1 00:00:00,300 --> 00:00:07,760 This video we're going to talk about, the next attack is like a poker machine to use to check for connectivity 2 00:00:08,400 --> 00:00:16,980 and also you can send us your comments and OK, and should have a defender got the real examples. 3 00:00:17,370 --> 00:00:23,790 So so it is already installed with the systems to donate. 4 00:00:23,790 --> 00:00:27,720 Then you can start with Afghanistan and see our net debt. 5 00:00:28,230 --> 00:00:36,030 And first network will try to connect to Google dot com and see minus three, minus four over both to 6 00:00:36,030 --> 00:00:37,820 see what's going on when we are counting. 7 00:00:39,480 --> 00:00:42,540 That's minus Google dot com. 8 00:00:46,320 --> 00:00:50,520 Going into space with the water transporter, so it is the observer, right? 9 00:00:50,910 --> 00:00:53,220 So it's just connection to the computer. 10 00:00:53,850 --> 00:00:54,630 It succeeded. 11 00:00:55,050 --> 00:00:58,190 Now we can just make the request. 12 00:00:58,440 --> 00:01:02,010 So we have to actually reconstruct the format. 13 00:01:02,010 --> 00:01:02,640 Is this one? 14 00:01:05,800 --> 00:01:12,700 So you don't need to take any other important parameters. 15 00:01:13,540 --> 00:01:18,280 Uh, just this is like sample test like that in the next generation. 16 00:01:18,310 --> 00:01:27,070 But if you hit enter again, then you're getting hit hard, which is the, uh, not one indicator that, 17 00:01:27,820 --> 00:01:28,230 uh. 18 00:01:29,380 --> 00:01:29,690 Yeah. 19 00:01:30,790 --> 00:01:35,190 So you can also get some other, uh, things like that. 20 00:01:35,200 --> 00:01:46,450 All you need to do is you need to type the, uh, request or requests, uh, like in I'll get it on 21 00:01:46,450 --> 00:01:50,650 point one and also the parameters, reconnection, allow to address, etc.. 22 00:01:51,250 --> 00:02:00,550 So that is one use of the net debt and the main use is, uh, using insertions so far. 23 00:02:00,680 --> 00:02:04,690 Let me show you simply cannot move another terminal. 24 00:02:08,580 --> 00:02:16,650 So that cat can be act as a server and also as a client, so to run the server, we need to type and 25 00:02:16,650 --> 00:02:23,330 see minus the variables and Elverson on the port so it isn't on the port. 26 00:02:23,730 --> 00:02:24,810 So one, two, three, four. 27 00:02:25,530 --> 00:02:31,470 So if it's a one, two, three, four, then then it will go into the server because we are giving the 28 00:02:31,470 --> 00:02:37,520 LP option, what reason and patient support and we are sitting on one, two, three, four, five. 29 00:02:37,530 --> 00:02:44,730 Intenta you can see listening on all interfaces, Jérome into our interfaces and one, two, three, 30 00:02:44,730 --> 00:02:44,990 four. 31 00:02:45,630 --> 00:02:50,790 I know I could connect to this using minus N.V. and stands for No. 32 00:02:52,470 --> 00:02:59,470 Let me tell you the IP address itself, which is our own IP address, which is one reason that zero 33 00:02:59,680 --> 00:03:04,250 zero one and the port we need to specify is one, two, three, four. 34 00:03:05,880 --> 00:03:08,040 So you can see from the in the server. 35 00:03:08,040 --> 00:03:16,230 So we got the connection from and the number four twice rate see and you can see connection to this 36 00:03:16,230 --> 00:03:17,610 server has been succeeded. 37 00:03:17,850 --> 00:03:24,610 Now if I say hi and he'd enter, you can see the messages reflected in the server, say even under Sarasate. 38 00:03:24,690 --> 00:03:30,480 If you say hello, the message will be reflected in the current. 