1 00:00:00,530 --> 00:00:08,540 Hello, welcome back to the lecture discourse in this lesson, we are going to see how to create a platform 2 00:00:08,540 --> 00:00:13,790 where we can listen to the incoming connection from the back and the last video. 3 00:00:13,790 --> 00:00:18,330 We have created an undetectable battle using the villages in Sudan. 4 00:00:18,360 --> 00:00:23,300 This lesson, we are going to see how to listen to the coming connection from the battlefield. 5 00:00:23,570 --> 00:00:25,430 So, first of all, we need to understand. 6 00:00:26,500 --> 00:00:31,120 How we're going to vote, so whenever you send suppose this is the. 7 00:00:34,200 --> 00:00:38,050 This is the attack machine and this is the target. 8 00:00:38,550 --> 00:00:47,820 OK, so now we send a back door to it and whenever Baghat is delivered to this particular target machine, 9 00:00:48,420 --> 00:00:56,880 the user that is in the user and we double click on this, so automatically it will start connecting 10 00:00:56,880 --> 00:01:01,960 with us, it automatically starts sending incoming connection to us. 11 00:01:01,980 --> 00:01:10,260 So it is very important for us to create a platform where we can listen what the incoming connection 12 00:01:10,410 --> 00:01:12,280 coming from this particular end. 13 00:01:12,780 --> 00:01:19,380 So and this we do we are going to set the platform for a backdoor so that we can easily communicate 14 00:01:19,380 --> 00:01:21,940 with our backbone without having any trouble. 15 00:01:22,650 --> 00:01:24,270 So let's start with. 16 00:01:24,700 --> 00:01:26,720 So we are going to use massive console. 17 00:01:26,730 --> 00:01:30,770 It is a very useful framework that is made for the penetration business. 18 00:01:30,990 --> 00:01:36,000 So for opening this particular female, you just need to type a massive console. 19 00:01:36,000 --> 00:01:45,800 It is stolen Galileans so that you can easily get into it and hitting enter software, hitting enter. 20 00:01:45,860 --> 00:01:49,050 It will take some time because it is a huge Fambul. 21 00:01:49,800 --> 00:01:57,900 It will take some time and we are going to use multi handler so that we can easily communicate with 22 00:01:57,900 --> 00:01:58,880 our backdoor. 23 00:01:59,400 --> 00:02:00,510 So it will take some time. 24 00:02:00,510 --> 00:02:03,930 As you can see, it is starting to make this black female console. 25 00:02:05,540 --> 00:02:09,490 Multichannel is a module that is inside the MSF soul. 26 00:02:10,030 --> 00:02:16,170 So now here we can use some commands so that we will get inside the multicenter. 27 00:02:16,430 --> 00:02:22,010 So for opening night, the handler, you need to type here before using multiengine, as you can see 28 00:02:22,130 --> 00:02:22,490 this. 29 00:02:22,700 --> 00:02:27,320 It contains inside it two thousand four hundred forty nine sprites. 30 00:02:27,840 --> 00:02:30,430 These are the auxiliaries and these are the ports. 31 00:02:30,740 --> 00:02:32,600 So as you can see here, this is. 32 00:02:35,360 --> 00:02:38,070 Now, I did something wrong here. 33 00:02:38,330 --> 00:02:41,060 So what I'm going to do is I'm going to. 34 00:02:42,750 --> 00:02:43,630 Start from here. 35 00:02:43,650 --> 00:02:55,110 Soak it for using mulch, you can type in shoes and exploit this as the bottom multi handle and handle 36 00:02:55,110 --> 00:02:56,120 and utensil. 37 00:02:57,150 --> 00:03:02,770 So as you can see that it is suing me using configured payload DCPI. 38 00:03:02,820 --> 00:03:08,850 OK, so you can see the malware inside the monthly handler payload inside the module. 39 00:03:09,060 --> 00:03:12,130 OK, so now we're using mightly handle. 40 00:03:12,150 --> 00:03:15,750 You need to type here so often and Pitango. 41 00:03:17,100 --> 00:03:26,820 OK, so officers and as we can see here, we have module options, we have elbowed almost each and everything 42 00:03:26,820 --> 00:03:27,070 here. 43 00:03:27,450 --> 00:03:33,180 So as you have remembered, that the name of our exploit was different from this. 44 00:03:33,190 --> 00:03:36,140 So firstly, we need to change the name of our exploit. 45 00:03:36,150 --> 00:03:39,540 So for that, we need to do the same as well. 46 00:03:39,840 --> 00:03:43,380 And so now typeset and. 47 00:03:44,650 --> 00:03:45,700 Select payload. 