:38,780 If they don't match, we get to figure out what is that quick text and it compares again and then it 235 00:21:38,780 --> 00:21:42,140 jump into this address. 236 00:21:42,140 --> 00:21:47,330 Forty, fourteen, B, fourteen for the B we have change it. 237 00:21:47,340 --> 00:21:52,700 And in either it was not jumping here, it was jumping into the U code. 238 00:21:53,000 --> 00:22:00,170 You will block what now we just jump or equal to this address. 239 00:22:00,610 --> 00:22:09,490 Joeckel is similar like John Jay Z visa is if if is equal or equal to zero. 240 00:22:09,830 --> 00:22:10,460 So. 241 00:22:10,700 --> 00:22:20,110 All right, let me show you if if you want to see you can just remove E and put type Z, you will see 242 00:22:20,150 --> 00:22:21,960 automatically if you get change. 243 00:22:21,980 --> 00:22:22,610 So let's see. 244 00:22:22,730 --> 00:22:23,120 You see. 245 00:22:25,420 --> 00:22:29,500 It's always g e because they are the same. 246 00:22:30,220 --> 00:22:35,200 All right, so let's try to find this address for these. 247 00:22:35,500 --> 00:22:36,940 Let me wait. 248 00:22:37,480 --> 00:22:39,250 Let me put in bigger for you. 249 00:22:41,060 --> 00:22:50,540 This address is zero zero 40 14 E, let's try to find words that address, let's go down a little bit 250 00:22:51,170 --> 00:22:54,980 b e we need the E for the 14. 251 00:22:57,630 --> 00:23:09,180 We do it for these 49, B, E for def fourteen, the E, B, B, this one, that means let me put a 252 00:23:09,180 --> 00:23:10,530 bullet went after it. 253 00:23:11,190 --> 00:23:18,140 That means when when we are here, it jumps into this address. 254 00:23:18,440 --> 00:23:30,910 OK, so we now after all these steps, let me put it like this for you again. 255 00:23:31,710 --> 00:23:32,670 So now we can. 256 00:23:35,550 --> 00:23:36,200 Decrease it. 257 00:23:37,170 --> 00:23:37,680 Right. 258 00:23:37,970 --> 00:23:45,420 So now what we can do, we see that it jumps into these countries. 259 00:23:45,510 --> 00:23:49,170 OK, we see a strain to add. 260 00:23:49,500 --> 00:23:52,440 So this is the fourth string that is in that application. 261 00:23:52,440 --> 00:23:55,980 The password for HIV AIDS is nothing else. 262 00:23:56,610 --> 00:24:01,050 It but again, this is for the 31 18. 263 00:24:02,100 --> 00:24:04,320 So let's start with Endo. 264 00:24:04,410 --> 00:24:06,430 So it's just push it, OK? 265 00:24:07,200 --> 00:24:18,570 The problem with contagious Gene Kincade gene means that a strain, a Wandong strains that we as the 266 00:24:18,570 --> 00:24:22,120 user we in put in that application software. 267 00:24:22,500 --> 00:24:28,910 Therefore it will connected with this with this strain. 268 00:24:29,490 --> 00:24:33,420 OK, and then so this is the population again. 269 00:24:33,450 --> 00:24:40,860 So this is the strain to added that the strain that we had when we did it and then it conquered the 270 00:24:40,860 --> 00:24:44,070 strains again and it made the decision. 271 00:24:44,070 --> 00:24:44,890 I mean, the call. 272 00:24:45,210 --> 00:24:52,860 So after this last check, OK, this is the first strain and the steps is that it can the strains and 273 00:24:52,860 --> 00:24:54,610 call it again. 274 00:24:54,630 --> 00:25:04,110 Now, this is the text that we have input and the ramifications of it by by putting it, it pushes it 275 00:25:04,710 --> 00:25:13,140 again, it pushes the contract strains and it calls it the fall after that a push. 276 00:25:14,280 --> 00:25:19,450 OK, so what it says that it goes on below. 