1 00:00:00,090 --> 00:00:03,540 So is in this we are taking a look at these matters, paid my dues. 2 00:00:04,000 --> 00:00:10,860 Uh, first I will open this file manager explaining this file manager, because it will be very clear 3 00:00:10,860 --> 00:00:18,420 for you what it is for the system and the user and share and Sprite. 4 00:00:20,400 --> 00:00:28,170 So this matters for so framework forever, in some further configuration for the better and for us, 5 00:00:28,980 --> 00:00:34,550 we don't care what those for us are, we care about this is module's for now. 6 00:00:35,280 --> 00:00:40,730 And you can see there are different modules, order auxillary and Codders Aviation experts snob's. 7 00:00:40,760 --> 00:00:43,480 President Bush voted on this matter. 8 00:00:43,890 --> 00:00:44,640 I did not see. 9 00:00:44,640 --> 00:00:47,430 And a special module. 10 00:00:47,880 --> 00:00:51,560 And also I don't think there is a post module separately. 11 00:00:51,600 --> 00:00:56,880 They are already included in this X-Rite, but they are made separately. 12 00:00:57,780 --> 00:01:05,410 OK, the thrust of our question is why does these Auxilium are just content other than experts? 13 00:01:05,760 --> 00:01:13,680 So like these are what does scandals of others and not enumerations groups other than that perform? 14 00:01:13,680 --> 00:01:20,040 Only basic scanning and admiration can see if we go to the auxiliary further and you can see, uh, 15 00:01:20,730 --> 00:01:29,160 these are categorized by the different ways you can see fathers and according to various protocol for 16 00:01:29,610 --> 00:01:36,750 and you can choose any further you want and you can see the parsers and there is only one parser and 17 00:01:36,750 --> 00:01:38,000 you can see the scanners. 18 00:01:38,140 --> 00:01:42,990 And there are so many scanners over there which are reserved for particular protocol as well. 19 00:01:44,760 --> 00:01:51,510 And you can see the rational person spoofers and we on the screen action whether this will take for 20 00:01:51,510 --> 00:01:54,660 a scoring action is there or not. 21 00:01:54,670 --> 00:02:03,500 And you can see it is also easier for voice over Internet protocol, enumeration and spoofing. 22 00:02:03,840 --> 00:02:05,050 So these are pretty much it. 23 00:02:05,370 --> 00:02:07,480 These are just content. 24 00:02:07,890 --> 00:02:11,700 Are the scanners for and admiration enumerations clips. 25 00:02:12,240 --> 00:02:14,250 So you can see the second one is encoders. 26 00:02:14,280 --> 00:02:19,000 So what this does is they will include the payload. 27 00:02:19,080 --> 00:02:27,240 Actually, we had this one vulnerability pilots before and then this and will try to encode this parasite 28 00:02:27,240 --> 00:02:29,760 that the antivirus cannot detected. 29 00:02:30,300 --> 00:02:37,080 That's why we use this and called us because normal pilots can be deterred easily by the antivirus software. 30 00:02:37,320 --> 00:02:38,050 That's what we use. 31 00:02:38,070 --> 00:02:42,140 And by the way, these encoders can also be, uh. 32 00:02:43,690 --> 00:02:52,020 Uh, I didn't support to activities because these are already displayed, so normally anyone, anyone 33 00:02:52,020 --> 00:02:57,630 who returned to Earth can Karate's encoders and then according to the pattern of this encoding, they 34 00:02:57,630 --> 00:03:00,320 can just specify that these words are not. 35 00:03:01,380 --> 00:03:03,150 But we can also mix these encodings. 36 00:03:03,150 --> 00:03:08,400 You can if you go to activities and you can see there are addition and subtraction encodings and also 37 00:03:08,400 --> 00:03:14,300 make sure this is used for Unicode Chalco, too, including the Universal Circle. 38 00:03:14,740 --> 00:03:16,500 So what are these? 39 00:03:16,500 --> 00:03:17,380 Uh, charcoaled? 