39 00:03:30,480 --> 00:03:34,140 So you can just send some messages like this. 40 00:03:34,290 --> 00:03:39,020 So simple network characters will act as, uh, like server. 41 00:03:39,030 --> 00:03:43,200 You can just, uh, repeat the same message in the server and the. 42 00:03:47,460 --> 00:03:53,970 So I'm crossing this, so this is unusual to get. 43 00:03:59,600 --> 00:04:06,980 All right, now, another important feature is let's bring up the, again, the server and what they 44 00:04:06,980 --> 00:04:13,960 want to do is I will I can just send the files through the net, get OK. 45 00:04:14,360 --> 00:04:19,040 Let me see what are the files on my desktop? 46 00:04:21,190 --> 00:04:29,690 So we got an office in our district, let me create what I call Nikil, a red dot. 47 00:04:31,760 --> 00:04:38,680 So unless I have this, uh, expert testify, all I want to say. 48 00:04:49,690 --> 00:04:56,050 No, I want to copy the contents of this particular text file to my home territory, so I am in the 49 00:04:56,050 --> 00:04:59,920 home here and there in the service that I have. 50 00:04:59,920 --> 00:05:08,290 There is what I can do is I can say N C minus, uh, we and to present on the let's say one, two, 51 00:05:08,290 --> 00:05:08,780 three, four. 52 00:05:09,220 --> 00:05:17,140 And what I want to do is I want to say the resident operator c this resident is actually in it will 53 00:05:17,980 --> 00:05:24,500 pipe the all the contents of the specified file them into this, uh, connection. 54 00:05:24,700 --> 00:05:26,140 So let me show you this. 55 00:05:30,770 --> 00:05:38,000 So what this means is if there is any connection succeeded to get the equity in will act as this does 56 00:05:38,000 --> 00:05:40,840 not actually that means are the content of this. 57 00:05:41,180 --> 00:05:46,960 This will be sent to the connection succeeded with this, uh, Saroya connection. 58 00:05:46,970 --> 00:05:52,060 If I say hit enter now the server goes on Disney and we need to connect to this server. 59 00:05:52,930 --> 00:05:57,550 That's it's on Bernie Sanders one and one, two, three, four. 60 00:05:58,880 --> 00:06:07,580 Now, if I hit enter, we got there because all the input has been opened or sent whenever the connection 61 00:06:07,580 --> 00:06:11,070 has been succeeded and we got the ticket, but we do not want that. 62 00:06:11,090 --> 00:06:13,230 What we want is we need to store it in of it. 63 00:06:14,540 --> 00:06:20,780 So what I can do is I am spinning the server again and at the concert I can say greater than we do redirection 64 00:06:20,780 --> 00:06:28,310 operator and I can say the same people that are going to get the same name as the t shirt for. 65 00:06:29,750 --> 00:06:33,090 So the connection is accident because this connection. 66 00:06:33,740 --> 00:06:42,870 So if I say unless I can see the resemblance file, if I say can't sample the text but can see there 67 00:06:42,890 --> 00:06:42,980 is. 68 00:06:43,460 --> 00:06:45,720 So here also there is little. 69 00:06:47,090 --> 00:06:55,870 So the contents are being sent to the through this network connection, so not the firefighters not 70 00:06:55,880 --> 00:06:58,700 sent, but the contents of the file has been sent. 71 00:07:04,190 --> 00:07:13,550 So what we can do is we can emulate the, uh, reversal tradition and get what I want to say and see 72 00:07:13,550 --> 00:07:18,130 minus, we'll see one, two, three, four, and execute. 73 00:07:18,380 --> 00:07:23,690 So upon upon succeeding a conviction for this server. 74 00:07:23,840 --> 00:07:26,900 And I can execute this, say Besch. 