1 00:00:00,300 --> 00:00:01,410 Welcome back, everyone. 2 00:00:01,800 --> 00:00:10,100 As of now, we have learned about one of the defining of the weaknesses to end maps, are we? 3 00:00:10,110 --> 00:00:19,350 We do have other scanning mechanism as well, including open bars, even with where we have tried all 4 00:00:19,350 --> 00:00:20,750 of those stuff earlier. 5 00:00:21,090 --> 00:00:21,480 Right. 6 00:00:22,110 --> 00:00:29,490 This is very interesting and widely adopted tool and very, very powerful tool as well. 7 00:00:29,970 --> 00:00:31,620 This was earlier open. 8 00:00:31,620 --> 00:00:34,560 So it's still, you know, freely available. 9 00:00:35,160 --> 00:00:42,350 This is currently acquired by this is already being acquired, in fact, by Rapide seven. 10 00:00:42,780 --> 00:00:46,680 And this is built on droopy language itself. 11 00:00:47,550 --> 00:00:54,050 OK, so now let's let's dig deep into it and let's understand why it is not just a tool. 12 00:00:54,060 --> 00:00:55,240 Why this framework? 13 00:00:55,560 --> 00:01:00,420 The reason is there are a whole lot of stuff that is connected with it. 14 00:01:00,450 --> 00:01:02,190 There are a whole lot of modules. 15 00:01:02,520 --> 00:01:09,110 There are a whole lot of features and it provides several integrations of rest of the tools. 16 00:01:09,540 --> 00:01:18,200 And that's why it does it does not really it's not really sufficient to call it as a tool. 17 00:01:18,420 --> 00:01:25,420 That's why it becomes a framework where you have granularity of doing a whole lot of stuff by your own 18 00:01:25,420 --> 00:01:25,680 way. 19 00:01:26,110 --> 00:01:34,230 OK, so when we talk about the framework, it is it is it is very clear that it is a penetration tool 20 00:01:34,230 --> 00:01:43,770 and penetration tool is basically making is basically exploit the weaknesses, exploit the vulnerabilities 21 00:01:43,770 --> 00:01:52,620 that you have in the network and the and the importance of or the the the penetration tools come to 22 00:01:52,700 --> 00:01:57,360 the picture once you have vulnerabilities which has been discovered. 23 00:01:57,720 --> 00:02:02,590 And that's why it is important to understand a bit deep into how it really works. 24 00:02:03,120 --> 00:02:09,420 So when it comes to Demitasse Point, it is open source penetration, penetration testing framework 25 00:02:09,630 --> 00:02:12,930 that we already know about and many more. 26 00:02:12,930 --> 00:02:15,370 A lot of organizations are making use of it. 27 00:02:15,720 --> 00:02:21,900 There are many, you know, useful stuff that it provides free. 28 00:02:22,050 --> 00:02:29,960 And we do have the provision as well, which is the commercial, you know, commercial options available. 29 00:02:30,690 --> 00:02:32,580 Now, this provides a modular design. 30 00:02:32,580 --> 00:02:40,310 That's why I call it a framework, because this has a lot of granularity where you get integrate and 31 00:02:40,850 --> 00:02:46,740 you can have a lot of options where you can plug and play a lot of other stuff as well. 32 00:02:47,190 --> 00:02:48,650 I will cover that. 33 00:02:48,660 --> 00:02:56,200 Covered that in the later sections where it is built on the limbic center that is available on the colleague 34 00:02:56,610 --> 00:03:03,070 already and there are more than seventeen hundred exploits available. 35 00:03:03,480 --> 00:03:05,850 Now this brings us to a new question. 36 00:03:05,850 --> 00:03:13,380 What exactly is most of us might be already aware, but just to give a recap, let's let's understand 37 00:03:13,380 --> 00:03:19,830 what exactly these all fundamentals really looks like when it comes to the cyber security or ethical 38 00:03:19,830 --> 00:03:20,300 hacking. 