1 00:00:01,890 --> 00:00:04,290 So before going to start the course. 2 00:00:04,540 --> 00:00:12,280 Well let's see what is payload and what are the different types of payloads basically the is is there 3 00:00:12,330 --> 00:00:19,470 a program or a moderator sent along with the exploit to be executed on the machine. 4 00:00:19,500 --> 00:00:23,140 There are three different types of payloads are there. 5 00:00:24,620 --> 00:00:33,040 The first one is single single payloads are completely self-contained and not connected to anything. 6 00:00:33,200 --> 00:00:40,940 These type of payloads simply create a communication using my sprite or they can simply perform some 7 00:00:40,940 --> 00:00:41,760 actions. 8 00:00:41,870 --> 00:00:46,130 They are really just flat and forget payloads. 9 00:00:46,140 --> 00:00:55,440 The second type of pillories stagers these payloads work in conjunction with stage payloads in order 10 00:00:55,440 --> 00:00:58,270 to perform a specific task. 11 00:00:58,460 --> 00:01:08,150 Its danger establishes a communication channel between the attacker and victim and reach a stage or 12 00:01:08,490 --> 00:01:10,550 exit execute on the remote host. 13 00:01:13,940 --> 00:01:24,860 And last step off Wheeler is stages stages are Paillard elements that are not by state models. 14 00:01:25,250 --> 00:01:32,650 The multiple prelaunch dados and in the air was a few tools with no size limits such as with the operator. 15 00:01:32,900 --> 00:01:38,570 We see injection Linux shells Windows shell and so on. 16 00:01:40,610 --> 00:01:43,780 Now lets see how the filter works. 17 00:01:45,280 --> 00:01:53,210 Basically here explodes and we lost our work together to get full control over the target system. 18 00:01:54,630 --> 00:01:57,930 So let's take an example. 19 00:01:57,930 --> 00:02:07,960 Suppose it wants to roll any house which was locked up by the residents and then away from some holidays. 20 00:02:08,090 --> 00:02:11,760 Now the thieves seize a lock at the front door. 21 00:02:12,780 --> 00:02:24,410 And after the letters home that the lock was loaded with a key here in order that the duplicate is the 22 00:02:25,010 --> 00:02:28,600 exploit in them as light recall. 23 00:02:28,830 --> 00:02:36,010 When you do a port scanning you found that this R-Wis. is relatable to this exploit. 24 00:02:36,060 --> 00:02:45,000 So this is the same when the thief enters into the house he decides what to do. 25 00:02:45,040 --> 00:02:50,220 Watch dasht the here are that things to do. 26 00:02:50,390 --> 00:02:57,380 Use the pillar in the metal plate is that after exploding the system what to do. 27 00:02:58,000 --> 00:03:06,340 So after exploding the system through the use of x plate we decide what to do next by specifying the 28 00:03:06,340 --> 00:03:07,950 payload. 29 00:03:07,960 --> 00:03:15,680 So this is how they explode and we'll all work together to get full control over the system.