1 00:00:00,060 --> 00:00:01,170 So what is in this video? 2 00:00:01,200 --> 00:00:07,710 We are going to talk about this massive concert and this is where we use the metal spread so much because 3 00:00:07,710 --> 00:00:12,580 we are using we can use the expressions of terrorist and other models as well. 4 00:00:13,020 --> 00:00:19,020 So I need to take this massive concert and the concert will start up. 5 00:00:20,790 --> 00:00:22,650 It takes some time. 6 00:00:33,960 --> 00:00:41,150 So as you can see, there is a banner of attack and you can see the medals by the Russian Federation 7 00:00:41,160 --> 00:00:48,390 and there are two thousand nine X-Rite currently as of 2020 as a decision making and one zero nine six 8 00:00:48,390 --> 00:00:55,350 artillery modules and 343 post expedition modules and 562 payloads and foreign correspondents and seven 9 00:00:55,350 --> 00:00:56,400 Invision modules. 10 00:00:56,880 --> 00:00:58,320 So you can use all of this. 11 00:00:58,920 --> 00:01:04,440 First, I want to verify whether my database has been corrupted using DV and, of course, status. 12 00:01:07,390 --> 00:01:12,520 And there we go, we go back to help to see what I would recommend. 13 00:01:12,550 --> 00:01:18,970 We can take this from a council, can see this is a massive fight greater than this, prompting asking 14 00:01:18,970 --> 00:01:20,440 for comments. 15 00:01:21,310 --> 00:01:27,760 They can see there are so many comments over here can just display the banner, change the color and 16 00:01:27,760 --> 00:01:36,100 character, hold an excerpt and get the output and the plugin. 17 00:01:36,100 --> 00:01:44,500 And we can use this loads with a particular plugin if you want to load the president manually. 18 00:01:44,530 --> 00:01:53,320 And you can also use the under command to unload this plugin console and you can set some variables 19 00:01:53,320 --> 00:01:56,500 and so on, we can do almost all of the stuff. 20 00:01:57,890 --> 00:02:04,080 And this is going to be the basic and in the future we use in any other sections if we use matters, 21 00:02:04,090 --> 00:02:07,280 but then we will see see all these comments. 22 00:02:08,000 --> 00:02:16,120 So first of all, first I want to show you banner, which displays the banner when we saw a sign for 23 00:02:16,360 --> 00:02:19,530 the symbol, and that is one banner and this is one banner. 24 00:02:20,020 --> 00:02:21,250 And I love this year. 25 00:02:21,850 --> 00:02:25,720 And if we take the banner again, we get the different banner a different time. 26 00:02:25,930 --> 00:02:27,910 So these banners are already preloaded. 27 00:02:29,440 --> 00:02:29,910 All right. 28 00:02:29,920 --> 00:02:38,050 First we need we can search through this, exploit Bertelsen, etc. To do that, we need to search and 29 00:02:38,050 --> 00:02:39,580 we need to do the search query. 30 00:02:39,700 --> 00:02:47,110 So first, before that, we see the helpage of this search and search options, keywords you so we can 31 00:02:47,110 --> 00:02:54,010 do the same options and we can see the according to the particular keywords. 32 00:02:54,010 --> 00:03:00,060 You can do more just to say other than my decision by this order and not data regarding the particular 33 00:03:00,100 --> 00:03:04,180 picture and particularly the description, you can also do this. 34 00:03:04,510 --> 00:03:05,960 You're using the sea. 35 00:03:06,580 --> 00:03:11,370 So let me search for a bad blue. 36 00:03:11,830 --> 00:03:17,040 This is a Web server and we can decide on some pre exploits. 37 00:03:17,590 --> 00:03:23,060 And if you see such bad blue, we got this to exploit exploit windows. 38 00:03:23,080 --> 00:03:25,100 It should be bad blue explorer. 39 00:03:25,150 --> 00:03:31,150 And so these are Ranko Grid and description. 40 00:03:31,150 --> 00:03:39,700 We have got the description here and you can see the first index is zero for this awful and one for 41 00:03:39,700 --> 00:03:41,210 this pastor. 42 00:03:42,520 --> 00:03:50,020 So we can also search for such APIs equals to exploit. 43 00:03:52,190 --> 00:03:53,590 So bad blood. 44 00:03:56,740 --> 00:04:02,440 So it's similar to this because these two are experts and we are schooled in the expert category only, 45 00:04:03,580 --> 00:04:07,880 so now type that type auxiliary or. 46 00:04:10,500 --> 00:04:14,670 Think it's auxillary, agree that says can. 47 00:04:17,590 --> 00:04:18,820 I read support. 48 00:04:22,870 --> 00:04:29,470 So it's auxiliary, so you can see we get all the scanners with the pertinent. 49 00:04:32,540 --> 00:04:41,040 There we go and we can see police can there are so many production models they can use in the descendants 50 00:04:41,060 --> 00:04:44,450 of conservancies since canticles can get an extra. 51 00:04:50,450 --> 00:05:02,210 So we can search through these categories with this search option, consent, search payloads and a 52 00:05:04,340 --> 00:05:06,500 binder endoscopically. 