1 00:00:01,960 --> 00:00:08,580 So there is an issue that we are going to take a look at how to manually exploit the Internet to exploit 2 00:00:08,860 --> 00:00:14,630 without the matter split so fast, we are going to use the search right, for eternal. 3 00:00:15,490 --> 00:00:19,600 So I will show you, uh, the error I have on this. 4 00:00:19,600 --> 00:00:22,530 And I did not, uh, that I know. 5 00:00:22,620 --> 00:00:28,330 Well, I would also show you the answer to that and satisfy that rule. 6 00:00:29,230 --> 00:00:38,950 And there you can see, uh, we are going to use this one for two three one five, because it also supports 7 00:00:40,960 --> 00:00:42,110 other questions as well. 8 00:00:43,210 --> 00:00:47,440 So now what we want to do is you need to copy this filename. 9 00:00:47,800 --> 00:00:51,730 And Sepi, I need to set that up. 10 00:00:53,080 --> 00:01:01,210 So I'm just directly copying this into my home territory based on this and close the brackets and put 11 00:01:01,210 --> 00:01:01,740 that up. 12 00:01:03,150 --> 00:01:08,370 No, this won't put you on further, but it will be in my home folder. 13 00:01:08,650 --> 00:01:12,990 Let me read this one to, uh, Brulard. 14 00:01:14,860 --> 00:01:21,750 So give me a, uh, display of the contents of this brutal, brutal pain. 15 00:01:22,270 --> 00:01:23,840 And I'm typing it to this. 16 00:01:25,810 --> 00:01:31,130 So now we have this from the packet import assembly connection. 17 00:01:31,480 --> 00:01:39,160 So this is using impact and my assembly models and what you're going to do, you need to install the 18 00:01:39,400 --> 00:01:47,950 models using the P cancer package and then you need to install this impact my assembly group. 19 00:01:48,760 --> 00:01:52,840 So after that, it's going to explode the system's. 20 00:01:55,690 --> 00:01:58,390 And then then the pipes here. 21 00:02:06,250 --> 00:02:14,230 So this expert will try to brute force the pipes, how the different pipes in pipes react, and then 22 00:02:14,230 --> 00:02:18,770 it will take each and every pipe in this to the target machine. 23 00:02:19,810 --> 00:02:22,420 So let me disprove the helpage. 24 00:02:22,870 --> 00:02:26,950 That's a pattern of Budapest. 25 00:02:30,240 --> 00:02:38,400 OK, now we want to go to the IP address and the Piperno, so in order to find the pipe of the victim, 26 00:02:38,670 --> 00:02:43,440 you need to use the, uh, auxiliary module in terms of console. 27 00:02:44,610 --> 00:02:45,360 That is the pipe. 28 00:02:45,360 --> 00:02:52,140 Pargeter It will have the are the pipes in the world and it will find the correct pipes that are used 29 00:02:52,140 --> 00:02:53,900 in the machine. 30 00:02:53,940 --> 00:02:57,560 I have this notion that we do very running on this video. 31 00:02:58,440 --> 00:03:02,670 So these pipes are open both for the assembly service. 32 00:03:03,390 --> 00:03:07,100 These pipes are generally the filenames you can see in the Linux. 33 00:03:07,110 --> 00:03:15,660 I just use some common piping documents so you can also pipe to the file and that can be used as an 34 00:03:15,660 --> 00:03:16,770 input output. 35 00:03:17,820 --> 00:03:20,580 So it's just like post for assembly service. 36 00:03:26,040 --> 00:03:34,980 So let's so wait for it to start, and I got one error, and I was unable to solve this error even after 37 00:03:34,980 --> 00:03:35,520 Googling. 38 00:03:36,180 --> 00:03:38,230 Uh, that's basic rule, but I don't know. 39 00:03:38,330 --> 00:03:38,610 It's. 40 00:03:39,120 --> 00:03:41,370 Now, let's try that again. 41 00:03:41,520 --> 00:03:45,380 And if that fails, we'll go for another manual method. 42 00:03:45,780 --> 00:03:50,550 So now let's search for a paper on the auditor. 43 00:03:54,230 --> 00:04:03,020 So this cannot we are going to use Papageno and that will be spread options, so it has already using 44 00:04:03,620 --> 00:04:10,650 this world is known for its dirty and escarpments, some common pipes that will be used in the service. 45 00:04:11,630 --> 00:04:15,740 We need to set the aHUS, that is this 192000. 46 00:04:15,740 --> 00:04:20,030 And if you don't want not what I'm setting it to global. 