WEBVTT

00:00.800 --> 00:07.130
Hello everyone in a team is reduced we have discussed about one of re-assessment using Nessus and openness

00:07.440 --> 00:14.180
and baseliners in this section will introduce a test right Primack Nanga section.

00:14.210 --> 00:18.050
Learn about turning up markets both understand the field and these gloves.

00:18.150 --> 00:23.460
You'll also see how pinboard in their search results in numerous posts and then how we can perform scanning

00:23.550 --> 00:24.970
using my guess correctly.

00:25.090 --> 00:31.380
You talk about the interfaces and the usage of it typically in the first really of the section to learn

00:31.380 --> 00:38.550
about setting up modestly and this beautiful go to Huber's words Liverpool McCoskrie is he almost got

00:38.550 --> 00:39.830
my respect for him.

00:40.120 --> 00:43.320
I'm going have an understanding of our Master architecture.

00:43.500 --> 00:49.050
Talking of all the buzz words if you have been in do penetration testing and already started learning

00:49.050 --> 00:53.130
about it then I'm sure that you have heard this works quite frequently.

00:53.130 --> 00:55.100
When liberty exploited.

00:55.410 --> 01:01.590
If they go by the definition of release any weakness that exists in the target system to which penetration

01:01.590 --> 01:07.380
can successfully call an exploit is a code or a script that Gerson's you couldn't understand their system

01:07.620 --> 01:10.050
happening and or Packers take advantage of the event of your day.

01:10.110 --> 01:14.700
On the particular machine and the payload is that code is initiated by your attacker.

01:14.740 --> 01:23.130
Subsequent to an exploit in order to maintain x's on the access or in order to get benefit out of the

01:23.400 --> 01:26.550
target machine never run to understand these two doves.

01:26.640 --> 01:28.830
By and large you can take an example.

01:28.830 --> 01:33.140
So let's say armor teeth and I'm on board over there.

01:33.250 --> 01:38.630
Mike there are boos too during the day time because there will be guards at undergirding being a.

01:38.680 --> 01:39.770
Everyone that goes.

01:39.810 --> 01:47.040
So I need to first explore and see the way to enter into it the different ways to be taken into the

01:47.040 --> 01:47.780
building.

01:47.800 --> 01:48.960
Now let's see.

01:48.960 --> 01:55.530
Suppose I look it up into the back sort of the very much still I can arc get into.

01:55.650 --> 01:56.890
During the daytime.

01:56.970 --> 01:58.940
So I decided to do it during the night.

01:59.040 --> 02:04.610
Now during the night also if I want Gwendolyn good at reading I need to first dig that window.

02:04.680 --> 02:11.340
And for doing so I would need something to time so I can now see that the window is the weakness of

02:11.340 --> 02:19.020
the building on the hammer which I'll be using to break into the know is the extra ones I'm inside.

02:19.040 --> 02:20.980
They really want to steal.

02:21.120 --> 02:23.350
Later on I want to steal cash or something.

02:23.400 --> 02:26.200
So I need to see how it can do it.

02:26.220 --> 02:31.860
So if I'm carrying a bag depending on the size of the bag depending of the quality of the bag I need

02:31.860 --> 02:34.690
to decide what I can see and what I come.

02:34.750 --> 02:40.110
So you can see that the particular bag is the pillar from lands I'm done with this.

02:40.110 --> 02:42.740
I can move out of the building before moving out.

02:42.820 --> 02:49.070
I can obviously see in my last meeting with the CC-TV who these are just damaging the CCTV cameras.

02:49.070 --> 02:55.980
So now the dorms example we understand that the window of the weakness in the building that allowed

02:55.980 --> 02:57.470
me to get in good.

02:57.570 --> 03:03.870
So that is one of you're seeing this power in the system the Express for example will the Hammil which

03:03.870 --> 03:09.620
was used to enter into the building where it was use to break through the winnability and runs and runs

03:09.630 --> 03:10.900
into the building.

03:10.920 --> 03:13.380
I used the bag to collect the data.

03:13.410 --> 03:21.340
So in the same way I mean to a system I use the Lord doesn't do more to this system than they do television.

03:21.550 --> 03:27.120
Now if you want to use in the first place you have to go on the steps and the seconds before start the

03:27.420 --> 03:32.240
party for the this than anything that displays news it is.

03:32.250 --> 03:35.700
And then finally he realize the nation's birth control and Palli

03:39.080 --> 03:43.260
come back from the is to live the people that to see how much respect.

03:43.310 --> 03:50.530
So they quickly move into my machine once I'm in the machine I can get home and just come on to start

03:50.530 --> 03:57.320
the post office with be servers who spews this stuff finds it and they come on.

03:57.330 --> 04:03.360
You could start because this is Nestor's initialized in a display case.

04:03.540 --> 04:06.470
So I wouldn't be in the safe Givi space.