48 00:03:46,240 --> 00:03:50,980 Now I'm going to name them nimbler payload windows. 49 00:03:52,790 --> 00:03:53,750 Make topical. 50 00:03:57,560 --> 00:03:58,370 Frivolous. 51 00:04:00,270 --> 00:04:05,730 As to DHBs, there's nothing new about this because this was the name of a payload. 52 00:04:05,760 --> 00:04:15,030 So as you can see that it is using DCPI, but our payload was using board number four four three, which 53 00:04:15,030 --> 00:04:16,320 was a SBP. 54 00:04:16,350 --> 00:04:20,750 So this is all and now it's time to attend to. 55 00:04:20,790 --> 00:04:24,060 As you can see here, our payload has changed. 56 00:04:24,120 --> 00:04:24,920 Now, let's see. 57 00:04:24,950 --> 00:04:26,220 It has changed or not. 58 00:04:29,820 --> 00:04:31,950 So now our payload name is here. 59 00:04:32,100 --> 00:04:38,400 OK, so now it's time to set the elbows and elbows so elbows is nothing but our IP address. 60 00:04:38,410 --> 00:04:49,030 So for the IP address, we need to we need to get into another cell and here we need to type if confirmed. 61 00:04:49,830 --> 00:04:52,490 And as you can see, this is my IP address. 62 00:04:52,500 --> 00:04:55,820 You can see in your system by using this particular command. 63 00:04:56,100 --> 00:04:58,060 So 10 zero two zero six. 64 00:04:58,110 --> 00:04:59,400 This is my IP address. 65 00:04:59,640 --> 00:05:06,210 So I'm going to set my IP address and host my assistance zero two zero six. 66 00:05:06,210 --> 00:05:09,150 And now it's time to set Alpert's. 67 00:05:09,180 --> 00:05:13,620 So as you have remembered that the code that we have used is 80. 68 00:05:14,370 --> 00:05:22,380 So now set and code eighty eight and hit enter now let's see. 69 00:05:24,680 --> 00:05:33,020 Our options, so as you can see that this is the name of our payload, this is our IP address, which 70 00:05:33,020 --> 00:05:35,400 is Alehouse, and this is our elbow. 71 00:05:35,930 --> 00:05:37,310 So now we all. 72 00:05:38,980 --> 00:05:47,200 Now, the all the basic necessary things we take so much time to hype and exploit so that we can exploit 73 00:05:47,440 --> 00:05:48,190 our people. 74 00:05:48,760 --> 00:05:56,770 So as you can see here, that it will take some time and it will start listening to other payloads. 75 00:05:56,800 --> 00:06:03,200 As you can see, that it started as a reverse handler on a suit is this particular IP address. 76 00:06:03,210 --> 00:06:13,090 So whenever let's suppose whenever our payload get into the target machine, when Double-Click on this, 77 00:06:13,600 --> 00:06:21,220 it will ultimately send the incoming coalition to us and alter Double-Click, this particular connection 78 00:06:21,220 --> 00:06:25,390 will be lessened by this particular Michael Handler. 79 00:06:26,200 --> 00:06:27,480 So this is how it works. 80 00:06:27,790 --> 00:06:35,200 So now we are listening to the incoming connection from the back side, but it is needed to send a backdoor 81 00:06:35,200 --> 00:06:36,410 into the target machine. 82 00:06:36,700 --> 00:06:41,140 So what we will be going to do is suppose this is the target machine. 83 00:06:42,230 --> 00:06:48,670 This is our Galilea Next Muzzin, and this is our payloads of what we will be doing is Galilea next 84 00:06:48,740 --> 00:06:49,460 comes with. 85 00:06:50,660 --> 00:06:53,930 And so Asaba, which is Apache. 86 00:06:54,410 --> 00:07:01,880 So what we will do, we will applaud this particular Baddoo what Apache server and send a link or the 87 00:07:01,880 --> 00:07:09,620 IP address to the target machine so that whenever target machine will reach to this particular IP address, 88 00:07:09,620 --> 00:07:11,060 it will download it. 89 00:07:11,060 --> 00:07:14,870 Then after downloading it, it will inside the target machine. 90 00:07:14,870 --> 00:07:21,080 And whenever a user will double click it or open it, it will start connecting with us. 91 00:07:21,110 --> 00:07:27,110 So this is how we are going to do is so we are going to upload this particular file in our next server 92 00:07:27,110 --> 00:07:29,630 and we will be sending actually in this. 93 00:07:29,630 --> 00:07:29,900 We do. 94 00:07:29,900 --> 00:07:37,670 I'm going to do each and everything with my own because this is the basic this is the basic way with 95 00:07:37,670 --> 00:07:42,060 the help that we can send a file back to the target machine. 