75 00:07:29,600 --> 00:07:39,560 I read it and seen very many see so what before previous years, the option is included and then onwards 76 00:07:40,640 --> 00:07:44,210 the option is remote for security purposes that way. 77 00:07:44,710 --> 00:07:48,140 Uh, what do you want to type pseudo? 78 00:07:52,210 --> 00:07:57,700 Start and map, so if you are in the car, looks at my beautiful green shirt, you don't need to reload. 79 00:07:59,450 --> 00:08:02,750 So there is an alternative for this card and get. 80 00:08:04,820 --> 00:08:15,790 So this and get will act exactly like, uh, on a cat, but it uses some encryption from for the corrections. 81 00:08:17,030 --> 00:08:23,470 Now you can see the negatives saying like a cat is saying that it's going on. 82 00:08:24,050 --> 00:08:27,770 What I can do is I can put my neck there, so. 83 00:08:30,580 --> 00:08:31,580 One, two, three, four. 84 00:08:32,920 --> 00:08:37,230 So now there is no nothing like here, no effort here at this command. 85 00:08:37,780 --> 00:08:43,690 I can see the output because what we have done is we have been back. 86 00:08:43,930 --> 00:08:51,940 So it's like, uh, previously we have seen when I said hi, it appears as right when I said hello, 87 00:08:51,940 --> 00:08:52,500 it appears. 88 00:08:52,840 --> 00:08:58,850 But in this case, that output will be sent as an input to this execution program. 89 00:08:58,870 --> 00:09:00,810 There is no place else. 90 00:09:01,180 --> 00:09:06,690 I get this as an input and output will be sent to this OCKRENT. 91 00:09:06,700 --> 00:09:09,760 If I say, uh, who am I? 92 00:09:11,410 --> 00:09:12,250 I get the Nickey. 93 00:09:12,370 --> 00:09:18,280 So BWV I am now OK, this one is a desktop. 94 00:09:18,790 --> 00:09:24,190 So if I separate, that will be executed in this state of Florida. 95 00:09:24,550 --> 00:09:26,560 That's why we got this whole Nickey desktop. 96 00:09:28,900 --> 00:09:33,370 So, like in this way, we can emulate the reversions. 97 00:09:40,670 --> 00:09:40,960 OK. 98 00:09:42,470 --> 00:09:42,680 OK. 99 00:09:42,740 --> 00:09:51,920 Let us see the bench also potentially in the winds now of this, OK, this is the bench. 100 00:09:52,140 --> 00:09:57,620 We can also see a reversal like this minus heat, wind bash. 101 00:10:04,900 --> 00:10:08,740 So now I'm going to simply listen here. 102 00:10:17,050 --> 00:10:22,540 OK, now we, uh, got this address. 103 00:10:23,990 --> 00:10:26,130 So I need to type here, OK? 104 00:10:26,150 --> 00:10:27,920 I'm sorry, just confused about this. 105 00:10:28,250 --> 00:10:30,670 So generally we use the reversals. 106 00:10:32,310 --> 00:10:40,110 So I hope you are clear about this, Rorschach's know what we can do is we can pivot using this net, 107 00:10:40,110 --> 00:10:45,340 get so pivoting in the sense they will be your attacking machine. 108 00:10:45,540 --> 00:10:48,720 So let me say, this is an attack. 109 00:10:52,730 --> 00:11:01,350 And this one mission is and this terminal is from the machine you have successfully, uh, hacked or 110 00:11:01,370 --> 00:11:12,180 you got the control of the machine and this terminal here, I want to, uh, get the oil from this terminal. 111 00:11:12,950 --> 00:11:16,850 Let's assume that these three terminals are different computers. 112 00:11:16,880 --> 00:11:20,120 This is my Ettakatol machine and this is the machine. 113 00:11:20,120 --> 00:11:23,690 I have just got the shell on it so I can control this machine. 114 00:11:24,020 --> 00:11:27,200 But this machine, I have no connection from it. 115 00:11:27,320 --> 00:11:33,660 I can access I can just, uh, ping only through this machine. 116 00:11:33,680 --> 00:11:36,520 So these two machines have the connectivity. 