1 00:00:00,210 --> 00:00:04,650 So what's going on in this room will be doing that, pivoting, using a tool called Chisel. 2 00:00:05,100 --> 00:00:09,540 So this is so good to so you can pivot multiple networks. 3 00:00:10,500 --> 00:00:12,440 So, OK, I have this set up. 4 00:00:12,450 --> 00:00:19,170 I have this Kleenex machine at 136 subnet and the metal spreadable, one machine spreadable to husband. 5 00:00:19,890 --> 00:00:25,740 So the reason why I'm using these three are these consume less ram and I can run these machines. 6 00:00:25,890 --> 00:00:30,300 If I'm using this one, this will strike so much. 7 00:00:30,300 --> 00:00:36,600 So that's why I'm using the machines and these Kleenexes connected to this 136 subnet. 8 00:00:36,600 --> 00:00:38,750 So you can see these two can accommodate each other. 9 00:00:39,030 --> 00:00:45,430 And also this machine one, how and that is connected to this one network. 10 00:00:46,110 --> 00:00:50,850 And this in this subnet we have this another computer, 150, 130. 11 00:00:51,420 --> 00:00:57,690 So these two can come together and these clinics cannot communicate with this cannot come into this 12 00:00:58,320 --> 00:00:59,510 because they do not rope. 13 00:01:00,420 --> 00:01:03,020 So the only way is via this and one machine. 14 00:01:03,570 --> 00:01:11,070 And here in the same ampoule, how the another adapter would use 59 subnet. 15 00:01:11,100 --> 00:01:14,330 And in this there is a real host today, not 100. 16 00:01:14,790 --> 00:01:20,770 So, OK, you can bring this machine and you can find a about this and you can get the door shut. 17 00:01:21,000 --> 00:01:24,410 So after getting the reversal on this machine, you can do the finger sweep. 18 00:01:24,840 --> 00:01:27,680 So to see all the language in this subnet. 19 00:01:27,870 --> 00:01:33,090 So that's how you discovered that there is another adapter. 20 00:01:33,840 --> 00:01:38,750 And in that subnet we have the 150, not 130. 21 00:01:38,760 --> 00:01:44,030 So that say you do the Pinga sweep and you find this one Frear on the. 22 00:01:44,430 --> 00:01:48,240 So you need to establish the rule from a car next to them, too. 23 00:01:49,500 --> 00:01:51,810 So that's why we are going to use that system. 24 00:01:51,840 --> 00:01:59,280 So go to Chrome and search for Desert GitHub so you'll get the link and make sure you downloaded the 25 00:01:59,280 --> 00:02:00,140 latest version. 26 00:02:00,900 --> 00:02:07,110 So I'm not opening the code because already for whatever machines are running, so it's already in my 27 00:02:07,110 --> 00:02:07,650 desktop. 28 00:02:09,390 --> 00:02:10,570 Gisel, my message. 29 00:02:10,740 --> 00:02:12,120 So this is the HelpAge. 30 00:02:12,120 --> 00:02:17,790 I can run this as a server and I can also run this as a grant. 31 00:02:19,020 --> 00:02:30,470 OK, I will show you one three one one concept that you can try because this galaxy is not going to 32 00:02:30,470 --> 00:02:31,430 turn out OK. 33 00:02:35,060 --> 00:02:42,490 So first we ran that isomalt in server to the server and we need to for the. 34 00:02:42,970 --> 00:02:50,130 That's three three, three three and turned so that the server is running on the three three three three. 35 00:02:50,360 --> 00:02:54,640 OK, not my mother's portable machine. 36 00:02:54,890 --> 00:02:56,470 I got the reversal. 37 00:02:58,430 --> 00:03:05,480 No, what I can do is I can just do the file transfer from the carrier to this box and user and then 38 00:03:05,480 --> 00:03:07,070 we need to clanked. 39 00:03:07,820 --> 00:03:10,100 So we are connecting to that user. 40 00:03:10,670 --> 00:03:15,080 So we server this to the server. 41 00:03:15,080 --> 00:03:23,510 So that means we need to get the IP address on and do the ones you should want to see expanded to those. 42 00:03:29,680 --> 00:03:34,960 Coleman, so you need to switch with the three three three three, because we are on each other on the 43 00:03:34,960 --> 00:03:41,080 terrorist retreat retreat and now we need to specify the syntax like this. 44 00:03:42,550 --> 00:03:44,800 Phi Phi Phi Phi Cohran. 45 00:03:45,130 --> 00:03:49,900 So this Phi Phi Phi Phi here is the local boat machine. 46 00:03:51,160 --> 00:04:01,470 So where you need to send that data support to Google dot com portal. 47 00:04:03,040 --> 00:04:05,260 So what the string and terribleness. 