277 00:25:19,650 --> 00:25:29,610 So some it takes a push again, the text now not as architects and newly pushes and so on zone. 278 00:25:29,800 --> 00:25:40,020 OK, now finally it it jumps into this into this address for 40 foot b e where was it here. 279 00:25:40,530 --> 00:25:43,520 14 for D forty in. 280 00:25:44,380 --> 00:25:52,530 OK, so let us on the application and try to enter in is trying to see how it will be. 281 00:25:53,100 --> 00:25:56,250 So let me go here of this thing first. 282 00:25:56,270 --> 00:25:59,040 Let me use those we print. 283 00:26:01,830 --> 00:26:06,090 So we, we print, we delay it again. 284 00:26:06,090 --> 00:26:09,000 We print again so we can come here. 285 00:26:11,850 --> 00:26:24,690 Now we can try anything, let's say that we will type O, save me, save, save, save me. 286 00:26:28,070 --> 00:26:32,830 The password is Save Me because it pushes what we into. 287 00:26:33,530 --> 00:26:36,120 You see, it pushes the text. 288 00:26:37,100 --> 00:26:40,120 What we have into it, OK, OK. 289 00:26:40,670 --> 00:26:51,770 And then come back here to see automatically a new ASCII code is into it so that it compares with the 290 00:26:51,770 --> 00:26:54,470 first ASCII code, as we can see. 291 00:26:54,500 --> 00:26:57,730 Let me increase it just a little bit for you. 292 00:26:59,120 --> 00:27:03,780 As you can see that the ASCII code is divided into two. 293 00:27:03,980 --> 00:27:13,480 Let me copy all the stuff in and pass it into an open text so that we can see just copy likely and choose 294 00:27:14,090 --> 00:27:16,690 copy and copy the clipboard, for example. 295 00:27:16,700 --> 00:27:17,690 This is one. 296 00:27:18,110 --> 00:27:20,740 And then come back here so we can put it here. 297 00:27:22,870 --> 00:27:31,080 OK, OK, so this court is divided into two bit, this one, this one, this one, this one. 298 00:27:31,360 --> 00:27:33,100 This one is one. 299 00:27:33,670 --> 00:27:34,120 All right. 300 00:27:34,300 --> 00:27:37,630 And then we're going to do the same thing for here, so. 301 00:27:43,060 --> 00:27:48,340 All right, so the first caller there is much that's good. 302 00:27:48,520 --> 00:27:58,900 That means we can pretty say that the car which have to be enjoyed and the application here when we 303 00:27:58,900 --> 00:28:02,190 come here should start with S.. 304 00:28:02,790 --> 00:28:04,710 That's that's what we just think. 305 00:28:04,720 --> 00:28:05,500 So we don't know. 306 00:28:06,410 --> 00:28:09,560 Okay, so let's try something different. 307 00:28:10,120 --> 00:28:15,310 Let's we want the application and come back here. 308 00:28:15,880 --> 00:28:20,470 Let me put it back to the way it was. 309 00:28:21,730 --> 00:28:22,450 All right. 310 00:28:22,480 --> 00:28:23,020 All right. 311 00:28:24,580 --> 00:28:30,030 So we come back here and then we back and then we come back here. 312 00:28:30,430 --> 00:28:39,250 So again, if we can win it, but which we have to see the tax first. 313 00:28:41,860 --> 00:28:47,670 OK, so Nadex is here so far, let me come back here again. 314 00:28:51,330 --> 00:29:03,320 So let's take now test, for example, test, and we click on Go the password, is this OK? 315 00:29:03,600 --> 00:29:05,600 So OK then let's come back here. 316 00:29:05,610 --> 00:29:10,140 We click here and a new ASCII code is coming up. 317 00:29:10,500 --> 00:29:13,110 And then now it get changed. 318 00:29:13,650 --> 00:29:18,120 That means we see that it's seventy six. 319 00:29:18,310 --> 00:29:19,130 Sixty seven. 320 00:29:19,170 --> 00:29:27,200 So let's copy the both of them again and we could be gone. 321 00:29:27,940 --> 00:29:31,660 OK, or we can just scandalising. 322 00:29:33,420 --> 00:29:39,680 It's not a problem I can then come back here again so we could be in past here. 323 00:29:40,170 --> 00:29:43,800 So let's check those first things. 