117 00:11:36,530 --> 00:11:40,340 But my machine attack machine and this machine does not have connectivity. 118 00:11:40,790 --> 00:11:47,390 So in that case, what we can do is we can just send up our input. 119 00:11:47,390 --> 00:11:55,490 That is the command to this turmoil and this terminal will send our input to send a command to disturber. 120 00:11:55,670 --> 00:11:58,610 And this will execute the Basche I mean, bin Bash. 121 00:11:58,610 --> 00:12:04,710 And then it was an output to disturber and it will send the final push to this terminal. 122 00:12:04,940 --> 00:12:09,040 So it's like executing the comments on this particular. 123 00:12:09,350 --> 00:12:11,370 So that's it sounds confusing. 124 00:12:11,400 --> 00:12:17,170 OK, let me just show you the demo, let's say, and see minus here. 125 00:12:18,320 --> 00:12:28,520 So we want to use a cat and cat and I want to say four four four four and execute with Besch. 126 00:12:34,270 --> 00:12:40,880 So I will be in the desktop so that you guys can see the difference. 127 00:12:40,900 --> 00:12:43,120 I'll be in the home folder for this. 128 00:12:52,210 --> 00:13:01,720 So my I want to pound this machine that way, what I can do is I'm in a desktop and I have a spin of 129 00:13:01,730 --> 00:13:03,600 the neck. 130 00:13:03,850 --> 00:13:08,340 And whenever any correction gets to this, uh, we can execute the currents on it. 131 00:13:09,700 --> 00:13:17,830 So let me come to this one so and see, first, we need to connect to this machine. 132 00:13:17,830 --> 00:13:18,140 Right. 133 00:13:18,580 --> 00:13:20,920 So for that, we need to set up a laser on this. 134 00:13:21,170 --> 00:13:25,900 That's minus will be on one, two, three, four. 135 00:13:28,800 --> 00:13:38,700 And we are connecting to this machine, as in C minus and V two, one, two, three, four, whatever 136 00:13:38,880 --> 00:13:47,430 I tape after this corrections accident, then it will be sent to this, uh, uh, center, to this terminal. 137 00:13:47,610 --> 00:13:55,020 So what I will do is I will pipe that or put into this connection so I can do this and C minus. 138 00:13:55,020 --> 00:14:02,050 And we won 27 zero zero zero one and four four four four. 139 00:14:02,730 --> 00:14:10,200 So what this does what this means is I will enter commands here and it will be sent to this terminal 140 00:14:10,350 --> 00:14:16,390 because we are receiving here and that output will be sent to this connection. 141 00:14:17,010 --> 00:14:23,700 So this connection in here, it is residing on four four four four an executive so that output will 142 00:14:23,700 --> 00:14:24,480 be sent to this. 143 00:14:24,780 --> 00:14:29,810 And this will execute the whatever command we type here and it will send output. 144 00:14:30,240 --> 00:14:32,530 Right now we get this output here. 145 00:14:32,820 --> 00:14:38,370 So how to send this to attack Iran, which means we need to set up another receiver because we cannot 146 00:14:38,370 --> 00:14:44,980 send to this one, two, three, four, because that port is busy in connecting to this machine. 147 00:14:45,000 --> 00:14:48,810 So I will create another open another terminal. 148 00:14:49,380 --> 00:14:53,370 And I will this is also my attacker. 149 00:14:53,700 --> 00:14:56,940 So these are my computers attack at a customer. 150 00:14:56,940 --> 00:14:57,210 Right. 151 00:14:57,510 --> 00:15:01,320 And C minus will be ready for tomorrow. 152 00:15:01,350 --> 00:15:02,140 Fine, fine, fine, fine. 153 00:15:04,050 --> 00:15:16,320 So now I got this output here and pipe it to this terminal and see what I'm typing and C minus. 