1 00:00:00,460 --> 00:00:05,640 In the previous video, we have seen that how to create an undetectable vector. 2 00:00:06,250 --> 00:00:13,000 OK, and now in this video, I will show you how to use it, how to use the back door by turning on 3 00:00:13,000 --> 00:00:15,070 all of the securities in windows. 4 00:00:15,340 --> 00:00:19,510 And you can see still are is able to bypass all of them. 5 00:00:19,720 --> 00:00:20,050 Right. 6 00:00:20,980 --> 00:00:24,610 So, as you know that this is the part for our back door. 7 00:00:25,450 --> 00:00:30,990 OK, so first of all, let's open a new terminal. 8 00:00:31,810 --> 00:00:39,700 And before executing our back door, we have to start listening both on our machine. 9 00:00:39,790 --> 00:00:46,280 That is attacker machine, because as backbone runs, it will try to connect back to our machine. 10 00:00:46,300 --> 00:00:52,210 OK, so it is important to open a port on which we want to listen, right. 11 00:00:52,660 --> 00:01:00,970 So for this, we have to use the mode from a console, because as you know that at the time of creating 12 00:01:00,970 --> 00:01:07,530 a backdoor I have selected me as a payload and meter reader is developed by my community. 13 00:01:07,900 --> 00:01:11,890 OK, so we have to foster and meet us both from a console. 14 00:01:12,010 --> 00:01:16,540 Then we will start listening on a board, which is 80 80. 15 00:01:17,200 --> 00:01:23,720 OK, so let it open and let me assure you that my Windows 10. 16 00:01:24,760 --> 00:01:27,210 So this is my window 10 virtual machine. 17 00:01:28,210 --> 00:01:35,260 And here you can see here below deck, my antivirus program is running and I am using precalculus security. 18 00:01:35,770 --> 00:01:41,770 And this is my Windows defender, which is really protection on antivirus and spyware. 19 00:01:41,770 --> 00:01:43,220 Definitions are up to date. 20 00:01:43,760 --> 00:01:49,500 OK, so I have done on security for Windows 10 right now. 21 00:01:49,510 --> 00:01:50,950 Let's go back to Cali. 22 00:01:54,330 --> 00:02:02,400 OK, so starting the Mideast road framework console, so let's start and let me open one more terminal 23 00:02:02,790 --> 00:02:07,410 and let's copy our back door to. 24 00:02:09,450 --> 00:02:17,700 It's Daniel Folden, as I told you earlier, that I'm going to use Apache Web server, which is an inbuilt 25 00:02:17,790 --> 00:02:23,070 Web server on Karley, so we can use Garley as a Web site. 26 00:02:23,220 --> 00:02:37,140 OK, so Poppy, when Lip will and then there is output compiled and then pobjie. 27 00:02:39,300 --> 00:02:43,290 Right, the new A.M. then. 28 00:02:45,480 --> 00:02:53,460 Now, I know that it is a it's not a good idea to deliver a back door using a website, but as I am 29 00:02:53,460 --> 00:02:56,330 showing, just for the demonstration purposes, I am using it. 30 00:02:56,970 --> 00:02:59,730 But in your case, you have to use your creativity. 31 00:02:59,730 --> 00:03:05,520 Maybe you use a USB drive in order to deliver a backdoor to your target system, OK? 32 00:03:06,120 --> 00:03:12,690 Or you can use e-mail attachments, etc. It's up to you to show your creativity. 33 00:03:12,960 --> 00:03:21,240 Right now here we have a massive console, so let's use. 34 00:03:22,970 --> 00:03:24,050 Exploit. 35 00:03:25,410 --> 00:03:26,850 Multi handler. 36 00:03:27,630 --> 00:03:36,810 OK, so we are using our module from the desperate framework, as Despard is a huge database for penetration 37 00:03:36,810 --> 00:03:40,740 testing, so I am using one of the modules of MLO. 38 00:03:40,950 --> 00:03:41,310 OK. 39 00:03:44,270 --> 00:03:45,920 Then, now. 40 00:03:48,980 --> 00:03:50,810 Sure, options. 41 00:03:52,520 --> 00:04:02,930 So here we can see we have to configure our local host and local ports, so select and host and then 42 00:04:02,930 --> 00:04:13,670 the idea of Garley and then set and board, which is 88, 80 done right now, let's run short options 43 00:04:13,670 --> 00:04:14,110 again. 44 00:04:15,390 --> 00:04:18,720 OK, OK, I so I made a mistake. 45 00:04:18,750 --> 00:04:22,500 First of all, we have to set a payload, right? 46 00:04:25,670 --> 00:04:30,290 So Paillard would be windows made, Peter. 47 00:04:31,780 --> 00:04:42,070 And the reverse is true, DBAs, right, this is the part I'm using, because if you remember in the 48 00:04:42,070 --> 00:04:46,240 previous video, we have created a backdoor using go programming language. 