39 00:03:21,360 --> 00:03:27,420 Oh, I'm not really talking about any wars or something, but let's understand what exactly happening. 40 00:03:27,730 --> 00:03:30,850 We have a target somewhere over here. 41 00:03:30,890 --> 00:03:35,190 OK, we have a target that is looks like this. 42 00:03:35,280 --> 00:03:37,580 And just give me one second. 43 00:03:37,660 --> 00:03:37,980 Yeah. 44 00:03:38,370 --> 00:03:39,990 So we have a target over here. 45 00:03:40,260 --> 00:03:47,520 And the first thing that we do is even though we have a target, what we do is we try to find out do 46 00:03:47,520 --> 00:03:50,110 we have any weakness for this target? 47 00:03:50,430 --> 00:03:57,630 I mean, if you talk about the real world, you you consider any war, you consider any target as well. 48 00:03:57,930 --> 00:04:07,500 Whenever the war happens, the one country or the one one or the opponent or anybody, try to find out 49 00:04:07,500 --> 00:04:14,910 a place where if we attack, there would be more significant impact to the target. 50 00:04:15,210 --> 00:04:15,550 Right. 51 00:04:15,870 --> 00:04:21,540 And that's why it is it is important to target at the right time, at the right place, but the right 52 00:04:21,540 --> 00:04:21,960 method. 53 00:04:22,470 --> 00:04:22,850 Right. 54 00:04:23,100 --> 00:04:30,040 So sometimes it is it makes sense to attack in the nighttime or sometimes it does. 55 00:04:30,060 --> 00:04:33,330 We know that satellite won't be really capturing those places. 56 00:04:33,570 --> 00:04:38,210 So even if we attack, there won't be any detection mechanism. 57 00:04:38,220 --> 00:04:38,510 Right. 58 00:04:38,540 --> 00:04:40,980 So this happened in the in the real war. 59 00:04:41,010 --> 00:04:44,700 Let's talk about in the in the article hacking as well. 60 00:04:44,940 --> 00:04:54,570 And the ethical hacking to be before we jump in and target, we we try to launch any kind of malware 61 00:04:54,570 --> 00:04:57,450 or, you know, scan or any sort of stuff. 62 00:04:57,720 --> 00:04:59,100 It is important to understand. 63 00:04:59,100 --> 00:04:59,790 Do we have an. 64 00:05:00,260 --> 00:05:06,500 As for the target, and that's the first thing that that's what we have been doing with our vulnerability 65 00:05:06,500 --> 00:05:15,920 scanners, now, once we have identified the vulnerabilities, once we have identified the vulnerabilities 66 00:05:15,920 --> 00:05:24,950 of the target of the target, now we can launch our we can launch our attack. 67 00:05:24,950 --> 00:05:30,570 But our penetration tool, testing tool, which is our greatest point. 68 00:05:31,190 --> 00:05:31,940 All right. 69 00:05:32,270 --> 00:05:38,480 Which is our method, spoke to made us proud framework and understand this. 70 00:05:38,480 --> 00:05:44,720 If this is our attack, OK, this rocket and this is a missile. 71 00:05:44,750 --> 00:05:45,020 Right. 72 00:05:45,350 --> 00:05:52,400 So in the missile, you know, this there there's one part which is very limited, but which is being 73 00:05:52,730 --> 00:05:57,460 that's where the actual detonation of whatever the payload exists. 74 00:05:57,470 --> 00:06:01,310 That is where the actual payload really exists. 75 00:06:01,410 --> 00:06:12,650 You know, this will really impact the entire impact that would be responsible for any nuclear or atomic 76 00:06:12,650 --> 00:06:16,000 attack or actually secret ingredient recital there. 77 00:06:16,700 --> 00:06:23,840 But the rest of the stuff is important for taking it to the target, and that's what we call it as exploit. 