154 00:15:17,640 --> 00:15:21,420 And we on 27, not zero one. 155 00:15:24,380 --> 00:15:26,470 Not one five five five. 156 00:15:28,130 --> 00:15:36,220 So in my case, I'm just showing you in the one machine like one that is under duress, but they are 157 00:15:36,260 --> 00:15:36,940 those changes. 158 00:15:37,200 --> 00:15:44,840 So what do you want to put your attacker's IP address that is yours in this in this box and then in 159 00:15:44,840 --> 00:15:45,200 this state? 160 00:15:45,310 --> 00:15:48,710 Don't you need to pull that up by automation? 161 00:15:48,710 --> 00:15:55,700 That is another machine here and then attack information here so fast disagrees with me and then we 162 00:15:55,700 --> 00:15:57,110 need to execute this one. 163 00:15:58,520 --> 00:16:06,640 As you can see, some connections are already character, and I trust I need to execute this one. 164 00:16:07,400 --> 00:16:10,460 So now everything is in character. 165 00:16:10,490 --> 00:16:16,430 If I take place, I need to I will get I should get the contents of the desktop. 166 00:16:16,430 --> 00:16:16,590 Right. 167 00:16:18,350 --> 00:16:24,310 So, as you can see, we got the contents of the desktop system, the text for the first repeatably 168 00:16:24,860 --> 00:16:26,480 you can see home Neki desktop. 169 00:16:28,650 --> 00:16:32,730 So this is the same computer that so you don't see that much difference. 170 00:16:34,000 --> 00:16:34,410 Who am I? 171 00:16:34,440 --> 00:16:35,100 This is Mickey. 172 00:16:36,450 --> 00:16:45,750 So as you can see, first, if I type the command, then dispute over the command will be sent to this, 173 00:16:46,650 --> 00:16:47,860 uh, lasering server. 174 00:16:48,300 --> 00:16:53,890 And what we have done is we are piping this output to this connection, which is this one. 175 00:16:54,720 --> 00:17:01,200 So what this does is it will execute as a bin bash command and then it will send the output to this 176 00:17:02,010 --> 00:17:03,120 back to the stigma. 177 00:17:03,300 --> 00:17:06,600 And we are sending that output to back to my attacker machine. 178 00:17:06,620 --> 00:17:09,030 But on the front, that is fine. 179 00:17:09,930 --> 00:17:13,380 That's what we are getting the whole output in this five point five. 180 00:17:15,680 --> 00:17:17,570 So lovely home, Nicky desktop. 181 00:17:18,980 --> 00:17:26,360 So I think that's you know, if you understand this smart, you can just simply create reversions. 182 00:17:26,960 --> 00:17:32,310 So in so many computers, you may have to do that. 183 00:17:33,230 --> 00:17:45,470 So if I what if my cat has not been installed so I don't need a cat in the cat with inversions, e option 184 00:17:45,470 --> 00:17:48,360 has been removed, so there is no alternative. 185 00:17:48,380 --> 00:17:51,140 I will discuss when in the 186 00:17:53,870 --> 00:17:55,670 appropriate discretion section. 187 00:17:56,570 --> 00:18:01,720 So and then you use the unique of, uh, the virtual concept. 188 00:18:01,970 --> 00:18:06,620 So no need to just, uh, depend on the NC minus the option. 189 00:18:06,620 --> 00:18:11,960 You can just create a washer using this, uh, reverser pillar of the Unix version. 190 00:18:12,950 --> 00:18:17,600 So I will tell you that in the operating process creation section. 191 00:18:17,600 --> 00:18:19,100 So no need to worry about this. 192 00:18:19,670 --> 00:18:24,310 If you want if you understand this one, you will get almost nine. 193 00:18:24,410 --> 00:18:26,350 You almost got 90 percent organic. 194 00:18:27,350 --> 00:18:29,980 So that's what I hope you have understood.