1 00:00:01,470 --> 00:00:07,080 Before we jump into the practical testing and hacking, there are some terms that we must be familiar 2 00:00:07,080 --> 00:00:07,530 with. 3 00:00:10,240 --> 00:00:15,730 When the ability is a design, coding or logical flaw affecting the target system, exploitation of 4 00:00:15,730 --> 00:00:21,370 a vulnerability concern in disclosing confidential information or allowing the attacker to execute code 5 00:00:21,370 --> 00:00:22,540 on the target system. 6 00:00:23,920 --> 00:00:30,100 An exploit is a piece of code that uses a vulnerability pattern on the target system to perform a malicious 7 00:00:30,100 --> 00:00:30,820 operation. 8 00:00:35,180 --> 00:00:38,030 Payloads are the cores that will run on the system. 9 00:00:38,240 --> 00:00:43,400 Exploits will leverage availability on the target system, but to achieve the desired result, we need 10 00:00:43,400 --> 00:00:44,180 a payload. 11 00:00:44,480 --> 00:00:50,090 Examples could be getting a shell, loading a malware or backdoor to the target system, but it can 12 00:00:50,090 --> 00:00:56,000 be running a command or launching calculator as a proof of concept to add the testing test report. 13 00:00:57,590 --> 00:01:03,020 Starting the calculator on the target system remotely by launching the calculator application is a benign 14 00:01:03,020 --> 00:01:06,260 way to show that we can run the commands on the target system. 15 00:01:07,850 --> 00:01:14,370 Exploitation is establishing access to a system machine by bypassing security restrictions for apprenticed 16 00:01:14,640 --> 00:01:18,240 exploitation, is gaining access to a machine to run commands on it. 17 00:01:18,690 --> 00:01:24,240 We are interested in the piece of code that makes a target machine do something on behalf of an attacker 18 00:01:24,240 --> 00:01:25,650 against the vulnerabilities. 19 00:01:30,960 --> 00:01:36,650 Encoders encode the exploit and payload in the hope that a signature based antivirus solution makes 20 00:01:36,660 --> 00:01:37,140 them. 21 00:01:37,710 --> 00:01:42,450 Signature based antivirus and security solutions have a database of known threats. 22 00:01:43,270 --> 00:01:48,870 They detect threats by comparing suspicious file to this database and raise an alert if there is some 23 00:01:48,880 --> 00:01:49,480 match. 24 00:01:50,340 --> 00:01:55,380 Thus encoders can have a limited success rate and antivirus solutions can perform additional checks 25 00:01:55,380 --> 00:01:56,010 as well. 26 00:02:00,190 --> 00:02:02,210 What encoders encode the payload. 27 00:02:02,230 --> 00:02:06,280 They should not be considered a direct attempt to evade the antivirus software. 28 00:02:06,970 --> 00:02:11,470 On the other hand, evasion modules will try that with more or less success. 29 00:02:14,220 --> 00:02:15,790 That's all for this lecture. 30 00:02:15,810 --> 00:02:17,610 And see you in the next lecture.