78 00:06:24,180 --> 00:06:32,510 So understand if it is, you know, in terms of real world, you have a ballistic missile, intercontinental 79 00:06:32,510 --> 00:06:38,630 and all the stuff, you know, which is responsible to take it to the another continent or maybe within 80 00:06:38,630 --> 00:06:43,250 the continent or short range missile, long range missile, all the stuff. 81 00:06:43,250 --> 00:06:43,470 Right. 82 00:06:43,520 --> 00:06:53,900 This is the way exploiters responsible for an exploit is useful to understand what kind of what kind 83 00:06:53,900 --> 00:06:59,130 of, you know, method we can take it to reach to the target. 84 00:06:59,390 --> 00:07:02,440 And this all depends even with the vulnerability as well. 85 00:07:02,780 --> 00:07:10,370 So when it comes to the ethical hacking, we can possibly use the multi handler scan single stage or, 86 00:07:10,370 --> 00:07:18,130 you know, multi-stage exploit as well, exploit for windows, exploit for multiple of the softwares 87 00:07:18,140 --> 00:07:18,860 and anything. 88 00:07:19,100 --> 00:07:26,030 But the payload is something which is your malware, you know, but this is where your actual code may 89 00:07:26,030 --> 00:07:35,360 be called on the Bauer show code, with the Python code, with any anything C, C++ or anything that 90 00:07:35,360 --> 00:07:37,000 really sits there. 91 00:07:37,340 --> 00:07:44,690 This is what really be responsible for executing the malicious action on the system or launching or 92 00:07:44,690 --> 00:07:50,120 establish the connection with your with your command and control center. 93 00:07:50,820 --> 00:07:53,700 OK, and this is what we have discussed as well. 94 00:07:53,720 --> 00:07:59,900 So vulnerability in terms of ethical hacking, this is the weakness that allows the attacker to break 95 00:07:59,900 --> 00:08:02,600 into the system itself. 96 00:08:02,900 --> 00:08:06,400 And this weakness can exist in any any stuff. 97 00:08:06,410 --> 00:08:14,510 You know, it can exist as we know it could exist into the time machine, you know, mobile devices, 98 00:08:14,750 --> 00:08:21,830 web applications, network devices, protocol certificates, anything, digital certificate. 99 00:08:21,830 --> 00:08:25,140 I mean, so this could be this could exist on anything. 100 00:08:25,150 --> 00:08:25,450 Right. 101 00:08:26,150 --> 00:08:34,580 And when we talk about the payload, payload is the actual code which which works, which is the which 102 00:08:34,580 --> 00:08:41,690 is the malicious code that runs on the system and establish the connections with our command and control 103 00:08:41,690 --> 00:08:42,170 center. 104 00:08:43,370 --> 00:08:44,870 It runs on the system. 105 00:08:44,870 --> 00:08:51,260 Once the exploitation is complete, that means once the it reaches to the system and it mostly used 106 00:08:51,260 --> 00:08:55,670 to set up the as we have discussed is to set up the connection itself. 107 00:08:56,090 --> 00:08:56,600 Right. 108 00:08:57,050 --> 00:09:00,830 Is to set up the connection with our target system and that it's our choice. 109 00:09:00,830 --> 00:09:02,980 What action we want to take it on the system. 110 00:09:02,990 --> 00:09:03,320 Right. 111 00:09:03,740 --> 00:09:09,800 And when we talk about the matter split and in a practical way, we have if I'm not wrong, we have 112 00:09:09,800 --> 00:09:18,350 more than 700 or I'm not sure, maybe 500 plus payload at this moment is increasing in a way, but that's 113 00:09:18,350 --> 00:09:20,350 the one come exploit. 114 00:09:20,360 --> 00:09:27,950 So we understand already the exploit is the, again, a piece of code anyway, which is which is helpful 115 00:09:27,950 --> 00:09:35,660 to helpful to take the payload to the target, which allows the attacker to take the advantage of the 116 00:09:35,660 --> 00:09:42,830 vulnerability, one little bit system and compromised security in a variety of way and methods. 