1 00:00:00,900 --> 00:00:06,240 All right, guys, now in this video, we're going to see about the file transfers, so first, if you 2 00:00:06,240 --> 00:00:12,600 got the shell from the commission, so there'll be some situations where you need to transfer the files 3 00:00:12,600 --> 00:00:13,510 from your car. 4 00:00:13,530 --> 00:00:15,660 Your next mission to the commission. 5 00:00:15,810 --> 00:00:22,590 So it was like a linchpin script or any other enumerations group which use you some other preregistration 6 00:00:22,590 --> 00:00:23,790 or some other advantage. 7 00:00:24,000 --> 00:00:32,640 So to transfer that file to the commission, you need to set up some servers in the corridor so that 8 00:00:32,640 --> 00:00:39,430 you can access the files with those clients in the, uh, with the mission. 9 00:00:39,840 --> 00:00:43,050 So first, what we want to do is we are going to install this. 10 00:00:43,560 --> 00:00:45,120 We have people in server. 11 00:00:49,650 --> 00:01:00,750 So Peiping, uh, should have been, shall we SFP peaty, so this is, uh, FPP server software, which 12 00:01:00,750 --> 00:01:07,890 is already installed in the current Linux and now run this, uh, previously before the out of the studio. 13 00:01:08,070 --> 00:01:10,160 And it has updated to the newer version. 14 00:01:11,640 --> 00:01:18,450 So one thing you need to change for this to release, you need to go to Sudan and all. 15 00:01:19,110 --> 00:01:24,090 I need to go to it, see and we to that configuration. 16 00:01:24,360 --> 00:01:29,260 So in this configuration file, you need to, uh, set this anonymously. 17 00:01:29,640 --> 00:01:30,570 And I will do. 18 00:01:31,170 --> 00:01:32,520 Yes, by default. 19 00:01:32,520 --> 00:01:39,720 It will be in the you need to set it to us so it will access the anonymous have to be that on the client 20 00:01:39,720 --> 00:01:44,040 and the victims personally will just simply download without any authentication. 21 00:01:44,580 --> 00:01:46,590 So that's what this setting is for. 22 00:01:46,600 --> 00:01:47,460 You put it as? 23 00:01:47,460 --> 00:01:49,100 Yes, by default it's not. 24 00:01:50,250 --> 00:01:51,840 So we need to start this. 25 00:01:51,900 --> 00:01:54,000 We have to release Sara. 26 00:01:55,020 --> 00:02:09,150 So need to to the service we use of the pre and start and he turned up OK of my years of Tripoli has 27 00:02:09,150 --> 00:02:10,170 been started. 28 00:02:10,440 --> 00:02:15,940 I will say this is, uh, this is my, uh, victims. 29 00:02:16,530 --> 00:02:21,470 Let's assume that and I can say fpp IP address of this mission. 30 00:02:25,040 --> 00:02:36,650 So you can see connected to the IP address, Sicari, so it's asking for the password, so it's not 31 00:02:36,650 --> 00:02:39,700 a problem because we know the password of this current execution. 32 00:02:39,890 --> 00:02:43,490 Maybe I should, uh, stop this and restart this. 33 00:02:43,780 --> 00:02:49,250 OK, it's not a problem because we know the of our current expansion rate, even though it's password 34 00:02:49,250 --> 00:02:50,870 is enabled. 35 00:02:51,200 --> 00:02:51,560 Sorry. 36 00:02:52,220 --> 00:02:55,130 Like a user need to enter the password. 37 00:02:55,160 --> 00:02:59,290 We know that our once carried our current IP address. 38 00:02:59,300 --> 00:03:07,600 So now you can say that you can read this first using this tab and you can see all the files here, 39 00:03:07,610 --> 00:03:18,500 you can see all the text and etc. and what you can do use you get all that, for example. 40 00:03:29,600 --> 00:03:38,230 So it's using a different binary and binary what is useful for transferring the binary data, like executables, 41 00:03:38,240 --> 00:03:39,300 Allfirst, et cetera. 42 00:03:40,610 --> 00:03:46,060 So that's one the user for the binary model. 43 00:03:46,580 --> 00:03:49,220 So you can get using this, uh, get comen. 44 00:03:50,830 --> 00:04:00,120 So let me close this one, so we have set up this FPP server and we are actually using this FPP crane. 45 00:04:01,120 --> 00:04:04,790 So that is one way and another matter is using the python, too. 46 00:04:05,110 --> 00:04:07,520 So there is a python and python three. 47 00:04:07,540 --> 00:04:08,530 There are two versions. 48 00:04:08,830 --> 00:04:14,620 You can start a simple UDP server on this directory, which you are running the command. 49 00:04:15,760 --> 00:04:17,860 So let me move to desktop. 