WEBVTT

00:01.430 --> 00:08.290
Hello everyone in the previews we do is we have viscously of the will really be paid to the activity

00:08.660 --> 00:14.630
nine this year do we'll have a recap of the expectable 100 days of what exactly needs to be done with

00:14.630 --> 00:21.130
this one read that that I didn't devote so analyzing their abilities finding explosives and then finding

00:21.180 --> 00:26.900
that Sperling goes on because if you go back to the previous videos the previous sections You'll recall

00:26.900 --> 00:33.650
that once you start using different boots for the one re-assessment like and map and Nessus it gives

00:33.650 --> 00:36.980
you a detailed list of all the liberties that have been identified.

00:36.980 --> 00:43.250
So when you start moving through those layers you need to understand you need to analyze which is more

00:43.250 --> 00:45.530
typical as compared to the other.

00:45.560 --> 00:49.040
Also some Pang's vulnerability may be related to the other one.

00:49.070 --> 00:52.150
So patching one may also resolve the issue.

00:52.190 --> 00:57.410
So you need to go through the complete list in the Vegas Review we we're seen the output of the indices

00:57.420 --> 01:03.220
to it to your record all of the abilities those were identified for that particular machine.

01:03.260 --> 01:09.350
So if one were part of a machine is having more than can be many abilities in the Johns's resulted in

01:09.480 --> 01:11.790
a performing one kind of resolution.

01:11.990 --> 01:18.310
The effect many of the activities that one does resolving most of the issues analyzing do in Vivi's

01:18.410 --> 01:19.120
is.

01:19.460 --> 01:26.360
The more you start boom's even in the face of the power of the media tools you get a better understanding

01:26.360 --> 01:28.700
of how the got to exist.

01:28.730 --> 01:33.170
Also depending on which one Marine and visually were taken he is the expert I feared.

01:33.260 --> 01:38.260
You take the course of the next step getting you find the extract for those particular Belman if you

01:38.270 --> 01:45.290
select city the machine has a particular one of your data likker to the Soviet You didn't work so they

01:45.290 --> 01:51.320
can defeat this Ludovici skins or the target machine was running a party of up over some part of the

01:51.330 --> 01:51.710
mission.

01:51.710 --> 01:56.760
So depending on that sort of live version of the fight is over you need to find out if the machine will

01:56.760 --> 02:02.400
be level or not a days and next explained existing can be used to attack the machine.

02:02.420 --> 02:08.120
Now when it comes to finding the next boat we're on our list of our mech aspartame which contains lots

02:08.120 --> 02:08.680
of.

02:08.780 --> 02:11.790
Since it is a local repository on your machine.

02:11.910 --> 02:19.310
It is limited to the time zone updated but it's also limited to what the experts the expert team wants

02:19.480 --> 02:20.980
to get others.

02:20.990 --> 02:26.330
So at any point of Fame if we're looking for an exploit we're obviously so to the methods that are based

02:26.330 --> 02:32.320
to see if there is any use like liquor to a party for television as an engine but something is also

02:32.330 --> 02:38.600
you can go to online resources when you find information and north of exploits.

02:38.690 --> 02:42.570
So one of those examples is your take on this lipstick.

02:42.680 --> 02:44.920
So you love them but his lips are spread.

02:44.920 --> 02:46.300
Happily we've got some.

02:46.350 --> 02:48.310
You can see lots of flaps in there.

02:48.480 --> 02:52.090
And there's one Bevis's expects to browse through this.

02:52.090 --> 02:57.790
It shows your little bilious exploits right here so you guys expect get it to.

02:58.030 --> 03:02.380
Almost all the services that will be running on the machine.

03:02.480 --> 03:05.830
These are structured orderly and were in the past but we're working.

03:06.160 --> 03:13.630
Some experts are not included on the spectrum from this expert DVD say and imported into your local

03:13.630 --> 03:21.580
machine and stop using it to the entire spectrum once you can define which exploit you one big machine.

03:21.640 --> 03:24.990
Denise stack is obviously expecting that particular in.

03:25.130 --> 03:31.320
Now we have already seen in our previous sections there were disposed of are Democrats of part.

03:31.570 --> 03:37.550
How any exercise can be used to gather the machine and then finally leaking in nexus.

03:37.630 --> 03:42.310
So Joel I don't have to give you are they more of a deal in the movies can be exploited.

03:42.370 --> 03:45.660
You've already gone through that in detail in a previous post.

03:45.760 --> 03:49.490
So using that same process you are dealing with machines.

03:49.600 --> 03:55.690
So they love you as a quick recap of of the Tigard scoping the information gathered from the plane itself

03:55.970 --> 03:58.060
the computer or just fly.

03:58.140 --> 04:04.740
Once you start the activity you see what kind of offers and kind of when the video entered and be fine.

04:04.900 --> 04:10.630
And then finally based on the visitor any of those then it can be expected that using ping looks like

04:11.090 --> 04:11.560
this.

04:11.690 --> 04:17.950
So once all the activities over in ones all the one becomes ever identified and has been exploited you

04:17.950 --> 04:23.740
finally prepare the documentation of the report in the next week or two or discuss about the recommendation.

04:23.760 --> 04:25.650
But you did think.