117 00:09:42,830 --> 00:09:48,470 Plus it has more than I think around six hundred plus exploit that is being available. 118 00:09:48,970 --> 00:09:49,360 All right. 119 00:09:49,580 --> 00:09:55,310 So I hope you got the idea from all this stuff, because this is something which will which we will 120 00:09:55,310 --> 00:09:58,820 keep using it throughout our journey. 121 00:09:59,860 --> 00:10:07,300 Now, let's understand the architecture of it, so when we look at the architecture, there are multiple, 122 00:10:07,600 --> 00:10:13,960 multiple components and that's the reason why we call it as more modular, because you see it, it's 123 00:10:14,140 --> 00:10:18,100 the most of the components are integrated. 124 00:10:18,100 --> 00:10:19,000 They are modular. 125 00:10:19,010 --> 00:10:22,030 We can have plug and play kind of stuff. 126 00:10:22,030 --> 00:10:26,350 We can use one or the one method or the other method and other stuff. 127 00:10:26,350 --> 00:10:26,560 Right. 128 00:10:26,890 --> 00:10:29,250 So it is built on the ruby. 129 00:10:29,590 --> 00:10:30,820 So that's why we have here. 130 00:10:31,240 --> 00:10:36,340 And that connects to the massive coalminer's point core. 131 00:10:36,370 --> 00:10:39,520 That's the core function which is written on the ruby. 132 00:10:39,730 --> 00:10:43,380 And so let's start from the bottom. 133 00:10:43,690 --> 00:10:51,660 We have modules, modules, something that consists of, you know, all the small pieces of the codes. 134 00:10:51,940 --> 00:10:55,450 So that's where we have our payloads know. 135 00:10:55,840 --> 00:10:57,500 That's what we have discussed earlier. 136 00:10:57,520 --> 00:10:58,810 That's where we have payloads. 137 00:10:58,810 --> 00:10:59,950 We have encoders. 138 00:11:00,220 --> 00:11:07,090 Now, encoders are the one which is responsible for encoding your payload sometime. 139 00:11:07,420 --> 00:11:11,110 You know, maybe you are generating a payload. 140 00:11:11,170 --> 00:11:14,640 You are generating maybe a malicious code for for a black hat. 141 00:11:14,650 --> 00:11:17,920 It could be a malicious code for for ethical hacker. 142 00:11:17,920 --> 00:11:23,920 We might be testing some time and we might be creating a malicious code as well to perform the exploit 143 00:11:23,920 --> 00:11:24,720 on the system. 144 00:11:25,570 --> 00:11:35,620 So in order to perform a kind of an detectable code, we'll have to make use of encoding, harshing 145 00:11:35,620 --> 00:11:38,490 and multiple encryption mechanism as well. 146 00:11:38,860 --> 00:11:42,880 So we do have a module called Auxillary as well. 147 00:11:43,150 --> 00:11:50,920 Auxillary is pretty similar to what we make use as a scanning method or discovery method, which is 148 00:11:50,920 --> 00:11:53,560 pretty much similar to the end map mechanism. 149 00:11:54,250 --> 00:11:55,740 And it's pretty straightforward. 150 00:11:55,750 --> 00:11:58,120 There are no features available as well. 151 00:11:58,120 --> 00:12:03,820 Whenever we we want to make use of the feature of the MSF, we can do that as well. 152 00:12:04,360 --> 00:12:12,610 Now there are multiple plug ins as well that directly talk to the MSF base and then we have interfaces. 153 00:12:12,610 --> 00:12:16,810 Now, interfaces is something through which we connect to the MSF core. 154 00:12:16,810 --> 00:12:23,200 We can connect to the MSF code either through the console and in order to connect to the console. 