50 00:04:19,750 --> 00:04:23,100 And if I say I am in the desktop, I have these files. 51 00:04:23,890 --> 00:04:35,350 So if I want to start the DP server on this folder, I need to sell Python to minus the module and the 52 00:04:35,350 --> 00:04:37,000 module name is simple. 53 00:04:38,300 --> 00:04:44,590 It should be a server only to the bottom, but two, one, two, three, four. 54 00:04:45,850 --> 00:04:48,160 So as you can see, serving that should be on the board. 55 00:04:48,440 --> 00:04:51,500 Are there other interfaces and the one, two, three, four. 56 00:04:51,790 --> 00:04:57,960 Now what I can do is I can go and say w get that IP address. 57 00:05:03,380 --> 00:05:09,500 The current put number, I need to specify the slash and then I need to switch the fighting if I want 58 00:05:09,500 --> 00:05:16,130 to download to this machine so I can simply sell dirty and if I download it. 59 00:05:19,360 --> 00:05:25,870 So as you can see, the door has been sealed for your last minutes earlier, you can see. 60 00:05:28,840 --> 00:05:29,410 OK. 61 00:05:31,240 --> 00:05:36,470 A big taste has been settled in the home for the previous food has been discovered. 62 00:05:36,940 --> 00:05:41,840 So this is the python to actually be thorough. 63 00:05:42,280 --> 00:05:48,850 So if the machine does not have Python to our it, it is having the python three and a python three 64 00:05:48,850 --> 00:05:51,880 minus its GDP that sarva. 65 00:05:54,390 --> 00:05:57,700 Knowledge, it's similar to the previous matter. 66 00:05:57,930 --> 00:06:04,010 It seems that we now, uh, for folder on this poll, number on the default. 67 00:06:04,290 --> 00:06:06,930 So the differences we are using pertain to a.. 68 00:06:07,110 --> 00:06:12,700 In some cases, the victims machine may have done two, but not three. 69 00:06:12,750 --> 00:06:18,540 So in that case, you can run the python to early if, uh, there are. 70 00:06:18,540 --> 00:06:21,350 But, uh, there is no problem for the. 71 00:06:23,190 --> 00:06:26,610 So that is one way and another way is. 72 00:06:27,630 --> 00:06:33,750 We have already seen using the file transfer, using the network, I will just show you once more an 73 00:06:33,750 --> 00:06:43,440 ID card and we are going to listen on to one, two, three, four and take the input of the filename. 74 00:06:43,590 --> 00:06:45,720 We want to send a hash that 75 00:06:48,720 --> 00:07:01,440 I know I am in the home folder and also get my Nissan V. I would use my own local IP address and then 76 00:07:01,440 --> 00:07:04,270 I'm going connecting two, one, two, three, four. 77 00:07:05,640 --> 00:07:10,890 And I'm going to say it's a hash one dot. 78 00:07:18,710 --> 00:07:22,130 So now if I can control, I can control see? 79 00:07:25,460 --> 00:07:30,270 So if I said less minutes earlier, I regret this has nothing to. 80 00:07:30,920 --> 00:07:38,260 So this is a simple way for the Netcare and we have covered this FTB server, python server and network. 81 00:07:38,450 --> 00:07:52,520 And one more thing is, if you have access to that machine, you can use a as a separate hash and then 82 00:07:52,520 --> 00:07:57,670 you need to enter the user name after the A session you have the access to. 83 00:07:57,930 --> 00:08:06,470 If you know the username and password of the machine, that username is I'd been I need to address the 84 00:08:06,470 --> 00:08:07,010 IP address 85 00:08:10,160 --> 00:08:15,030 and then call in to send it to the destination. 86 00:08:15,440 --> 00:08:23,150 So this is stands for Secured Copy and we are copying from Pashupati, which is our own correct machine, 87 00:08:23,390 --> 00:08:29,260 to this admin address that with the machine and then the destination for the. 88 00:08:29,270 --> 00:08:31,430 So then it will ask for the password. 89 00:08:31,580 --> 00:08:37,500 And if you have access to login credentials, you can successfully transfer the files. 90 00:08:37,790 --> 00:08:42,950 So these are comes under Porche exploitation after you get the basic QA from the user. 91 00:08:43,730 --> 00:08:47,390 So these are the some common file transfer techniques. 92 00:08:48,200 --> 00:08:54,320 And if there are more techniques, we will recover in that we do at the right time and, uh, in the 93 00:08:54,320 --> 00:08:55,160 right situation. 94 00:08:55,640 --> 00:08:59,480 So that server this will be the basic method for the file transfer.