04:06.550 --> 04:12.640
And on this building in July in our lives you could have this come on earlier if it ever appears to

04:12.640 --> 04:13.870
be under the gun.

04:13.980 --> 04:17.510
Margaret we did for the first time in his life at this point.

04:17.640 --> 04:24.830
And then on to London my passport control I just need to get in the command and control center.

04:25.010 --> 04:26.580
Sure both of them.

04:26.820 --> 04:33.060
So we can see the MSF console has started and this is what middle class looks like and the current version

04:33.060 --> 04:37.270
of a dispute started on carolinensis version for 2011.

04:37.490 --> 04:42.080
The target on the plane and it exploded several deaths there in those days.

04:42.090 --> 04:46.450
And so on we know about them are Rasbora architecture.

04:46.550 --> 04:48.440
It has X libraries.

04:48.510 --> 04:55.100
It has different interfaces these modules schools and Slovenes talking of all these components.

04:55.230 --> 05:03.200
If you look at the bottom we have the more use because it has more to make exploits what it was to on.

05:03.270 --> 05:08.600
But the new core was most on the target machine because the explosion that actually use the data.

05:08.730 --> 05:14.190
If there is any exploit this doesn't need to be learned because it is in all the leading modules the

05:14.190 --> 05:20.240
pillars of the models that consists of the code that would be running on the remote machine the coolers

05:20.240 --> 05:24.690
or the molecules in shoulder in order to make it to the destination.

05:24.690 --> 05:29.490
That means how the keyboard actually is the target machine there should be something really could be

05:29.550 --> 05:32.830
some other core other scripts and so on.

05:32.850 --> 05:34.440
So that can call us.

05:34.710 --> 05:41.100
They just make sure that the bill will feature and Knops keep sites consistent discussing of all the

05:41.100 --> 05:48.390
leverages the single library helps us to explode without having good original core ones that are really

05:48.390 --> 05:52.310
mundane stuff such as Escherichia request or encoding of things.

05:52.500 --> 05:58.170
So the framework library has everything before making the book easy.

05:58.200 --> 06:04.530
The next part is the basic level for most of the tasks and standards and software protocols and other

06:04.530 --> 06:07.750
things like SSL is UDP and so on.

06:07.920 --> 06:15.590
The MSF going to actually basically define the spectrum of innocent babies who are the friendly EPA

06:15.870 --> 06:19.130
and actually simplified it is presented in the book.

06:19.140 --> 06:21.460
So these studies have been sitting here.

06:21.630 --> 06:27.570
Depending on what they can prove as a feature the murderous word has been used tools and slogans also

06:27.760 --> 06:31.460
in them so that you can use because there is no easy feat.

06:31.560 --> 06:37.260
There are different interfaces available from using words by controlling the language you have just

06:37.440 --> 06:39.710
lost by using them as a sort of command.

06:39.780 --> 06:44.340
And also he was murdered back by the command line interface and is of C.

06:44.490 --> 06:50.560
There is a reasonable label for my guess is that you and that is a different project.

06:50.580 --> 06:58.170
They will have a better framework which is Magee's discussing a few of them discussing more of all the

06:58.170 --> 06:59.970
architecture of my flight.

07:00.180 --> 07:06.870
If we go in the dark trees on a killing machine you see that the spectrum of system is laid out into

07:06.870 --> 07:11.970
an intuitive manner and is organized by the tools expertly.

07:12.000 --> 07:16.770
These are the markets that pretty quickly go into my machine again.

07:16.770 --> 07:20.210
So I need to move into the part of years.

07:20.420 --> 07:21.190
Sure.

07:21.360 --> 07:23.730
And you've seen this before.

07:23.750 --> 07:31.780
The other piece of my perspective is my passport came up and moved into this you can see the different

07:32.160 --> 07:33.400
case here.

07:33.490 --> 07:40.050
And inside there's the real find London in malls which has the LG ladies and cudos exploits and loves

07:40.200 --> 07:41.690
the ropes and.

07:41.760 --> 07:42.640
Yes.

07:42.990 --> 07:50.670
You know we did see that the trees or the barn or Trevathan the data contained the devil fence has been

07:50.670 --> 07:54.490
the first for the library is the need of the symbol core base.

07:54.510 --> 07:59.810
The models can then in the mall as they will really seen the plugins they're doing contain those plug

07:59.810 --> 08:04.000
in that can be loaded at runtime depending on what we are trained to.

08:04.350 --> 08:09.870
The scripts contains the scripts like McKittrick that in a script that can be used during the attack

08:09.990 --> 08:16.170
and the tools contain the villagers who come on line which can be used along with my.

08:16.260 --> 08:22.020
So in this way do we have of the from the starling about shirting of Magistrate Unger's architecture

08:22.200 --> 08:28.170
and the things that are contained inside because then the next thing you will discuss about the field

08:28.200 --> 08:34.340
and expects that a better understanding of what it can offer to us in penetration testing.