40 00:03:17,400 --> 00:03:25,460 We come to this Charcot's in the experiment and see, there are so many, uh. 41 00:03:28,000 --> 00:03:36,550 And as for these bailouts, you can see non alpha and and you can see the she got and this is widely 42 00:03:36,550 --> 00:03:43,390 used because it has some excellent trading and it also avoids detection by that many agencies. 43 00:03:44,080 --> 00:03:46,100 And it is also stable in Qatar. 44 00:03:46,180 --> 00:03:50,970 And you can see Unical mix and A and Exaro and Carus. 45 00:03:51,250 --> 00:03:56,290 So these are various and you can use to encode these parents. 46 00:03:56,660 --> 00:03:59,800 Don't worry about these girls will be creating the products in the future. 47 00:04:00,460 --> 00:04:02,530 And the third one is a vision. 48 00:04:02,770 --> 00:04:08,290 We have only Windows because most of the activities are running the Windows systems and we can use these 49 00:04:09,040 --> 00:04:17,680 scripts to create a payload that will almost with the Windows defender as well, along with the antivirus 50 00:04:17,680 --> 00:04:18,100 software. 51 00:04:19,000 --> 00:04:21,790 And you can see the actual main part that is exploits. 52 00:04:23,820 --> 00:04:30,660 So these experts are categorized into the way the, uh, going into the platform like Beiste platforms 53 00:04:30,660 --> 00:04:39,570 and Firefox browsers and Free BSD and Linux exploits, and you can see multi, hundreds and multiple, 54 00:04:39,570 --> 00:04:48,720 these experts will work on the multiple platforms like we use these multiple multi handler and feature 55 00:04:48,720 --> 00:04:49,190 videos. 56 00:04:49,200 --> 00:04:50,780 And I explain that later. 57 00:04:51,090 --> 00:04:54,420 And you can see the Windows Unix exploits and Windows exploits. 58 00:04:54,620 --> 00:04:58,740 You can see there are so many subcategories in the main category in Windows. 59 00:04:58,740 --> 00:05:05,970 We have so many according to the protocol and the software versions, uh, these are developed and you 60 00:05:05,970 --> 00:05:13,930 can also see some examples of exploits, as you can see all these experts are doing with the database. 61 00:05:13,980 --> 00:05:19,460 And so that means this whole framework is written in Ruby language, Ruby programming language. 62 00:05:19,800 --> 00:05:27,420 So it has been written in the Ruby programming language that one thing you need to remember and you 63 00:05:27,420 --> 00:05:34,270 cannot use the Python scripts in the model Sprite and I will tell you how to import your Python script 64 00:05:34,270 --> 00:05:36,930 into are quite an expert in this matter. 65 00:05:36,980 --> 00:05:38,580 Operator Next better. 66 00:05:38,730 --> 00:05:45,630 But generally we create some ruby template and then we'll, uh, convert that into the ruby. 67 00:05:46,200 --> 00:05:47,340 So next one is the knobs. 68 00:05:47,550 --> 00:05:50,510 These are current operations generally. 69 00:05:50,550 --> 00:05:55,590 This is used in, uh, recreate the charcoaled are the Peller. 70 00:05:55,830 --> 00:06:02,520 Then you will add some knobs, uh, the starting, uh, to make sure that your expert works freely. 71 00:06:03,300 --> 00:06:07,420 Otherwise the characters and your, uh, charcoaled can break. 72 00:06:07,980 --> 00:06:13,430 So as you can see, there are a bunch of knobs you can just specify minus an option in terms of the 73 00:06:13,440 --> 00:06:13,830 knobs. 74 00:06:14,070 --> 00:06:15,840 No need to worry about these knobs. 75 00:06:16,110 --> 00:06:18,740 And the second one and the next one is the payloads. 76 00:06:18,780 --> 00:06:20,920 You can see there are three types of payloads order. 77 00:06:22,060 --> 00:06:28,560 And if you see this payload contains binary DP and we have already seen with the Netcare, we got the 78 00:06:28,560 --> 00:06:35,370 shell from the other terminal in the same way we can get the, uh, shell from the victim's computer 79 00:06:35,370 --> 00:06:36,360 using these payloads. 80 00:06:36,630 --> 00:06:38,190 And you can see single payloads. 81 00:06:38,880 --> 00:06:40,350 There are so many types. 