47 00:04:27,150 --> 00:04:33,690 So now let's bring this to the fore, because you don't know the details and let's tape from. 48 00:04:48,830 --> 00:04:56,330 OK, it caused some error, but Windows XP machine, we got some Narborough Pipes as a browser, so 49 00:04:56,330 --> 00:04:59,240 I think BRUDDAH can learn some different pipes. 50 00:04:59,510 --> 00:05:01,590 So let me run this script. 51 00:05:01,610 --> 00:05:08,830 So before running script, we have to install this, uh, uh, impact and my assembly rate. 52 00:05:08,960 --> 00:05:16,610 So let me first, uh, display the broader P way, and we need to define, uh, whether it's using Python 53 00:05:16,610 --> 00:05:17,910 to are the Python three. 54 00:05:18,110 --> 00:05:26,480 So one way to define whether the python using two version are three version is to grab the print statement. 55 00:05:28,160 --> 00:05:34,520 So it's using Python three, because in Python three, you have the brackets of further print statement. 56 00:05:35,210 --> 00:05:42,110 In Python two, you will not have these brackets for the print statement so that we can say Python three 57 00:05:43,310 --> 00:05:44,250 Ruapehu. 58 00:05:44,510 --> 00:05:46,310 And this is for the IP address. 59 00:05:53,050 --> 00:05:56,590 So it's saying no phone access, not phone access. 60 00:05:58,000 --> 00:06:05,010 Sorry I did not show you installation of the impacted nickel type, three inch impact. 61 00:06:17,600 --> 00:06:19,190 So, OK, I just read this here. 62 00:06:20,270 --> 00:06:21,790 I have already shot this one. 63 00:06:24,860 --> 00:06:35,360 So what I got there is I got some error, uh, which is, uh, in my assembly that Pewee and you need 64 00:06:35,360 --> 00:06:38,650 to resolve this one and this fix it my error. 65 00:06:39,380 --> 00:06:42,430 So you need to three reached out to this one. 66 00:06:42,440 --> 00:06:44,420 You just need to copy this and push this. 67 00:06:44,880 --> 00:06:48,830 So before that, we will, uh, see my husband, LRP. 68 00:06:53,670 --> 00:06:55,680 So that is the requirement for our. 69 00:07:00,980 --> 00:07:06,840 Oh, father, brother Pilate, so now we are going to do any of this one. 70 00:07:08,880 --> 00:07:11,790 So there are some errors in this, Milsom, without being. 71 00:07:14,350 --> 00:07:16,990 So I think this was she has fixed it. 72 00:07:26,820 --> 00:07:32,850 Because this I have already downloaded this, I'm just so you know, that my would be so certain for 73 00:07:32,850 --> 00:07:36,000 this I can see here. 74 00:07:40,880 --> 00:07:45,300 You can see here myself not be so I have done this you download from the top. 75 00:07:45,890 --> 00:07:54,830 So, no, this has failed this window so that, uh, I got the address from the, uh, this brutal point 76 00:07:54,890 --> 00:07:57,440 when I'm executing against the Windows XP machine. 77 00:07:57,770 --> 00:08:01,850 So now you see the rather minor matter that is out of blue. 78 00:08:03,320 --> 00:08:07,670 So this is some modification of this Brulard profile. 79 00:08:08,030 --> 00:08:14,570 And what these guys have done is they have created some, uh, three types of exploits. 80 00:08:14,570 --> 00:08:17,240 One is from the seven eight and understand. 81 00:08:17,570 --> 00:08:19,850 And they have also created this eternal tracker. 82 00:08:20,150 --> 00:08:27,350 And you can use this file, uh, to test whether the target machine is, uh, vulnerable to that or 83 00:08:27,350 --> 00:08:27,680 not. 84 00:08:28,430 --> 00:08:31,250 And here there how this might seem similar. 85 00:08:31,610 --> 00:08:34,920 And you can see here corrections for both retros and et cetera. 86 00:08:35,750 --> 00:08:37,960 So we need to install these requirements. 87 00:08:38,930 --> 00:08:40,550 So let me copy this. 88 00:08:40,550 --> 00:08:48,590 Uh, you order and no, I'm going to clone this ego pursuit dot dot and just. 89 00:08:56,380 --> 00:08:58,640 Now, let me cling to this, the. 90 00:09:04,610 --> 00:09:13,340 So now let me move on to this of territory and remember, this room is very unstable. 91 00:09:13,370 --> 00:09:20,470 Expect you to run multiple times to get it work and sometimes you work for it depends on pure luck. 92 00:09:20,990 --> 00:09:24,000 And I want to run this. 93 00:09:25,100 --> 00:09:27,330 Let me run this at the plate. 94 00:09:34,990 --> 00:09:37,090 So we need to do the targeted IP address. 