1 00:00:06,890 --> 00:00:16,220 Welcome in this lecture we are going to see how to create a undetectible Python backdoor or reload using 2 00:00:16,430 --> 00:00:20,550 Amma's of them and an X grib framework. 3 00:00:21,730 --> 00:00:30,780 Basically an X script framework is Charlemont pig Python scripts are written in Python by the minute. 4 00:00:31,000 --> 00:00:38,790 They are part of this framework is fully under the table and you inject malicious python file into a 5 00:00:38,850 --> 00:00:42,490 normal file with multi-threading system. 6 00:00:42,490 --> 00:00:48,860 So basically here we are working to create a simple python backdoor using and most of them. 7 00:00:49,390 --> 00:00:57,230 And then we use an X group who will encrypt that Baddoor who make under the table. 8 00:00:57,340 --> 00:01:09,670 So let's create one python better file using myself and type and Mussar fandom has Plan B Python. 9 00:01:10,110 --> 00:01:22,480 Slash were deliberate slash rewards and the school the now and the local host IP and local port number 10 00:01:23,160 --> 00:01:26,850 on which we are willing to listen on with the machine. 11 00:01:28,230 --> 00:01:34,650 Next and the name and part of the payload bay area we want to see you now. 12 00:01:34,710 --> 00:01:35,250 And the 13 00:01:39,330 --> 00:01:44,990 as you can see here are a little Python vendor file is created. 14 00:01:45,090 --> 00:01:53,590 Now let's scan this payload and see how many do it is as we look at this payload now. 15 00:01:53,600 --> 00:01:55,820 Click here to upload Lord 16 00:02:02,360 --> 00:02:11,290 as you can see here all of that to do and do addresses only CNN into it it has detected this or. 17 00:02:11,370 --> 00:02:16,320 Now let's encrypt this payload with an X grip tool. 18 00:02:16,540 --> 00:02:28,000 So to get Dignan of this framework when a browser and an X group get how now click on this link 19 00:02:30,680 --> 00:02:37,600 now to clone or download and copy to get this framework. 20 00:02:37,630 --> 00:02:43,320 Now type in terminal good clone and wished to decode we'll link 21 00:02:47,340 --> 00:02:50,850 as it can see here the extra pull. 22 00:02:51,160 --> 00:02:53,860 Sectors like glowin. 23 00:02:54,000 --> 00:02:56,690 Now let's move into the folder. 24 00:02:57,140 --> 00:03:00,620 I see an x ray 25 00:03:04,480 --> 00:03:06,570 by here. 26 00:03:06,640 --> 00:03:12,670 Is this group or an X group who now encrypt our file. 27 00:03:13,510 --> 00:03:19,340 I my tone and X group not be like 28 00:03:22,640 --> 00:03:34,440 here we need to enter the Patoff or amplify it on better find next and do the name and part of the payload 29 00:03:35,780 --> 00:03:36,530 now. 30 00:03:36,620 --> 00:03:43,840 And that as you can see here our particular file is great. 31 00:03:45,250 --> 00:03:51,530 Now let's get these. 32 00:03:51,750 --> 00:03:54,570 Click here and select the payload 33 00:04:01,660 --> 00:04:08,670 as you can see here by Partha all do and do it as. 34 00:04:08,720 --> 00:04:12,900 So let's send this payload flight to Mushin 35 00:04:16,380 --> 00:04:19,210 we would want to send the Lord. 36 00:04:19,410 --> 00:04:22,040 We need to create a handler to listen. 37 00:04:22,150 --> 00:04:24,610 Was going on that machine. 38 00:04:25,660 --> 00:04:31,880 So I gunsel open my display 39 00:04:35,880 --> 00:04:43,300 now that handler I use my last hand. 40 00:04:45,900 --> 00:05:04,050 Next that preluded type set payload by tawn slash to slash the word underscore PSAP notice that Horst 41 00:05:05,090 --> 00:05:21,380 I said who is 192 but 168 43 don't do and C-1 similarly to set iPod type set and port four for three 42 00:05:21,550 --> 00:05:23,620 to listen on the machine. 43 00:05:24,630 --> 00:05:34,410 Now I put on Doc Lisner next to a need to send this payload to machine. 44 00:05:34,470 --> 00:05:41,060 So here I am using my local project was that were to send this payload to the machine. 45 00:05:41,120 --> 00:05:53,650 Now copy the payload and go to where w w w s the MLA folder and paste here. 46 00:05:56,150 --> 00:06:04,250 Now doc about your Saddleworth guy said his apology to start 47 00:06:08,750 --> 00:06:09,470 now. 48 00:06:09,930 --> 00:06:18,590 Let's go to the machine and by one and you do that 160 and 43. 49 00:06:18,850 --> 00:06:21,410 Who wants one. 50 00:06:21,440 --> 00:06:23,710 Here is our payload. 51 00:06:23,750 --> 00:06:29,470 Now let's Dunner and run these. 52 00:06:29,520 --> 00:06:31,560 Here is our payload. 53 00:06:31,590 --> 00:06:34,010 Now let's run these. 54 00:06:34,110 --> 00:06:42,960 So open a terminal and type right on bad. 55 00:06:43,280 --> 00:06:47,250 Be like as against me. 56 00:06:47,630 --> 00:06:51,050 He's a good now. 57 00:06:51,180 --> 00:06:55,830 Let's go to our machine as it gets here. 58 00:06:56,310 --> 00:06:58,620 We got a decision. 59 00:06:59,690 --> 00:07:06,280 So that's how the hackers cleared it undetectible payload who hacked their machines. 60 00:07:09,970 --> 00:07:10,530 Thank you.