96 00:07:42,260 --> 00:07:45,120 So this is for the tutorial tutorial seasons. 97 00:07:45,140 --> 00:07:50,080 So now what we will do is it is listening to all of us in our battle. 98 00:07:50,420 --> 00:07:52,880 So get inside the. 99 00:07:53,880 --> 00:07:59,200 What we will do is we will applaud that particular back in Dover, appoggiatura. 100 00:07:59,520 --> 00:08:03,870 OK, so for that, you need to get inside the system, open the voir dire three. 101 00:08:05,100 --> 00:08:12,090 W w w s people here can see two this in your case and in my case also. 102 00:08:12,570 --> 00:08:16,560 So now what I'm going to do is I'm going to get into the part of my. 103 00:08:17,790 --> 00:08:21,540 Back to so I'm inside the verdict now. 104 00:08:21,780 --> 00:08:23,880 I will never get to a library. 105 00:08:25,120 --> 00:08:25,810 Vayle. 106 00:08:27,460 --> 00:08:31,580 Output compiled, and this is my payload. 107 00:08:31,960 --> 00:08:38,640 So what I'm going to do is I'm going to create a folder named as Danger and Tender. 108 00:08:39,040 --> 00:08:40,090 So this is my fault. 109 00:08:40,100 --> 00:08:43,540 I'm going to save this particular payload inside my. 110 00:08:45,850 --> 00:08:49,130 Danger folder so that I can navigate through it very easily. 111 00:08:49,450 --> 00:08:52,250 So now my payload is inside the danger. 112 00:08:52,420 --> 00:08:59,500 So what I'm going to do is I'm going to start my aperture server so far that I need to open a new window 113 00:08:59,800 --> 00:09:00,090 here. 114 00:09:00,100 --> 00:09:00,970 I'm going to. 115 00:09:02,090 --> 00:09:03,290 Type service. 116 00:09:05,040 --> 00:09:06,930 Apache to. 117 00:09:09,250 --> 00:09:16,210 So after hitting enter, as you can see that it is not doing any kind of weather, that means it is 118 00:09:16,210 --> 00:09:17,650 successfully loaded. 119 00:09:18,080 --> 00:09:21,010 Now we are inside our windows and machine. 120 00:09:21,430 --> 00:09:23,770 So these two machines are connected with the not. 121 00:09:24,250 --> 00:09:27,910 So I'm going to enter my IP address and it is working or not. 122 00:09:27,940 --> 00:09:29,500 So 10 zero. 123 00:09:30,540 --> 00:09:33,000 Two zero two six and. 124 00:09:34,960 --> 00:09:43,430 Point six and four less, and so now it will start loading this particular IP address. 125 00:09:43,930 --> 00:09:45,970 So this is IP address of a website. 126 00:09:46,000 --> 00:09:49,900 So as we can see this, it is perfectly working. 127 00:09:50,350 --> 00:09:56,100 So what we will do is we will get into the part of our payload. 128 00:09:56,230 --> 00:10:01,220 So we have installed our payload in the filename danger. 129 00:10:01,350 --> 00:10:07,150 Now, as you can see that we are inside our danger folder and we have this. 130 00:10:08,220 --> 00:10:12,030 Batdorf So I'm going to click on this end and I'm going to. 131 00:10:13,270 --> 00:10:15,220 Save it now, let's see. 132 00:10:16,390 --> 00:10:18,410 Now let's click on Run. 133 00:10:18,640 --> 00:10:25,270 So now, after clicking on that particular file, as we as we are getting back to our Carlene's machine, 134 00:10:25,270 --> 00:10:27,160 so let's see what is working on Nazo. 135 00:10:29,440 --> 00:10:33,970 We are inside of a car, as you can see, that it is started listening to our payload. 136 00:10:34,300 --> 00:10:36,840 Now let's see, is it working or not? 137 00:10:36,840 --> 00:10:41,560 So I'm going to give a very simple command that has this info. 138 00:10:41,710 --> 00:10:46,070 And so, as you can see, that it is working very perfectly. 139 00:10:46,390 --> 00:10:52,210 So the computer, Mneimneh, is this operating system that I'm using is Windows and architecture is 140 00:10:52,210 --> 00:10:52,940 64. 141 00:10:53,230 --> 00:10:54,260 This is the language. 142 00:10:54,280 --> 00:10:57,610 This is the domain that we just logged in. 143 00:10:57,610 --> 00:11:00,850 So this is how you can get inside this particular. 144 00:11:02,740 --> 00:11:05,210 This is how you can just listen to Will Back-Door.