WEBVTT

00:01.060 --> 00:06.430
Enrolled even in a previous view do we have discussions about setting up just like.

00:06.530 --> 00:09.130
Now this would allow we don't understand about peterpan.

00:09.230 --> 00:16.480
Expect this we do talk about the types of explosives exploding using airstrikes and state or state.

00:16.580 --> 00:23.630
Now as we discussed earlier an exploit is a piece of code that locks on the target of a machine if this

00:23.630 --> 00:27.800
exploit is triggered the machine can be under control.

00:27.830 --> 00:32.190
Now in retrospect framework all exploited fall into two categories.

00:32.190 --> 00:33.370
They ran past it.

00:33.480 --> 00:39.520
So the structural exposure a specific post Lennox's definition of service selten and the spirit of every

00:39.880 --> 00:43.620
person understand what is and to explain how the takes place.

00:43.700 --> 00:47.340
They will put incoming host and explode them as they it.

00:47.360 --> 00:54.230
So if I'm targeting the machine on the same plan and I know the specific IP address of the target machine

00:54.530 --> 01:01.400
that I can be using for extra extra if I'm targeting the whole network and I'm not sure who or what

01:01.400 --> 01:07.850
is the IP address of the machine that could be a target for me than I can before using passing textbooks

01:08.140 --> 01:16.220
when I would just last exploding before the target to connect and the Rocco's mushy Murka spectrum work

01:16.340 --> 01:23.180
has a modern nation of its likes vision the always in the service classification and every exploit has

01:23.180 --> 01:25.610
a ranking value based on your functionality.

01:25.610 --> 01:34.170
So in my current ex-gratia spreads have a student ranking ranking ranking normally aggregates when matter.

01:34.180 --> 01:38.480
And now an expert will be having excellent ranking.

01:38.570 --> 01:40.070
The clerk will never crash.

01:40.070 --> 01:45.550
This is making the case squad is put into action command execution and so on.

01:45.670 --> 01:52.370
Plus the towers are before Target and either poverty's the appropriate tactic or use as an application

01:52.370 --> 01:54.900
specific return address see it sir.

01:54.960 --> 01:57.420
They are trying to protect approach haven't heard before.

01:57.430 --> 02:00.150
How good is the common case.

02:00.290 --> 02:07.550
But that type of software like any windows post-peak software vendor could be blinking and explode that

02:07.550 --> 02:14.450
is otherwise reliable depends on a specific version and can reliably auto detect or resemble a little

02:14.450 --> 02:15.110
D.

02:15.450 --> 02:20.720
Then none of the ranking escrowed should be used as this proteids generally unreliable articles or to

02:20.770 --> 02:21.490
explode.

02:21.510 --> 02:23.210
Then there is an average ranking.

02:23.260 --> 02:29.890
If the explosion is under 50 percent of the cases where contact forms then the ranking is used and for

02:29.960 --> 02:37.540
any expert that is unstable or difficult to explain in the analysis other than the Malraux ranking.

02:37.690 --> 02:43.070
So use the expert on these expert rankings on the project of operating systems.

02:43.190 --> 02:49.100
Not in the murders per Trimbach architects two of the experts will be found and that is but that is

02:49.280 --> 02:51.160
slash sourceless said.

02:51.350 --> 02:52.820
That's my perspective.

02:52.960 --> 02:59.820
The end you have more views and then you have to expect every If you move to the Callimachi.

02:59.930 --> 03:05.660
We can explore the explosive with it and also will see how using an exploit will add more options to

03:05.660 --> 03:06.700
the showrunner.

03:06.760 --> 03:09.430
So let's quickly move to the culling machine.

03:09.920 --> 03:17.450
If you move to this part and then do this on de-listing you can see there are different directories

03:17.450 --> 03:21.230
for different platforms like Windows Unix.

03:21.230 --> 03:24.020
So that is 6 and so on.

03:24.170 --> 03:27.610
So spreads have been categorize platforms.

03:27.650 --> 03:35.280
If I move into windows and then do a listing you can see there on exploits again got to get a vision.

03:35.400 --> 03:39.170
So it is an application that can be running on the Windows platform.

03:39.220 --> 03:48.010
So we have ex-boxer B Z ex-coach for telnet S-sh and so on the various races that will be running on

03:48.010 --> 03:49.330
the target machine.

03:49.450 --> 03:54.810
If I am moving to the cash cashbox in the console search for explosives here also.

03:55.090 --> 03:57.080
This may take some time.

03:57.250 --> 04:01.010
So we can see when full on the search come on first approach.

04:01.030 --> 04:05.560
It shows me a list of exploits in say the symbol.

04:05.670 --> 04:11.120
Now when I want to show it here is the security check for every display you have displayed name.

04:11.140 --> 04:16.890
Since when has been published and then there is a ranking that has been given to e-text black which

04:16.890 --> 04:17.950
we are discussing above.