53 00:05:09,540 --> 00:05:10,310 The turbine. 54 00:05:15,010 --> 00:05:24,490 OK, OK, but you can see the there you can see are the ballots with so let me say TCP. 55 00:05:28,490 --> 00:05:38,110 So you can we got the various, uh, platforms by DP and also various, uh, functionality of this point, 56 00:05:38,180 --> 00:05:44,840 anticipate, uh, Peller and see the payroll in Python in our language, in ruga language and windows, 57 00:05:45,830 --> 00:05:52,200 and in the same way we can take reverse underscored people to check the DP. 58 00:05:52,880 --> 00:05:53,710 Yes, there you go. 59 00:05:53,720 --> 00:05:56,330 You can see there are a lot of DP modules. 60 00:05:57,730 --> 00:06:05,650 So we can also go through this, uh, search, uh, to get multiple values are to get their desired 61 00:06:05,650 --> 00:06:12,160 very detailed values so I can say search exploits. 62 00:06:14,830 --> 00:06:21,250 We will need to put the group before this, such a group for Bear Blue. 63 00:06:24,950 --> 00:06:31,640 And you can see there is an exploit, uh, expert with the bad will pass through and you can also see 64 00:06:31,810 --> 00:06:35,990 approval from so we can also see the. 65 00:06:38,410 --> 00:06:41,010 Such for such an auxiliary. 66 00:06:44,370 --> 00:06:46,350 And grep for a. 67 00:06:50,600 --> 00:06:59,540 So this group is very nice, if you want to if you don't know exactly the name, but you want to, uh, 68 00:06:59,780 --> 00:07:08,110 say the name will be in somewhere of this, uh, full part can see the Potkin acts in TGP, Xmas, etc., 69 00:07:09,490 --> 00:07:10,280 so. 70 00:07:15,430 --> 00:07:22,480 So much for that, and in order to use this model, you need to say use and you need to mention the 71 00:07:22,480 --> 00:07:24,790 number of this model, let's say one. 72 00:07:25,390 --> 00:07:32,170 And you can also, uh, copy this value and you can put it in here. 73 00:07:32,980 --> 00:07:39,700 And if you enter now, you can see the prompt need to exploit and the window should be blue pastel. 74 00:07:40,090 --> 00:07:43,600 And it means that we are using this exploit right now. 75 00:07:44,440 --> 00:07:47,410 So you can show options. 76 00:07:47,440 --> 00:07:50,500 There are some options for these exploits. 77 00:07:50,500 --> 00:07:58,630 We can set these options like remote Holston localhost, etc. So as you can see, there are some few 78 00:07:58,630 --> 00:08:01,000 options for this, but we expect our hosts. 79 00:08:01,180 --> 00:08:02,550 We need to set this target. 80 00:08:02,950 --> 00:08:09,550 That means our target computer must turn this bad software and our port is 80 because it's a Web server. 81 00:08:09,550 --> 00:08:15,500 And as a result, we can also, uh, we can set out we can also on these options because you can see 82 00:08:15,500 --> 00:08:15,640 it. 83 00:08:16,140 --> 00:08:16,460 Yes. 84 00:08:16,660 --> 00:08:17,680 So you need to. 85 00:08:17,680 --> 00:08:20,870 Compulsories said these options before running the exploit. 86 00:08:21,220 --> 00:08:25,630 You did not set this recordists options that I expect will not run. 87 00:08:26,980 --> 00:08:33,490 OK, now I will go to go back from this expert to normal MSFC prompt. 88 00:08:33,490 --> 00:08:37,550 You need to take the back so you can see the problem has been changed. 89 00:08:38,290 --> 00:08:48,970 Now if I search for that again, now let me uh use using the no use one and I can see the same expert 90 00:08:48,970 --> 00:08:49,750 we are using now. 91 00:08:50,440 --> 00:08:53,200 And one more comment is sure targets. 92 00:08:53,620 --> 00:09:00,250 It will show this exploit will show you the target uh which is capable of exploiting those targets, 93 00:09:00,250 --> 00:09:05,350 can see exploited targets and this expert can work in these two targets. 94 00:09:05,350 --> 00:09:07,190 That is worth two points are universal. 95 00:09:08,440 --> 00:09:16,030 OK, it's very important to know that target because sometimes these exploits can work on different 96 00:09:16,030 --> 00:09:16,900 operating systems. 97 00:09:16,900 --> 00:09:26,110 And if you don't know, you can just take the short targets to know about this, uh, target and let 98 00:09:26,110 --> 00:09:27,550 me show these options. 99 00:09:27,700 --> 00:09:28,870 So options. 100 00:09:29,980 --> 00:09:36,490 So in order to set this are, uh, variable, you need to set our horse. 101 00:09:38,860 --> 00:09:40,350 Let's 192 the. 102 00:09:42,970 --> 00:09:46,310 So we are we are not performing the actual expected. 103 00:09:46,350 --> 00:09:51,190 No, I'm just showing the syntax so you can see this set our house, this IP address. 104 00:09:51,400 --> 00:09:57,280 And if I make the show up again and as you can see, the value of our host countries diverters, we 105 00:09:57,290 --> 00:10:06,130 have said in this comment and to answer, these are hosts, I want to create this aHUS where you need 106 00:10:06,130 --> 00:10:07,720 to answer our host. 107 00:10:09,700 --> 00:10:14,820 Now, if you like the show options, again, you can see the value has been removed. 