1 00:00:08,780 --> 00:00:16,510 Us little we saw that we can detect decision using anti-mother to. 2 00:00:16,630 --> 00:00:26,650 So this lecture we are going to see how we can detect middle position using and DPW and like to use 3 00:00:26,730 --> 00:00:33,210 it which to base the intrusion detection system for detecting with recession. 4 00:00:33,330 --> 00:00:37,470 And it's written in C hash language. 5 00:00:37,510 --> 00:00:45,760 So let's see how to detect metal partition using and DPW like to. 6 00:00:45,840 --> 00:00:49,640 So it is over and the right tool. 7 00:00:50,190 --> 00:00:51,150 Let's open this 8 00:00:54,470 --> 00:01:06,500 as again see this tool is available for both 64 and 86 systems so here our system is 64 bits. 9 00:01:06,550 --> 00:01:19,110 So selecting the 64 bits to now let's And these as again see you're scanning the processes which are 10 00:01:19,110 --> 00:01:20,560 running on this system. 11 00:01:22,010 --> 00:01:23,690 It takes some time. 12 00:01:23,690 --> 00:01:25,630 Whose Gahn whole system. 13 00:01:33,990 --> 00:01:43,070 As you can see we got the list of processes which are running on this system now expand each process 14 00:01:43,400 --> 00:01:44,930 to see in detail. 15 00:01:46,960 --> 00:01:57,220 As you can see here we got the process which is created a backdoor in our system arrogancy the IP and 16 00:01:57,520 --> 00:02:09,440 our local host IP which means our system is connected with the system know that this process right click 17 00:02:09,440 --> 00:02:15,620 on these and click on the process. 18 00:02:15,710 --> 00:02:28,500 So let's see in our column machine as you can see here the discussion is that in fact machine you need 19 00:02:28,520 --> 00:02:33,130 to kill the unknown processes which are running on your systems. 20 00:02:34,730 --> 00:02:40,290 So that's how you can detect and deliberate decision using. 21 00:02:40,730 --> 00:02:45,010 And DPW N.Y. who will thank you.