324 00:29:45,780 --> 00:29:52,340 OK, so everything will be still the same now, OK? 325 00:29:52,530 --> 00:29:55,260 Something we can see do fall. 326 00:29:56,190 --> 00:30:01,290 The first leader was for what we thought it was for. 327 00:30:01,290 --> 00:30:02,030 Save me. 328 00:30:02,550 --> 00:30:09,120 Let me put it here a little bit and I can acknowledge it. 329 00:30:09,550 --> 00:30:10,140 All right. 330 00:30:10,860 --> 00:30:17,050 This one was for tax, for save me, for save me. 331 00:30:17,190 --> 00:30:25,230 And then this one full test, though, for what can we see? 332 00:30:25,380 --> 00:30:34,280 What we can see is that obviously the first leader will will stand by is and then the second leader 333 00:30:34,320 --> 00:30:39,470 will be, you see, therefore we can put S. 334 00:30:39,480 --> 00:30:45,630 S C will be two leaders which will be started get. 335 00:30:51,210 --> 00:31:01,790 OK, so let's come back here again and try to work on the application so that we can see what next. 336 00:31:02,370 --> 00:31:03,000 Yes. 337 00:31:04,550 --> 00:31:05,240 We won. 338 00:31:07,590 --> 00:31:11,320 OK, and before we click again, so we're going to come back here. 339 00:31:12,390 --> 00:31:15,050 Let me just come quickly. 340 00:31:17,790 --> 00:31:18,430 And it takes. 341 00:31:21,710 --> 00:31:23,070 OK, so we are here. 342 00:31:23,840 --> 00:31:24,290 Excellent. 343 00:31:24,890 --> 00:31:29,510 Now let's come back here again and vote on the application. 344 00:31:30,820 --> 00:31:37,540 So we will see now we we have seen that two leaders already. 345 00:31:37,870 --> 00:31:41,020 So now let's try to type this one. 346 00:31:42,680 --> 00:31:48,560 And we can go back to D.C., so let's come back here. 347 00:31:52,120 --> 00:31:54,550 So as you can see. 348 00:31:56,200 --> 00:32:01,200 The password is the code is 60. 349 00:32:02,310 --> 00:32:05,140 Thirty two, as you as usual, of course, FBI. 350 00:32:05,400 --> 00:32:13,290 The difference is between FBI and if nine is so close, so we're going to copy it again and try to pass 351 00:32:13,290 --> 00:32:13,770 it on. 352 00:32:13,940 --> 00:32:18,840 But controversy and come back here. 353 00:32:20,780 --> 00:32:22,310 And try to do the same process. 354 00:32:24,310 --> 00:32:24,670 Control. 355 00:32:25,540 --> 00:32:29,390 So we still get it here in space. 356 00:32:29,740 --> 00:32:32,230 We do the same thing and now we need. 357 00:32:33,770 --> 00:32:46,070 This one and this one now we're going to try to to see what what leader or what what is the thing which 358 00:32:46,070 --> 00:33:01,040 is very close to F nine or FBI F F nine, fasb FC F F F f e so f f so but we we have only F nine and 359 00:33:01,040 --> 00:33:01,570 FBI. 360 00:33:01,940 --> 00:33:09,470 Therefore we're going to try to win the application and put a little B to see what kind of things which 361 00:33:09,470 --> 00:33:09,900 are there. 362 00:33:09,920 --> 00:33:12,240 So come back here. 363 00:33:12,420 --> 00:33:20,770 Yes, it was time and again and again to come back here as usual. 364 00:33:20,780 --> 00:33:25,130 So the takes OK, so we win the application. 365 00:33:26,720 --> 00:33:35,840 And try to type this one, be OK and we can go on person is same. 366 00:33:37,040 --> 00:33:38,360 And we come back here again. 367 00:33:40,340 --> 00:33:44,180 OK, now let's go to this second. 368 00:33:47,500 --> 00:33:50,920 And controversy is in process. 369 00:33:54,790 --> 00:33:56,570 And come back here. 370 00:33:57,210 --> 00:34:10,900 So, as you can see that let let me press it here and OK, so if nine was what we don't know, that's 371 00:34:10,900 --> 00:34:11,970 what we are looking for. 372 00:34:12,860 --> 00:34:16,010 FBI is let me check in. 373 00:34:16,090 --> 00:34:20,470 This is for four days a. 374 00:34:22,390 --> 00:34:38,560 It is a yeah, this is it, and then this one is for Sabr and the OK, it was FBI and now what we can 375 00:34:38,560 --> 00:34:50,650 see that B is if aid work helps, B is if aid B is if aid in this matter. 