1 00:00:07,300 --> 00:00:14,830 Welcome in this lecture we are going to see how the black hat hackers embed their payload in order to 2 00:00:15,340 --> 00:00:25,710 get files who hack their victim device basically here we are going to use a real tool which creates 3 00:00:25,980 --> 00:00:35,990 generates an embedded payload to old file to penetrate and Redback forms so to download this framework 4 00:00:37,010 --> 00:00:48,980 open it Groser and I will dry click on this link. 5 00:00:49,020 --> 00:00:55,990 Now go to clone or download and upgrading a couple Linkov worldwide. 6 00:00:58,380 --> 00:01:07,270 Now we're in that community and I get on and pick up the link 7 00:01:11,260 --> 00:01:15,670 as you can see now we are just really close to the framework. 8 00:01:16,670 --> 00:01:28,610 Now let's move into the Paula type CD every dried before we run this tool. 9 00:01:28,730 --> 00:01:40,550 We need a bigger file to bind our so open to broader and by it be good for fun. 10 00:01:41,440 --> 00:01:45,290 Here we get a different picture files to download. 11 00:01:46,200 --> 00:01:50,310 Now let's download the ratified. 12 00:01:50,400 --> 00:01:53,730 So by that in search of books 13 00:02:00,880 --> 00:02:04,540 now click here to download the ratifying 14 00:02:07,360 --> 00:02:08,360 as Makenzie. 15 00:02:08,420 --> 00:02:12,170 I already downloaded and placed it on the desktop. 16 00:02:13,330 --> 00:02:23,670 Now let's run the I will drive to so before we do then we need to make this file as executable. 17 00:02:23,720 --> 00:02:31,550 I see it mode plus X I really tried. 18 00:02:31,630 --> 00:02:34,240 Now the script is as well. 19 00:02:34,720 --> 00:02:42,550 So let's run this type doc slash and real droid. 20 00:02:42,640 --> 00:02:48,970 It will take around four to five minutes to start depending up on your internet speed. 21 00:02:52,060 --> 00:02:57,850 Now we are there to MBRD our payload in order if get. 22 00:02:57,900 --> 00:03:06,640 So now select the option 3 which is new version is Agard in this tool. 23 00:03:06,670 --> 00:03:14,770 Now we need to enter our local host IP and local port number on which we are going to listen on with 24 00:03:14,860 --> 00:03:23,300 the machine next and the name of your payload and select which type of payload to use. 25 00:03:23,740 --> 00:03:32,560 So here we are using Android slash reporter slash that he would underscore TCAP. 26 00:03:32,830 --> 00:03:38,750 Now select you are wounded in an epic kill file to hide you would build in that file. 27 00:03:40,270 --> 00:03:43,330 As again see it is indebting a lot. 28 00:03:43,540 --> 00:03:44,250 I will fly 29 00:03:49,860 --> 00:03:54,530 here again see our Lord is indicated and sealed in. 30 00:03:54,770 --> 00:03:57,980 I will ride for the now. 31 00:03:58,050 --> 00:04:01,200 It is asking to create a handler listen. 32 00:04:01,270 --> 00:04:05,720 It was going to Rome to get the machine so bleak. 33 00:04:05,740 --> 00:04:07,870 OK who create händler 34 00:04:11,270 --> 00:04:14,230 as we can see now we are ready. 35 00:04:14,240 --> 00:04:18,240 It was an action plan to get the machine. 36 00:04:18,330 --> 00:04:19,990 Next we need to send these. 37 00:04:20,000 --> 00:04:26,340 I will file go with him to ice as Makenzie as St.. 38 00:04:26,400 --> 00:04:29,650 I will fight to get him to ice. 39 00:04:29,680 --> 00:04:32,850 Now lets install and the application 40 00:04:36,950 --> 00:04:48,530 as I can see it open as like normal file but if you see in terminal we got a decision. 41 00:04:48,780 --> 00:04:53,500 So that's how the hackers embed their payload in order. 42 00:04:53,630 --> 00:04:59,820 If you kill files who have their Withem device Thank you.