1 00:00:01,250 --> 00:00:07,040 OK, now it's time to talk about Meter Britain now, the Meter Britain is a multifunction bailout that 2 00:00:07,040 --> 00:00:11,330 can be dynamically extended at runtime. 3 00:00:11,810 --> 00:00:17,960 So this means that the meter reader provides more features and functionality than a regular command 4 00:00:17,960 --> 00:00:18,260 chain. 5 00:00:18,560 --> 00:00:25,850 OK, so let's search for meter operator OK, and the tape will be payload. 6 00:00:28,530 --> 00:00:29,640 And here, here it is. 7 00:00:29,820 --> 00:00:30,690 You can see that. 8 00:00:32,200 --> 00:00:35,290 And, for example, let's have the windows. 9 00:00:36,610 --> 00:00:39,370 For example, these ones, as you can see. 10 00:00:39,670 --> 00:00:48,790 So we want to use the exploit windows actually to be think, please be Oh, OK. 11 00:00:50,290 --> 00:00:51,070 As you can see. 12 00:00:52,360 --> 00:00:54,620 This one now let's sit. 13 00:00:54,690 --> 00:00:55,660 The bailout. 14 00:00:56,650 --> 00:01:03,010 To their windows, Mr Repairs HDTV, by the way, it is a reverse TCB. 15 00:01:03,100 --> 00:01:04,060 This is the default one. 16 00:01:04,269 --> 00:01:04,930 No problem. 17 00:01:05,470 --> 00:01:06,520 No show options. 18 00:01:07,510 --> 00:01:13,390 Here you can see that we have the our hosts toilets sit our hosts to something else. 19 00:01:13,720 --> 00:01:19,120 By the way, this must be a windows machine, but I will not use this. 20 00:01:19,120 --> 00:01:23,080 I will use my local machine just to show you, OK, the basics. 21 00:01:23,950 --> 00:01:29,200 Now, after it is done, we can't get on, but the don't command or exploit the same thing. 22 00:01:29,470 --> 00:01:30,640 By the way, this will not work. 23 00:01:31,030 --> 00:01:31,690 Why is that? 24 00:01:32,020 --> 00:01:38,350 Because this is for Windows machine and I am putting my IP address, which is a Linux machine, obviously, 25 00:01:38,860 --> 00:01:41,420 but I'm just showing you how to do such a thing. 26 00:01:41,440 --> 00:01:48,610 Now, no worries in the lab sections, the practical hands on we will have a depth detailed. 27 00:01:49,810 --> 00:01:54,620 How to do such a thing and how to use Metasploit even in aerial attacks? 28 00:01:54,640 --> 00:01:59,590 OK, now this is just an example of how to do it and how to search for it. 29 00:01:59,830 --> 00:02:04,660 By the way, you can see that, you know, session we are created because that's suitable for this target 30 00:02:05,130 --> 00:02:05,800 to exploit. 31 00:02:06,610 --> 00:02:13,510 So what we learned today is just keep that in your mind that we can search for, exploit and use the 32 00:02:13,510 --> 00:02:17,290 payload and seed it so we can use it as we want.