04:17.950 --> 04:22.960
So before you start using an clerk you can just choose the information and you can be sure whether you

04:22.960 --> 04:29.890
are executing an external right here or split depending on the platform you are trying to attack and

04:29.890 --> 04:33.620
depending on the situation mix approach to be used.

04:33.760 --> 04:38.220
You can see that is in every escrowed has been given the same ranking.

04:38.230 --> 04:40.670
Now let's say I use any explosives.

04:40.680 --> 04:47.910
So understandably select something like this I suppose to begin.

04:48.130 --> 04:51.710
If you want to use this list you still miss.

04:51.850 --> 05:00.900
So copy this explode or case the name can see and hear here I see I want to use this explosively Taiping

05:01.000 --> 05:02.720
use flash and explode.

05:02.770 --> 05:09.070
But now the control will be using this as prototype and define knife of Anchal and this should come

05:09.070 --> 05:16.860
on so I can use shell and see options to show me the complete options that need to be defined.

05:16.860 --> 05:23.500
We're using these experts we can see it needs inside of the host as our report is this is in Antarctica

05:23.660 --> 05:30.780
and that you are a tough nut for a few variables values in order to find for others it needs to be new.

05:30.940 --> 05:34.800
Which parameter is mandatory to define and which one is not.

05:34.870 --> 05:36.070
Is 0 3 I know.

05:36.130 --> 05:45.670
So if it says required no then I can leave this as an optional so that means once you define explode

05:45.670 --> 05:51.070
to use you can non-judicial command to get more data on the ex-black.

05:51.400 --> 05:56.000
So I can select the target take into the main road and so on.

05:56.110 --> 05:57.090
Well let's see.

05:57.200 --> 06:08.720
I mean sure it's just that it is Windows XP and 2000 which is to it crucial all the pale orbs that can

06:08.720 --> 06:12.230
be written for this particular explosion.

06:12.530 --> 06:14.640
So likewise I can use the other options.

06:14.650 --> 06:21.080
The initial comment and contrast emission checks to get monitors of all the color is not discussing

06:21.080 --> 06:26.650
of of the Philips as we've already all of the dissenting opinions here and you feel in retrospect enough

06:26.650 --> 06:33.660
for us to expect more news and that piece of code that actually runs on the human machine or the data

06:33.670 --> 06:40.490
or can multiply many of the different types in those stages and stages all these different types of

06:40.510 --> 06:47.180
failure for a great deal with subtlety and can be useful across numerous Fluxion areas.

06:47.190 --> 06:54.750
Now whether it is good or not is division did by the slash in the field or any Next discuss the field

06:54.750 --> 06:55.610
or lever.

06:55.730 --> 07:01.910
So those are the people who expect a self-contained and this kind of a single payload can be some Pams

07:02.000 --> 07:06.050
something as simple as adding a user to the package system.

07:06.050 --> 07:08.730
Now these fines are paid or some sort of content.

07:08.780 --> 07:10.690
So they can be caught.

07:10.690 --> 07:16.010
It's not my best handlers us just next the next tape OK are these stages.

07:16.010 --> 07:20.430
The stage is set up a network connection between the attacker and the victim.

07:20.450 --> 07:25.770
They are designed to be small and reliable as it is if you go to all do both of these.

07:25.780 --> 07:32.120
That is the setting of the connection and the smaller level there is there is multiple sclerosis.

07:32.180 --> 07:38.780
Netscape is stages and the stages are the components that are downloaded by the state models and they

07:38.780 --> 07:46.310
are from a Bigloo use the middle stages the various stages a different advanced features with full sized

07:46.310 --> 07:53.760
images so just the make it better we the and action or we were discussing the both of them.

07:53.770 --> 08:01.150
He looked at his metalworker which falls into the category of stages in a can you in getting about these

08:01.290 --> 08:07.460
two main types of payloads seeing those stages and stages contains many different types of figures.

08:07.460 --> 08:10.480
Also it's serving the unique role within the framework.

08:10.530 --> 08:16.980
So we have periods which are in line stage as motivated as ever these these.

08:17.150 --> 08:21.200
And then we have something that Pasay who acts more and makes the noise.

08:21.230 --> 08:26.890
If you're already out of the ordinary elopes and then IP version 6 specific field.

08:27.110 --> 08:28.950
And then we to the.

08:29.030 --> 08:35.810
In addition to that more information about this you can get from the sake of security Darkwing when

08:36.140 --> 08:40.030
you have a complete detailed document to printable.

08:40.220 --> 08:47.240
So in this way we have got a good understanding of our dealerships and explodes and in my spectrum work

08:47.330 --> 08:52.310
and how the exploits and also we discussed about the killer apps and so on.

08:52.440 --> 08:59.120
Then the next world you will discuss about improving the research into my breastplate to make her impression

08:59.120 --> 09:00.730
birthing process more better.