108 00:10:16,630 --> 00:10:22,430 OK, now there is another option that you said, gee, do you forget what it means when you are multiple, 109 00:10:22,450 --> 00:10:28,700 when you're working with the same host, multiple time, multiple exploits, you need to set this aHUS 110 00:10:28,750 --> 00:10:29,570 for every expert. 111 00:10:29,590 --> 00:10:31,660 So in that case, it is timeless. 112 00:10:31,930 --> 00:10:36,160 I so you can say it said Gee, said you global. 113 00:10:36,190 --> 00:10:38,050 And if you say so, I will. 114 00:10:40,900 --> 00:10:41,920 So no. 115 00:10:44,030 --> 00:10:56,390 Now my house will be set, so I know what I'll do is I'll go back and I will use one if I do the show 116 00:10:56,390 --> 00:10:57,080 options again. 117 00:10:58,280 --> 00:11:00,890 Now my house is also set. 118 00:11:01,550 --> 00:11:06,050 That means you are setting global with our house value to this IP address. 119 00:11:06,050 --> 00:11:08,390 So you need to exploit that uses this. 120 00:11:08,390 --> 00:11:12,740 Our house value will have this value of this IP address. 121 00:11:13,670 --> 00:11:18,890 So let's said, gee, one set back this our house. 122 00:11:21,330 --> 00:11:25,300 So if I showed options, you can see that Rosemary has been removed. 123 00:11:25,680 --> 00:11:33,400 So if you are working with one one computer and if you want to do the multiple exploits, then this 124 00:11:33,420 --> 00:11:36,920 lady is very much helpful. 125 00:11:39,380 --> 00:11:47,270 And I want to show another comment that is uncommon, so this run command actually runs the exploit. 126 00:11:49,980 --> 00:11:57,450 So in this case, we do not cedarhurst that we failed, but in later years we said these are holes and 127 00:11:57,450 --> 00:11:58,470 we do a. 128 00:11:59,370 --> 00:12:03,000 And then I would expect, will we, uh, run successfully? 129 00:12:03,000 --> 00:12:12,090 Then we will get a reversal to us and to see the sessions, that means a session will be created when 130 00:12:12,090 --> 00:12:16,120 this person or the expert has been run successfully. 131 00:12:16,320 --> 00:12:23,810 And to you, you do sessions begin sessions, minister, minister for just restart those sessions. 132 00:12:23,820 --> 00:12:25,710 You can see there is no accusations. 133 00:12:26,580 --> 00:12:31,000 In some cases there will be accusations whenever our expert has been successful run. 134 00:12:31,380 --> 00:12:36,180 In that case, we need to secessions sessions minus I interact with. 135 00:12:36,480 --> 00:12:37,830 There will be a number with this. 136 00:12:37,830 --> 00:12:38,940 I need to type one. 137 00:12:40,410 --> 00:12:43,740 So in very session I didn't for one, because there is no accusations. 138 00:12:43,740 --> 00:12:50,460 If there are accusations, you can interact with using sessions minus one one or the idea of the session. 139 00:12:54,890 --> 00:13:04,880 So we can interact with these sessions and we can also kill using the Chirikova, so we will discuss 140 00:13:05,480 --> 00:13:09,500 all these comments when exploding, we got expert and getting ready. 141 00:13:11,480 --> 00:13:12,950 So I got the back. 142 00:13:21,180 --> 00:13:25,770 So I think that's about the basics of the sort of. 143 00:13:26,550 --> 00:13:34,500 And also, if you want, you can also try these comments that are connected to a database you can see 144 00:13:35,310 --> 00:13:37,190 on TV underscoring map. 145 00:13:40,590 --> 00:13:47,850 So we can run the comment by using the TV on the screen, but the difference between that and not going 146 00:13:47,850 --> 00:13:53,130 to happen is that this will be automatically stirred in this postgresql. 147 00:13:55,260 --> 00:14:04,140 And we will come to those comments in the next year or two about that, and now we can also create a 148 00:14:04,140 --> 00:14:11,320 workspace like one workspace for one computer and another workspace for another computer. 149 00:14:11,580 --> 00:14:20,010 We can also check out post comment to see are the hosts that in my past been stored in a database. 150 00:14:20,730 --> 00:14:26,040 So since we do not scan any computer, we have no choice. 151 00:14:27,310 --> 00:14:36,890 You can also say once this will keep track of this hostname and their respective vulnerabilities. 152 00:14:38,340 --> 00:14:46,380 So don't worry about this out of these comments once if you practice of for some time and you get used 153 00:14:46,380 --> 00:14:46,650 to. 154 00:14:50,050 --> 00:14:56,860 So that's of this massive concert basically goes in the next few days, we'll do some practical scanning 155 00:14:56,860 --> 00:15:01,120 and an operation and then exploding and then we understand this intense.