95 00:09:37,120 --> 00:09:38,020 Let me do this. 96 00:09:44,840 --> 00:09:50,680 So it just the national debate and target is not much testing, never works, and it's done. 97 00:09:51,050 --> 00:09:57,800 So no, our Windows seven machine has been vulnerable to this explode. 98 00:10:00,590 --> 00:10:06,250 So now we need to execute this Python script, uh, to exploit the machine. 99 00:10:07,050 --> 00:10:08,030 Let me run this. 100 00:10:10,930 --> 00:10:12,720 Eternal rule seven would be right. 101 00:10:15,100 --> 00:10:19,570 And what you want to do is we want to do the IP address and the Chalco. 102 00:10:20,440 --> 00:10:24,930 So now there is a Florida commercial code that we want to this territory. 103 00:10:27,010 --> 00:10:35,500 And the is, shall I say, so you can also generate using that most of you are you need to do is you 104 00:10:35,500 --> 00:10:42,880 need to set the minutes of output to raw format and sell that output to this a binary format. 105 00:10:42,890 --> 00:10:46,980 Then it will be, uh, you can use this with in this explode. 106 00:10:47,410 --> 00:10:50,110 So they have already given this script. 107 00:10:50,170 --> 00:10:54,130 We are going to use this, see it more Prosek's. 108 00:10:54,610 --> 00:10:56,170 Let's make that executable. 109 00:10:56,410 --> 00:10:59,110 And as it were, run this. 110 00:11:02,040 --> 00:11:06,210 So concertgoer company, would you like to share with them? 111 00:11:06,880 --> 00:11:12,030 I'm going to type, yes, so I need to Google host, which is my current IP address. 112 00:11:15,870 --> 00:11:19,660 Sorry, so sorry, let me run this again. 113 00:11:20,100 --> 00:11:22,450 I know Brosius. 114 00:11:30,180 --> 00:11:36,960 Already two, not four, and I want to say one, two, three, four, and one, two, three, four, 115 00:11:36,960 --> 00:11:37,220 four. 116 00:11:39,300 --> 00:11:45,620 So it's Soskin to the other to out of the convention. 117 00:11:45,870 --> 00:11:52,880 So I'm going with one option to generate the normal schedule so that we can get to the next sort of 118 00:11:52,890 --> 00:11:54,600 a stage where the Australians. 119 00:11:54,630 --> 00:11:56,250 I'm going with Jiro. 120 00:11:57,980 --> 00:11:58,800 I know. 121 00:11:58,990 --> 00:11:59,200 And. 122 00:12:02,510 --> 00:12:09,170 So now let me go on and on on this one, two, three, four, no, sorry. 123 00:12:12,770 --> 00:12:15,730 So now our circle will be back in a minute. 124 00:12:25,270 --> 00:12:32,290 So I highly recommend you first execute this Brulard Pale Blue Dot P dance group. 125 00:12:33,040 --> 00:12:37,780 If that does not work, you need to just turn off this autopilot and run it. 126 00:12:43,410 --> 00:12:50,000 And this minor expectations get so many errors, which I have got from this myself, which are beautiful, 127 00:12:50,340 --> 00:12:53,330 and you need to rectify those errors by Googling. 128 00:12:54,150 --> 00:12:57,900 So we need to more Google about this arrest to fix those errors. 129 00:13:02,830 --> 00:13:11,980 So this video has been done before, despite making videos, I hope I need to put this part of the action 130 00:13:11,980 --> 00:13:14,520 before this in the video. 131 00:13:14,740 --> 00:13:22,120 So I put a bit on fundamentals in the previous of this exploitation and all these things. 132 00:13:22,870 --> 00:13:26,050 So now it's just my job is done. 133 00:13:26,200 --> 00:13:27,370 Let me show you this. 134 00:13:27,640 --> 00:13:28,950 And you can see there are so many. 135 00:13:28,960 --> 00:13:34,790 First one is 64 bit Bernadi and 64 cannot explode and 64 with formatters. 136 00:13:35,020 --> 00:13:38,530 So you can use this for this multi handle. 137 00:13:38,680 --> 00:13:40,120 So let me go with this. 138 00:13:41,170 --> 00:13:42,820 So this is a basic one. 139 00:13:43,300 --> 00:13:45,910 This will throw it connection to us. 140 00:13:46,280 --> 00:13:52,390 Let me go into back territory and people just know what I can do is I can run this at an ultrasound, 141 00:13:52,410 --> 00:13:57,160 not exploit Wighton Eternal Blue. 142 00:13:59,620 --> 00:14:03,750 So not peacefully, and then what I want to do is appear. 143 00:14:06,890 --> 00:14:09,670 And then I want to look at the Chalco. 144 00:14:09,710 --> 00:14:14,560 I want to use this and no controls pest control with this one. 145 00:14:15,380 --> 00:14:17,670 Not everything is perfect for Hutner. 