49 00:04:47,350 --> 00:04:47,660 OK. 50 00:04:47,700 --> 00:04:49,500 And the payload is made router. 51 00:04:49,900 --> 00:04:52,980 And then there is a reverse HD protocol. 52 00:04:52,990 --> 00:04:53,320 Right. 53 00:04:54,400 --> 00:04:55,900 So let's take it. 54 00:04:55,990 --> 00:04:59,380 HTP is done. 55 00:04:59,740 --> 00:05:06,820 And now let's say show options, OK, see and host and board are configured. 56 00:05:07,330 --> 00:05:10,460 OK, and this is our payload option. 57 00:05:10,510 --> 00:05:15,040 OK, we have to use the same payload as we have used at a time of great impact. 58 00:05:15,070 --> 00:05:15,490 All right. 59 00:05:16,030 --> 00:05:19,420 So guys, this is a live demonstration, OK? 60 00:05:19,570 --> 00:05:25,450 I have not done this practical before earlier and then show you the just the output side. 61 00:05:25,570 --> 00:05:27,640 So if I made a mistake, you will able to seat. 62 00:05:28,980 --> 00:05:32,280 Now, we have done our job. 63 00:05:33,450 --> 00:05:41,760 Now let's switch back to windows and let's open of browser and try to download our backdoor, so let's 64 00:05:41,760 --> 00:05:43,530 try to download our back door. 65 00:05:45,660 --> 00:05:49,430 Bob, do dot e e hit enter. 66 00:05:50,370 --> 00:05:52,200 OK, downloaded click on Run. 67 00:05:53,290 --> 00:05:57,000 And now let's switch back to Cali and type exploit. 68 00:05:58,410 --> 00:06:05,310 OK, now let's wait for our backdoor to start to jump. 69 00:06:06,300 --> 00:06:14,550 And once it started, it will use it or it will act as a normal service using Internet services in order 70 00:06:14,550 --> 00:06:17,670 to gain access to some website. 71 00:06:17,700 --> 00:06:24,620 OK, so there are very less chances that it will get caught by antivirus programs or firewalls and etc.. 72 00:06:24,630 --> 00:06:24,980 Right. 73 00:06:30,860 --> 00:06:34,600 So guys, see, it says Station one opened. 74 00:06:35,120 --> 00:06:44,210 OK, so this is how we can create an undetectable backdoor and then use it in order to gain full control 75 00:06:44,240 --> 00:06:45,920 over our target system. 76 00:06:46,100 --> 00:06:54,170 OK, it will show me the list of all files and directories present on our target computer system. 77 00:06:54,200 --> 00:07:01,340 OK, but you have noticed one thing I clicked on, ran my back door button. 78 00:07:01,520 --> 00:07:08,420 Neither the antivirus program has given me a notification that we had to divide us and neither are Windows 79 00:07:08,420 --> 00:07:11,360 Defender is able to detect this virus. 80 00:07:11,390 --> 00:07:15,310 OK, so this way we have created an undetectable backdoor. 81 00:07:15,920 --> 00:07:17,330 But let me tell you one thing. 82 00:07:17,330 --> 00:07:22,210 By the time you are watching this video, don't try to copy my steps, OK? 83 00:07:23,060 --> 00:07:29,600 Because if you do, then maybe there are chances that some antivirus programmer able to got to your 84 00:07:29,600 --> 00:07:35,030 mentor, because, as I told you, that antivirus programs are continuously updating their databases. 85 00:07:35,030 --> 00:07:35,310 Right. 86 00:07:35,720 --> 00:07:40,580 So the thing which are working right now, maybe they want to work after some time. 87 00:07:41,070 --> 00:07:47,600 OK, so use your creativity and try to modify some settings when creating a backdoor. 88 00:07:47,630 --> 00:07:53,990 OK, and if you if your back door gets caught by any activities program, then go back to Kelly again, 89 00:07:54,470 --> 00:08:01,640 try to create a new backdoor by changing different settings, like by changing sleep time to from 15 90 00:08:01,640 --> 00:08:09,230 to 25, then 54, then 61, etc. and test again and again whether this time your backdoor will pass 91 00:08:09,230 --> 00:08:11,000 antivirus program or not. 92 00:08:11,420 --> 00:08:21,650 OK, so my job is to show you how to create an undeterrable backdoor, but it's up to you to use your 93 00:08:21,650 --> 00:08:22,400 creativity. 94 00:08:22,480 --> 00:08:30,530 OK, so guys, I hope you now know that how you can create an undetectable backdoor using vill framework 95 00:08:31,130 --> 00:08:36,960 and how to perform an attack on windows in operating system. 96 00:08:37,520 --> 00:08:42,320 Now, I hope you know that if this backdoor is working on Windows, then then it means it also works 97 00:08:42,320 --> 00:08:44,750 on Windows eight and Windows seven extra.