48 00:04:05,440 --> 00:04:12,280 First we are going to connect to the actual server using this, uh, address, and then we are going 49 00:04:12,280 --> 00:04:17,380 to open the port on our local metastable machine at the Phi Phi Phi Phi. 50 00:04:17,800 --> 00:04:22,060 And we are going to follow the traffic to the guru.com. 51 00:04:22,480 --> 00:04:24,690 So, no, you don't. 52 00:04:25,990 --> 00:04:38,670 So if I go to this machine now or whatever the traffic is coming up to this Port five overinflate, 53 00:04:38,770 --> 00:04:44,350 it will be tackled to the guru.com through this colonics machine. 54 00:04:45,840 --> 00:04:48,280 So I will just try and show you. 55 00:04:49,680 --> 00:05:00,720 So first, we are running together as a server and then we are running at this one as a client and then 56 00:05:00,720 --> 00:05:06,570 we can't get to the server and we open the pod five five, five, five. 57 00:05:09,130 --> 00:05:18,790 So this fine, if I can, through this over to Google dot com. 58 00:05:19,090 --> 00:05:23,040 So that is this basic crime to use. 59 00:05:23,080 --> 00:05:29,600 So this is just a concept you can use whenever you want to push the traffic to this car. 60 00:05:31,990 --> 00:05:34,850 OK, so this is what it looks like. 61 00:05:36,520 --> 00:05:38,230 So I'm just cleaning this off. 62 00:05:42,020 --> 00:05:47,930 So I have, as I said, into this Mothersbaugh bill to make it so that is not our first mission. 63 00:05:48,200 --> 00:05:52,110 So you may ask in a normal situation how you're going to do it. 64 00:05:52,250 --> 00:05:56,040 So you get the first reversal in the same way you get the second door. 65 00:05:57,530 --> 00:06:07,550 So know, what I can do is I can get extra DP slash 127, not one current FIFA. 66 00:06:07,560 --> 00:06:16,200 If so, I'm going to to my favorite FIFA port, so it should, uh, cannot produce the next machine. 67 00:06:16,310 --> 00:06:18,380 So let me run that PXP dump. 68 00:06:19,160 --> 00:06:21,000 So interface and interface. 69 00:06:21,000 --> 00:06:22,970 So if it is coming from 31. 70 00:06:25,970 --> 00:06:28,910 Captured those packets are Nazarov. 71 00:06:30,830 --> 00:06:36,620 All right, now all I need is I need I want this I need two dental. 72 00:06:38,580 --> 00:06:41,160 So you can see it can't go too far. 73 00:06:43,120 --> 00:06:46,240 Uh, we are not getting a result. 74 00:06:48,030 --> 00:06:59,130 OK, so instead of, uh, Google dot com, let's try normal, uh, any other IP address, uh, that's, 75 00:06:59,130 --> 00:07:01,470 uh, 192 dot. 76 00:07:01,920 --> 00:07:03,480 160 dot. 77 00:07:07,520 --> 00:07:09,060 Wonder what we do. 78 00:07:09,110 --> 00:07:12,330 It does not exist to vote no and who to? 79 00:07:15,380 --> 00:07:24,470 So you can see proxy for or reasoning and no, and you should get some request. 80 00:07:25,670 --> 00:07:27,430 So let me stop here. 81 00:07:28,860 --> 00:07:38,600 And the top so fast, you can see here, except as this what this enormous is it so request from five 82 00:07:38,640 --> 00:07:42,630 seven zero one four two three three three three. 83 00:07:47,360 --> 00:07:54,290 OK, so we are getting so many requests for this treated report requesting for the IP address, this 84 00:07:54,320 --> 00:07:57,950 one 192, 168, 1.0, which does not exist. 85 00:08:00,200 --> 00:08:02,810 So that's how you use the normal granddaughter. 86 00:08:02,810 --> 00:08:10,310 So you can just, uh, we need to use this many times, so. 87 00:08:10,340 --> 00:08:15,590 OK, so one method we are going to use that is reverse. 88 00:08:19,740 --> 00:08:27,630 So whenever we are running the colonics in the Sahuarita was more any kind that can connect to this 89 00:08:28,290 --> 00:08:37,080 can open a port on this colonics machine so export and then it can decide where the traffic should be 90 00:08:37,620 --> 00:08:39,810 sent to do so. 91 00:08:39,810 --> 00:08:43,700 Ground has opened the port it on this Carex machine. 92 00:08:45,240 --> 00:08:52,190 So we'll say instead of X, that's one, two, three, four. 93 00:08:52,410 --> 00:08:53,250 So one, two, three, four. 94 00:08:53,250 --> 00:08:56,360 What has been opened by this ground up? 95 00:08:56,370 --> 00:09:02,550 You know, that is closer and then he can decide where to send this traffic coming from. 96 00:09:02,550 --> 00:09:03,350 One, two, three, four. 97 00:09:03,900 --> 00:09:07,700 So then I can see the screen send central to this mission. 98 00:09:08,910 --> 00:09:14,340 So what we need to do is you need to, uh, connect to this one, two, three, four. 99 00:09:14,670 --> 00:09:25,290 And you can start going with can this port so that traffic will be sent by the to this network via this 100 00:09:25,290 --> 00:09:25,640 machine. 101 00:09:25,680 --> 00:09:30,210 We can also send this traffic to the guru.com or Microsoft. 102 00:09:30,250 --> 00:09:32,790 Got your wish, stretchable. 