146 00:14:21,100 --> 00:14:29,260 No, I think the expert has been completed now, as you can see, there is a normal shall we have got 147 00:14:29,720 --> 00:14:30,610 a 30 year? 148 00:14:39,840 --> 00:14:45,150 All right, now let's try for a massive, massive. 149 00:14:47,200 --> 00:14:47,800 Let me. 150 00:14:55,730 --> 00:14:59,060 Right now, we should get the command from. 151 00:15:12,760 --> 00:15:14,160 So we did not get this one. 152 00:15:14,200 --> 00:15:17,560 I think we should use to get the normal Natacha. 153 00:15:25,300 --> 00:15:27,670 So let me use normal benally. 154 00:15:37,970 --> 00:15:43,010 OK, since we are in the matters, right, let's use the multi handle. 155 00:15:55,010 --> 00:15:59,270 So let's see what what type of bird has been created. 156 00:16:02,510 --> 00:16:05,760 So it's not what it was supposed to be. 157 00:16:05,840 --> 00:16:11,120 We should catch this using this evidence of massive binary. 158 00:16:18,850 --> 00:16:25,140 So once you got the connection, but we don't have we did not get the shell, so. 159 00:16:52,390 --> 00:16:59,160 So first of all, let me try to create the stage whisperer, maybe that might make some difference. 160 00:18:10,550 --> 00:18:14,890 All right, now, let's go ahead and bring run our previous comment. 161 00:18:17,990 --> 00:18:25,760 So you see a C on the square miles underscore a massive, massive Rudbeck, right? 162 00:18:34,100 --> 00:18:36,400 So you're not getting any connection. 163 00:19:29,630 --> 00:19:33,770 So let me create this payload by myself and I'm. 164 00:19:39,360 --> 00:19:43,590 I am specifying the Rafah Beiping now that bin. 165 00:19:46,810 --> 00:19:49,990 Now, let's this is. 166 00:20:06,920 --> 00:20:09,600 So that has been created. 167 00:20:10,820 --> 00:20:13,870 Now I'm pointing that to the stimulus bill. 168 00:20:20,440 --> 00:20:21,420 All right. 169 00:21:27,640 --> 00:21:33,970 So out of this seven machine has been crashed because this eternal reason cannot explode and it has 170 00:21:33,970 --> 00:21:35,720 crashed the Windows operating system. 171 00:21:36,100 --> 00:21:39,730 Now let's perform on this Windows XP operating system. 172 00:21:48,210 --> 00:21:52,080 So this we should try this. 173 00:21:53,820 --> 00:21:58,040 And it's quite expected that because these three will not work for under XP. 174 00:21:59,860 --> 00:22:06,940 And let me it on to exploit the people and say IP address. 175 00:22:09,450 --> 00:22:10,470 Which is why not to. 176 00:22:14,640 --> 00:22:17,280 And we need to look at this Chalco. 177 00:22:28,520 --> 00:22:31,460 So now our listener has been learning and also. 178 00:22:40,140 --> 00:22:40,850 OK. 179 00:22:48,440 --> 00:22:58,510 So, OK, now this expert has been executed and this expert itself sent the parrot that is the daughter, 180 00:22:58,520 --> 00:23:03,070 and we have got this, uh, coming from cancer here. 181 00:23:03,620 --> 00:23:06,680 And you can see here, uh, found the pipe broke up. 182 00:23:06,680 --> 00:23:10,370 So it hasn't found an able to my brother and. 183 00:23:21,380 --> 00:23:24,740 No, let me use this paper, this Windows XP machine. 184 00:23:35,140 --> 00:23:38,770 As you can see, it has found that they would have brought in a similar way. 185 00:23:38,800 --> 00:23:45,940 This expert has found the pipe brother exploit this now and you can see that we have got the connection 186 00:23:45,940 --> 00:23:46,240 here. 187 00:23:51,250 --> 00:23:53,670 OK, now let me read this again. 188 00:23:58,850 --> 00:24:05,300 So now we have got this current and we can just do some portion protection and whatever stuff you are, 189 00:24:05,690 --> 00:24:12,500 so we can see there are so many errors and so many failures or this minor explanation and particularly 190 00:24:12,500 --> 00:24:19,340 this at least very unstable exploit, because this is a cabinet expert and you can call the system to 191 00:24:19,340 --> 00:24:19,760 crash. 192 00:24:19,940 --> 00:24:29,570 Just we have seen breaking Windows Phone Machine, so I highly recommend you to run multiple times because 193 00:24:29,570 --> 00:24:35,380 it will crash and you can also of a metal speed. 194 00:24:35,450 --> 00:24:37,370 And this is just an option. 195 00:24:37,670 --> 00:24:44,870 But if you want to prepare examples very quickly, then we need to run this minor expectation.