1 00:00:01,130 --> 00:00:09,200 Come back in the previous video, we already successfully built our gear injector and also the Makassar 2 00:00:09,200 --> 00:00:13,460 Bindel in this video, we are going to test it. 3 00:00:14,600 --> 00:00:16,730 So that is run our gear injector 4 00:00:19,550 --> 00:00:23,900 before that open process hekker so that we can monitor it. 5 00:00:28,310 --> 00:00:30,680 Currently, we see that Explorer is running. 6 00:00:32,150 --> 00:00:39,680 So our target is to inject the Microsoft, paint the air into the Explorer. 7 00:00:41,480 --> 00:00:42,750 So that is around here. 8 00:00:43,110 --> 00:00:50,960 Yeah, injector hit enter and immediately Microsoft pain pops up. 9 00:00:54,280 --> 00:01:00,550 So now if you come down to the process hekker and scroll down, you will see the Microsoft bin has been 10 00:01:00,550 --> 00:01:00,970 lunch. 11 00:01:02,200 --> 00:01:05,620 And then on top here is the parent from Microsoft, Bing. 12 00:01:07,510 --> 00:01:17,710 You can click on a now to examine the memory of the Explorer as well as the more you. 13 00:01:18,780 --> 00:01:19,820 Click on U.S. 14 00:01:21,860 --> 00:01:23,090 And you can scroll down. 15 00:01:26,960 --> 00:01:35,330 You will find it, Microsoft being DIA is being loaded into the process memory for Explorer. 16 00:01:36,560 --> 00:01:37,100 Over here. 17 00:01:39,250 --> 00:01:47,400 If you double click on it, you can go to the export stand and see that one on the export function, 18 00:01:47,410 --> 00:01:48,600 these ramshackle. 19 00:01:55,990 --> 00:01:58,510 If you come to the SARS-CoV-2 court, you can see. 20 00:01:59,770 --> 00:02:02,530 This is the one I spotted function. 21 00:02:06,510 --> 00:02:09,210 Now let's go to the memory for Explorer. 22 00:02:11,410 --> 00:02:20,050 And then here, if you go to the output, you can see that in their memory allocated, he had to force 23 00:02:20,260 --> 00:02:21,460 a holiday for zero. 24 00:02:24,500 --> 00:02:32,860 So we come here and scroll down, look for the address to foresee for the four zero is easy to find 25 00:02:32,870 --> 00:02:37,280 because a protection column is sure is readable and writable. 26 00:02:38,300 --> 00:02:41,630 So all you can do is scroll down until you see RW. 27 00:02:46,350 --> 00:02:50,790 Then look for two forces, followed by four zero. 28 00:02:53,470 --> 00:02:54,160 Which is here. 29 00:02:55,550 --> 00:03:01,340 Readable and right in the double click on this and you will see the path to the URL. 30 00:03:01,760 --> 00:03:04,760 There has been injected by know the Vitruvian. 31 00:03:06,100 --> 00:03:18,010 So this FARHOOD Yeah, it's coming from your Malaby region, which is the idea injector and it is referring 32 00:03:18,010 --> 00:03:19,480 to this park. 33 00:03:20,990 --> 00:03:23,540 So this was injected into Explorer. 34 00:03:27,820 --> 00:03:32,110 Over here, over here, race. 35 00:03:33,990 --> 00:03:36,000 Two for C, four of four zero. 36 00:03:38,100 --> 00:03:49,050 So it was injected, the Guerrieri Motor API costs the explorer over here greatly more high cost in 37 00:03:49,260 --> 00:03:55,290 Explorer to use the law library function to look the deal based on this stuff. 38 00:03:55,920 --> 00:03:57,240 And it was the hours load. 39 00:03:57,270 --> 00:04:00,710 It shows the Microsoft being AC. 40 00:04:01,990 --> 00:04:06,400 So that is how you can use the injection. 41 00:04:07,270 --> 00:04:11,960 And in this case, we inject it expertly. 42 00:04:11,990 --> 00:04:12,440 I see. 43 00:04:13,060 --> 00:04:13,930 We have a deal. 44 00:04:15,550 --> 00:04:23,020 If you want to do retest the India inject a second time, you would have to restart your explorer. 45 00:04:23,830 --> 00:04:31,870 So to do that, you can use process like a click on an explorer right click and then click on restart. 46 00:04:32,560 --> 00:04:35,680 And then you can confirm if you want to restart. 47 00:04:36,310 --> 00:04:37,510 Click on the button. 48 00:04:37,510 --> 00:04:37,930 Restart. 49 00:04:39,370 --> 00:04:47,680 So you close Explorer and reopen it again next year, we have to close and reopen your coming from so 50 00:04:47,680 --> 00:04:56,560 close your command from and reopening again, and then maybe get back to your folder, which contains 51 00:04:57,100 --> 00:05:01,030 the DNA injector by copying a path. 52 00:05:04,330 --> 00:05:08,590 And coming here to change to the directory. 53 00:05:09,100 --> 00:05:19,660 Right click bait in enter and then now you try your injector again a second time into any book thinking 54 00:05:20,830 --> 00:05:23,460 this is how you restart UI spohrer. 55 00:05:23,650 --> 00:05:26,770 And we try again here, the injector. 56 00:05:27,520 --> 00:05:32,920 So this brings us to the conclusion of this section on the injection. 57 00:05:33,490 --> 00:05:35,110 Thank you for watching.