376 00:34:51,070 --> 00:35:03,850 So the algorithm that that is written in the program convert or B to give aid and or as to if B therefore 377 00:35:03,850 --> 00:35:05,710 F nine must be closer. 378 00:35:05,860 --> 00:35:06,730 You see what I'm saying? 379 00:35:06,940 --> 00:35:08,390 If I must be closer. 380 00:35:08,410 --> 00:35:17,500 So let's try C or D, it shouldn't be like M, it shouldn't be that far because if aid is very close 381 00:35:17,500 --> 00:35:22,440 to F F nine, NSB is very close to its name. 382 00:35:22,840 --> 00:35:34,960 So to get from F nine you get to five to if nine is if A and B, so it is for A and B is if aid that 383 00:35:34,960 --> 00:35:38,340 means C might be F nine. 384 00:35:38,620 --> 00:35:39,210 We don't know. 385 00:35:39,220 --> 00:35:40,690 So let's try to check it out. 386 00:35:41,470 --> 00:35:42,310 Come back here again. 387 00:35:43,700 --> 00:35:47,100 And still, the application of. 388 00:35:51,540 --> 00:35:53,770 Going back first, yes. 389 00:35:54,900 --> 00:35:55,470 OK. 390 00:35:55,530 --> 00:36:02,710 And try to win it again, it's the same process, guys tell you which they will password. 391 00:36:02,970 --> 00:36:17,130 So let me stop you again and let me go here to Wendy, the obligational and let's type now seek and 392 00:36:17,130 --> 00:36:17,850 we can go. 393 00:36:17,850 --> 00:36:20,210 And the password is sick, OK? 394 00:36:22,710 --> 00:36:30,240 UPS, it tries, so probably we will get to things, but we will see that little stick. 395 00:36:31,360 --> 00:36:31,770 Yeah. 396 00:36:32,000 --> 00:36:34,020 And so let's let's we do it again. 397 00:36:34,740 --> 00:36:45,560 It's we do it to try to do and that's on it so that you get there to the entry point. 398 00:36:46,650 --> 00:36:47,300 Now stop. 399 00:36:47,940 --> 00:36:54,720 So, OK, we can only establish now and type six. 400 00:36:59,010 --> 00:37:02,780 All right, so no problem with that. 401 00:37:03,620 --> 00:37:13,220 OK, let's go with this tax shift and controversy and come back here again and grab a seat here. 402 00:37:13,910 --> 00:37:20,860 So contrary to let us come here, because this is where we needed to be. 403 00:37:21,230 --> 00:37:27,920 We see that means now we get if nine, we get five nine guys. 404 00:37:27,920 --> 00:37:29,780 You're going to put it like this. 405 00:37:30,140 --> 00:37:39,560 Therefore, since we already get that, A is something and B is something that is of eight and A three, 406 00:37:40,010 --> 00:37:50,570 and now we reach out that if nine is C, so let's dive it if nine four F nine for this one. 407 00:37:50,810 --> 00:37:56,000 OK, you're going to go to the same process again and again and so OK. 408 00:39:04,680 --> 00:39:05,520 For the. 409 00:39:18,770 --> 00:39:25,610 As you can see, that we don't need to choose A, B, C again, because we have already know that they 410 00:39:25,610 --> 00:39:31,480 are they are SBF eight in F, nine because we don't need any more. 411 00:39:31,490 --> 00:39:32,530 So we need to see it. 412 00:39:32,720 --> 00:39:37,280 So that's why we we don't check them. 413 00:39:37,290 --> 00:39:41,260 We don't take them because we have only no deferrals. 414 00:39:42,050 --> 00:39:43,970 OK, so we dig deep now. 415 00:39:45,240 --> 00:39:54,120 We got this video here, guys, because it has to do much Jacobite, so in the following video will 416 00:39:54,120 --> 00:39:55,040 be the continuity. 417 00:39:55,290 --> 00:39:56,580 OK, so we'll see what their.