155 00:12:23,200 --> 00:12:29,680 We just have to go to the and we have to dial the MSF console and we get get this key ally of the MSF. 156 00:12:30,010 --> 00:12:30,910 That's pretty quick. 157 00:12:31,150 --> 00:12:36,000 We can even have the Gwaii access through the Web console as well. 158 00:12:36,190 --> 00:12:37,360 So that's the one way. 159 00:12:37,630 --> 00:12:44,950 And as we have already discussed, what exactly the MSF Congress, which connects all the all these 160 00:12:44,950 --> 00:12:46,020 stuff together. 161 00:12:46,030 --> 00:12:49,840 So that's basically the architecture really looks like. 162 00:12:50,170 --> 00:13:00,500 And let's let's get the idea while when we go into the event, we look look into the MSF estimates, 163 00:13:00,670 --> 00:13:01,900 MSF interfaces. 164 00:13:02,920 --> 00:13:09,880 All right, so let's go to the GARLEY, as we have discussed, in order to get the access to it, we 165 00:13:09,880 --> 00:13:11,830 have to go via the interface. 166 00:13:12,100 --> 00:13:21,490 So we have to method either we get to the console or to the G.I. Bill, majorly be making use of the 167 00:13:21,520 --> 00:13:25,960 console because it's pretty straightforward, very, very pretty flexible, pretty agile. 168 00:13:26,080 --> 00:13:30,160 And in order to get the access will have to type. 169 00:13:30,160 --> 00:13:33,070 So will have to drive MSF console. 170 00:13:34,300 --> 00:13:39,970 And it sometimes takes time to load, but it's pretty quick. 171 00:13:40,270 --> 00:13:43,490 Now let's understand how all the features really looks like. 172 00:13:43,790 --> 00:13:48,510 So I talked about a lot of exploit, lots of payloads. 173 00:13:48,510 --> 00:13:50,200 So you see the current count. 174 00:13:50,470 --> 00:13:53,650 So currently we have two thousand exploits. 175 00:13:54,520 --> 00:13:55,060 All right. 176 00:13:55,060 --> 00:14:00,530 And two thousand seventy one exploit and find ninety two payloads available. 177 00:14:00,850 --> 00:14:05,620 So if you want to get to get to see all those, exploit what you need to do. 178 00:14:05,920 --> 00:14:15,640 You can use a command to explore, use, exploit, do the dart and you can press enter straight away. 179 00:14:15,640 --> 00:14:18,670 You get to see all the exploit that is being available. 180 00:14:19,360 --> 00:14:23,410 OK, so this exploit could be for windows. 181 00:14:23,410 --> 00:14:27,550 This these are all four windows that is being available. 182 00:14:27,700 --> 00:14:31,510 You can you can see that and get the idea about it. 183 00:14:31,510 --> 00:14:39,490 Or if you go Dawber, you even get to see the exploit which is there for multiple other purposes as 184 00:14:39,520 --> 00:14:39,800 well. 185 00:14:40,240 --> 00:14:50,000 So you see for SCDP, we have four FCP for Windows Adande and we do have. 186 00:14:51,520 --> 00:14:51,950 Right. 187 00:14:51,960 --> 00:14:57,860 So we do have exploit for browser based and many other purposes. 188 00:14:57,910 --> 00:15:09,190 Well, in order to see the payloads, we can again do the use payload and hit enter you. 189 00:15:09,190 --> 00:15:10,960 Now you see the payloads. 190 00:15:11,260 --> 00:15:16,690 These are all women, but these are all used to generate payload. 191 00:15:16,690 --> 00:15:18,880 I mean in a way malware. 192 00:15:19,150 --> 00:15:25,840 OK, and you see these these are payload for reverse DCB, reverse SCDP. 193 00:15:26,260 --> 00:15:34,870 These are all methods through which you can have your payloads or your malware to talk to your command 194 00:15:34,870 --> 00:15:41,360 and control center, which we will be working on in the next session, or Moberly, the upcoming session. 195 00:15:42,130 --> 00:15:42,440 Right. 196 00:15:42,490 --> 00:15:46,240 So this is the way we you get to see all the exploit and all the payload. 