1 00:00:00,510 --> 00:00:04,710 Welcome to the practical walkthrough on reflective loading. 2 00:00:05,790 --> 00:00:13,610 So you should have already got this folder from the previous lesson and you're now going to build the 3 00:00:13,760 --> 00:00:24,210 Yale and deal is the main finalist this one and the compile script is this one. 4 00:00:25,530 --> 00:00:29,670 So this thing should have already got the shellcode in you. 5 00:00:30,780 --> 00:00:37,740 If you don't have a shortcut, you would have to get Nesirky and convert it into proper for me. 6 00:00:37,950 --> 00:00:44,730 And this copy this and put it inside your reflective Yale. 7 00:00:47,440 --> 00:00:47,950 Over here. 8 00:00:48,820 --> 00:00:54,550 So this shellcode is Microsoft Paint show, could you rejoin you open Microsoft Paint? 9 00:00:55,590 --> 00:01:03,600 He was created using Metasploit Kelly, so to compile. 10 00:01:04,260 --> 00:01:13,560 We have to go to this folder so greatly and copy that path and then open x64 native tools coming from. 11 00:01:18,350 --> 00:01:20,240 Next, you change directory. 12 00:01:21,090 --> 00:01:30,670 Right, Greenpeace hit enter and used to compile script to build. 13 00:01:30,820 --> 00:01:31,940 He did, yeah. 14 00:01:33,650 --> 00:01:36,350 So he enter in the process has begun. 15 00:01:42,570 --> 00:01:44,340 Check to make sure there are no errors here. 16 00:01:45,450 --> 00:01:46,680 So in this case is fine. 17 00:01:47,130 --> 00:01:52,110 And then now you find a new far call reflective gear. 18 00:01:53,430 --> 00:01:57,810 So the next thing to do is to encrypt it using in spite of the script. 19 00:01:58,710 --> 00:02:01,230 So you run the Python script. 20 00:02:02,220 --> 00:02:04,050 You need to attack the Python interpreter. 21 00:02:04,080 --> 00:02:14,910 In this case, I'm using Python 3.7, followed by the name of the script, followed by the media and 22 00:02:15,020 --> 00:02:16,020 you run to encrypt. 23 00:02:17,040 --> 00:02:24,150 So the air is reflective, then you then redirect the output to a text file. 24 00:02:24,840 --> 00:02:30,450 So we put the redirect operator and type in encrypted. 25 00:02:33,020 --> 00:02:34,790 He actually hit enter. 26 00:02:41,670 --> 00:02:42,360 No, he's done. 27 00:02:43,020 --> 00:02:46,890 There should be a new father and could take over here. 28 00:02:47,970 --> 00:02:53,770 So if you were disappointed, you'd be able to see the father. 29 00:02:53,780 --> 00:02:58,950 I want to use one of the previous one eighty so I can deal with one. 30 00:03:02,020 --> 00:03:03,930 So now you can open this and keep. 31 00:03:05,620 --> 00:03:15,010 The last place you find out two areas, one is your key and the other is your bed, which has been encrypted 32 00:03:15,190 --> 00:03:16,150 using this key. 33 00:03:17,430 --> 00:03:19,410 So let's create a space between the two. 34 00:03:19,470 --> 00:03:23,620 We are going to copy each one of them into your toilet. 35 00:03:24,690 --> 00:03:33,170 So now head over to the Trojans, you will find the two fast Nashville compound and reflect the trillion 36 00:03:33,300 --> 00:03:33,830 CP. 37 00:03:33,900 --> 00:03:34,900 This is a mean region. 38 00:03:36,450 --> 00:03:40,170 So directly in opening is not bad plus plus. 39 00:03:41,430 --> 00:03:47,130 And then over here, if you scroll down, you will find the location you need to place your. 40 00:03:49,340 --> 00:03:49,820 Over here. 41 00:03:51,680 --> 00:03:56,000 So copy of Peter from his father. 42 00:03:59,820 --> 00:04:06,530 Right click copy and then come over here, select all this 43 00:04:09,260 --> 00:04:12,140 and then paste below their copy. 44 00:04:15,170 --> 00:04:21,080 So this is the parents school all the way to the right to make sure you have got everything down. 45 00:04:24,300 --> 00:04:26,610 It should be a semicolon at the end of the array. 46 00:04:30,690 --> 00:04:35,790 Now, do the same thing for Ricky, so Copia a key. 47 00:04:42,140 --> 00:04:50,480 And pasty encryption, the decryption key, did you call this ABC here? 48 00:04:50,520 --> 00:04:51,890 Me, sure, they sent me every day. 49 00:04:53,580 --> 00:04:58,940 Now remember to save the farm and now they are going to build the Trojan. 50 00:04:59,750 --> 00:05:05,930 So you need to navigate through destroying folder type CD, followed by the name of the folder. 51 00:05:07,430 --> 00:05:09,830 And then you can use to compile Trojan. 52 00:05:09,830 --> 00:05:21,170 That script to build a Trojan enter and you're gonna hear is now to run it. 53 00:05:22,010 --> 00:05:32,420 I need to do is that the name of the Trojan is very effective to you, and you can enter. 54 00:05:35,830 --> 00:05:46,540 A your pain program stats up, so it is how you going out and doing your you using reflective dial technology? 55 00:05:47,560 --> 00:05:48,520 Thank you for watching.