82 00:06:40,560 --> 00:06:49,140 These single parents are like, uh, a single shot like means you need to transfer completely payload 83 00:06:49,140 --> 00:06:51,660 into this machine and then it will execute itself. 84 00:06:52,230 --> 00:06:59,520 This thing is our agencies, because it are the expert are the payload will be in a single file. 85 00:06:59,850 --> 00:07:03,210 Uh, what this data center stage, this is four stages. 86 00:07:03,810 --> 00:07:14,020 Uh, we're try to get into the machine and then these stages try to try to get the content of this. 87 00:07:14,280 --> 00:07:15,560 As you can see, stages. 88 00:07:15,570 --> 00:07:23,460 If you go to Windows, you can see there are some pointers and these are the actual payloads stagers. 89 00:07:24,470 --> 00:07:32,710 And this stagers payloads can be acquired by stages whenever these are going to this victim. 90 00:07:33,080 --> 00:07:39,920 First, we will send these stages into this machine and these stages will try to get the status from 91 00:07:39,920 --> 00:07:41,630 our machine and then execute this. 92 00:07:41,930 --> 00:07:49,850 So the AI dominated the stages and the stages is there are certain sites, fuscus and the stages, and 93 00:07:49,880 --> 00:07:51,830 that is like Plesser part. 94 00:07:52,190 --> 00:07:55,020 And then you can just Akwei the stages from our machine. 95 00:07:55,430 --> 00:08:02,540 So in that way we can send these signals are the stages and stages and stages according to your wish 96 00:08:03,530 --> 00:08:05,180 that others are up to you. 97 00:08:06,770 --> 00:08:12,290 But I prefer the stages in stages because these things are very large in size. 98 00:08:12,740 --> 00:08:15,320 And if it fails, you need to respond to it. 99 00:08:15,470 --> 00:08:18,770 So that way we can just to the stages in stages. 100 00:08:19,700 --> 00:08:24,320 So that's what these payloads and this post can this push expedition modules. 101 00:08:24,320 --> 00:08:30,560 Just supposing we are compromising the system, you get the reverser then after what you can do with 102 00:08:30,560 --> 00:08:37,700 this and what you can do on the machine is you can use these projects where there's margin for error. 103 00:08:37,730 --> 00:08:39,380 No, it's much further. 104 00:08:39,380 --> 00:08:44,170 And you going get the proof of this collision as far as you can see. 105 00:08:44,180 --> 00:08:47,400 Let's go to the windows here and see these. 106 00:08:47,450 --> 00:08:47,740 Great. 107 00:08:49,450 --> 00:08:54,490 I asked my district to get some Rouper responded with Domitian. 108 00:08:57,190 --> 00:09:02,740 And this record will try to discover some more information from the commission. 109 00:09:03,070 --> 00:09:09,350 So these are the post exploitation models we can decode only after you compromise the commission. 110 00:09:10,150 --> 00:09:17,110 You cannot use the when the starting of this matter or any other part other than this after compromising 111 00:09:17,210 --> 00:09:18,030 the mission. 112 00:09:18,940 --> 00:09:26,730 So that's what these modules will be mainly working on these, uh, are these modules. 113 00:09:28,180 --> 00:09:35,890 So we have the auxiliary, uh, scanners for this and other enumerations groups and Korda's to encode 114 00:09:35,890 --> 00:09:44,200 these payloads article code and used to bypass the antivirus software and exploits the actual experts. 115 00:09:44,200 --> 00:09:51,910 We can run against the systems to get the reversal and the knobs are use it to bypass. 116 00:09:51,910 --> 00:09:57,880 These characters are bad characters and Perutz are the actual content. 117 00:09:57,880 --> 00:10:01,870 We send it to the computer to run them underneath. 118 00:10:01,970 --> 00:10:05,250 We get the shell out any other useful content. 119 00:10:05,260 --> 00:10:11,290 And the post contains this push exploitation module so that we can do further after getting that initial 120 00:10:11,320 --> 00:10:15,030 or the normal shell from the mission.