197 00:15:46,930 --> 00:15:51,180 Let's say you go and make use of any one of the exploit. 198 00:15:51,190 --> 00:15:55,270 So let's say I'm making use of one exploit. 199 00:15:56,750 --> 00:15:57,470 Molly. 200 00:15:59,400 --> 00:16:08,400 And so this is the multi handler, which is which is basically opening a session whenever your malware 201 00:16:08,400 --> 00:16:16,380 reaches to the target and somebody somebody runs that malware, your exploit will be open to start the 202 00:16:16,380 --> 00:16:23,310 sessions, start the session on the on the to run the post exploitation activity. 203 00:16:23,850 --> 00:16:24,230 All right. 204 00:16:24,510 --> 00:16:25,760 So let's hit enter. 205 00:16:26,070 --> 00:16:33,040 Now, once you have selected your exploit, now it's your task to select the payload. 206 00:16:33,390 --> 00:16:37,520 So now you can make use of make use of any payload. 207 00:16:39,060 --> 00:16:40,250 So let's say I. 208 00:16:42,230 --> 00:16:45,470 I make use of a payload, which is. 209 00:16:47,860 --> 00:16:48,730 Windows. 210 00:16:51,260 --> 00:16:52,130 Interpretor. 211 00:16:53,820 --> 00:16:54,570 Murray was. 212 00:16:55,940 --> 00:17:04,590 OK, so Peter is pretty much kind of handler, which will help you to, once you get the access, will 213 00:17:04,590 --> 00:17:07,860 be helpful for all the post exploitation activity. 214 00:17:08,100 --> 00:17:14,430 And it will provide you kind of a persistent connection, even if something goes wrong, even if your 215 00:17:14,430 --> 00:17:21,780 malware, even if the system restart, you'll still be be able to regain the access if it is a meta 216 00:17:21,780 --> 00:17:23,180 Prechter kind of a payload. 217 00:17:23,520 --> 00:17:28,420 So it is pretty much used for a kind of persistance connection for Windows Machine. 218 00:17:29,310 --> 00:17:34,980 So let's say you press on once it is done, you selected the payload, your malware is selected. 219 00:17:35,370 --> 00:17:37,170 Now let's understand what all you need. 220 00:17:37,170 --> 00:17:43,590 If you need to know what all I need to do to this mix makes your job pretty easier. 221 00:17:44,490 --> 00:17:48,290 If you want to know the information about this, you can type info. 222 00:17:48,540 --> 00:17:53,630 This will give you an idea about what other platform it would really support on. 223 00:17:54,090 --> 00:17:58,770 So you get the idea, OK, this provided by what what organization? 224 00:17:58,770 --> 00:18:01,950 And, you know, what are the other information available? 225 00:18:02,130 --> 00:18:06,840 What are the platform and what is the module or what is the architecture? 226 00:18:06,840 --> 00:18:07,970 It will be supported. 227 00:18:08,220 --> 00:18:09,620 Do we need any privileges? 228 00:18:10,110 --> 00:18:10,830 All the stuff. 229 00:18:11,130 --> 00:18:20,430 And now in order to complete your exploit or your weaponization, in a way, what other options do I 230 00:18:20,430 --> 00:18:21,010 need to set? 231 00:18:21,450 --> 00:18:28,200 Let's say you you can't really recall all the commands, although once you start working into it, it 232 00:18:28,200 --> 00:18:30,960 would be all on your fingertips or so. 233 00:18:30,960 --> 00:18:34,100 But in the beginning you might find a bit difficult. 234 00:18:34,110 --> 00:18:36,600 So for that you can make use of options. 235 00:18:37,020 --> 00:18:40,430 So this will help you to understand what all parameters you need to set. 236 00:18:40,920 --> 00:18:45,690 So you see this, you need to set this mandatory information. 237 00:18:45,690 --> 00:18:49,320 You need to have your localhost look at borders. 238 00:18:50,430 --> 00:18:56,100 So this is something which is really a must in order to set the target itself. 239 00:18:56,730 --> 00:19:04,800 So once you define that, then only you would be able to set the target and you will be able to launch 240 00:19:05,730 --> 00:19:07,790 you will be able to launch the target to. 241 00:19:10,630 --> 00:19:19,510 OK, so what happens is basically you haven't really created your payload in a way, you you basically 242 00:19:20,020 --> 00:19:25,750 calling up the payload in order to create the payload, you might have to make use of massive venom, 243 00:19:26,080 --> 00:19:29,700 which will be helpful to create the payload. 244 00:19:29,980 --> 00:19:36,460 But this is what we are discussing, as is all about setting up the local host, setting up the remote 245 00:19:36,460 --> 00:19:42,940 host and all those parameters to initiate or to perform the exploit to the remote target. 246 00:19:43,750 --> 00:19:47,650 OK, so let's talk about it. 247 00:19:47,650 --> 00:19:54,770 We can have a host to be defined so we can have a virtual host as our own system itself. 248 00:19:55,210 --> 00:19:58,880 So this is already being set up, so we don't really need it. 249 00:19:59,050 --> 00:20:04,840 So if we want to define the remote host, you can define the remote IP address itself. 250 00:20:05,170 --> 00:20:13,270 So through which we can define maybe then got zeroed out one dot one, three, two, and then you define 251 00:20:13,280 --> 00:20:15,940 your all the other parameter. 252 00:20:16,480 --> 00:20:20,190 You can even set your local board as well if you want it by default. 253 00:20:20,200 --> 00:20:22,780 It is four for four which is already there. 254 00:20:22,780 --> 00:20:26,950 So you don't really, really need much more information in order to launch it. 255 00:20:26,950 --> 00:20:28,660 You just have to type exploit. 256 00:20:29,050 --> 00:20:37,660 Now remember this, your payload is your malware, but you haven't really created it as of now because 257 00:20:37,660 --> 00:20:44,890 it is all it is all just selection of a payload you haven't really created or called any payload as 258 00:20:44,890 --> 00:20:45,260 of now. 259 00:20:45,580 --> 00:20:50,600 So in order to create it, we there are a massive Menom method which is being available. 260 00:20:50,920 --> 00:20:53,970 So this is the method to perform the exploit. 261 00:20:54,340 --> 00:21:01,870 So if you have, let's say, creative decision, create to launch these sessions and you want to see 262 00:21:01,870 --> 00:21:07,090 what are the other activities you are doing so you can make use of Central Command and you can get to 263 00:21:07,090 --> 00:21:10,020 see if you have any active sessions running or not. 264 00:21:10,540 --> 00:21:18,100 You can even type jobs to understand if you have any active jobs related to maybe scanning or, you 265 00:21:18,100 --> 00:21:23,590 know, maybe opening up any webcam on the remote coast or all this activity. 266 00:21:23,950 --> 00:21:24,420 All right. 267 00:21:24,670 --> 00:21:33,560 So this is all about this is all the basic stuff related to my test flight and what all activity you 268 00:21:33,580 --> 00:21:36,960 could possibly do once you get the access to the motorsport. 269 00:21:37,330 --> 00:21:37,680 All right. 270 00:21:37,990 --> 00:21:40,210 So this is all about this lecture. 271 00:21:40,430 --> 00:21:46,240 We'll get you in the next lecture where we'll be discussing about managing the data. 272 00:21:46,240 --> 00:21:53,200 But they might exploit managing the, uh, managing the data to a structured database on the Postgres 273 00:21:53,200 --> 00:21:57,280 good right to enjoy and keep learning.