103 00:09:33,050 --> 00:09:33,840 How to do the. 104 00:09:36,830 --> 00:09:45,290 So here my sister is running on three three, so it's not perfect, Umbral, but certainly close this 105 00:09:46,040 --> 00:09:50,840 that's cleared the screen right to the ground. 106 00:09:52,100 --> 00:09:59,540 So after coronating I need to say, are are you can also specify the IP address of current mission, 107 00:09:59,870 --> 00:10:03,860 but it's Armin's the reverse. 108 00:10:03,980 --> 00:10:06,070 Or you can see this is the machine. 109 00:10:06,980 --> 00:10:16,980 And in this machine, I want to start in the next I want to open the book for 444 Current No, to which 110 00:10:17,300 --> 00:10:24,200 I need to forward this packet coming from the forward that means to this IP address. 111 00:10:28,530 --> 00:10:30,300 Because we have the duty, right? 112 00:10:30,330 --> 00:10:43,220 So this one mission can go to this mission, 150, 130, 192, but 160, 150, DOD 130 and Witchboard, 113 00:10:43,380 --> 00:10:44,660 you can support 80. 114 00:10:45,240 --> 00:10:47,750 So we are trained as kind of observer, Anita. 115 00:10:51,570 --> 00:10:59,610 I'm sorry, it's three three three three four threes right now who so you can see we are connected to 116 00:10:59,610 --> 00:11:01,200 this colonics machine. 117 00:11:01,800 --> 00:11:08,790 Now in the next machine you can see there is a Section two four four four four running. 118 00:11:09,240 --> 00:11:15,210 It is connected to this 150 130 wannabe so that to open a Web browser. 119 00:11:18,220 --> 00:11:21,610 So go to our local hospital for 444. 120 00:11:26,000 --> 00:11:31,370 OK, I just to know if any proxies are. 121 00:11:34,290 --> 00:11:39,810 No proxy, no, just go to 127. 122 00:11:42,390 --> 00:11:45,700 Roger, Roger Ebert, one four four four four. 123 00:11:45,780 --> 00:11:49,420 And now you should see matters where the able to miss you. 124 00:11:49,980 --> 00:11:52,300 Now you can do that and maps can on this book. 125 00:11:53,970 --> 00:11:56,030 So let us see what we have done. 126 00:11:56,040 --> 00:12:04,480 So we have open four four four four port open and we are sending traffic to the port. 127 00:12:04,530 --> 00:12:04,860 No. 128 00:12:07,380 --> 00:12:11,970 OK, so if you want to scan the board number 22, you need to put the country to zero. 129 00:12:12,270 --> 00:12:21,770 But it is very tedious task to scan thousands of hundreds of what you can put in, which would remove 130 00:12:21,780 --> 00:12:21,910 it. 131 00:12:22,650 --> 00:12:28,020 So manually changing all this food from 18 to 22 to 21, it will be very difficult. 132 00:12:28,440 --> 00:12:35,700 So what I want do is I want to create this machine as I want to first from the server on this mission 133 00:12:36,870 --> 00:12:37,590 sock's. 134 00:12:39,750 --> 00:12:48,440 So this will be running and this machine will act as it Sox grant and whatever we are sending from one 135 00:12:48,450 --> 00:12:53,790 port, it will be returned to this territory using this box. 136 00:12:54,720 --> 00:12:55,980 So we'll be doing that. 137 00:12:57,330 --> 00:12:58,750 I hope it's clear up to now. 138 00:12:58,770 --> 00:13:01,470 So I guess no one port, one port authority. 139 00:13:02,340 --> 00:13:06,510 And you need to lose Sock's fight and return to. 140 00:13:11,660 --> 00:13:21,170 So in the current version, I'm going to be as a client to this colonics machine, Gisel server, and 141 00:13:21,530 --> 00:13:29,150 I can say, oh, it's Phi Phi Phi Phi, this is the server and current. 142 00:13:30,440 --> 00:13:38,410 So what this means is whatever coming that are coming from the Port Phi Phi Phi Phi from Guardedness 143 00:13:38,420 --> 00:13:42,510 machine, this Sox Sox's over this. 144 00:13:42,540 --> 00:13:43,940 This will have the Sox. 145 00:13:44,180 --> 00:13:45,860 So it has internal Sox. 146 00:13:46,190 --> 00:13:49,400 So it will react as it, uh, Sox. 147 00:13:49,400 --> 00:13:49,770 Correct. 148 00:13:49,820 --> 00:13:56,530 And it will send the data to come to me, which will be very easy for us to scan the port. 149 00:13:56,620 --> 00:13:57,860 No hitter simply. 150 00:14:01,870 --> 00:14:10,840 So we have character from five to Sock's, so all you need to do is find your next mission, you you 151 00:14:10,840 --> 00:14:19,150 need to read this, uh, etsi proxy Gaensler configuration and go to ending. 152 00:14:21,560 --> 00:14:29,030 And at this rate, toxify localhost and the vote, no, five votes for your flight, so whatever baggage 153 00:14:29,030 --> 00:14:33,860 you're sending our proxy against, it will be routed through the Sox. 154 00:14:43,660 --> 00:14:49,780 So proxy, tense and map, so I want to scan the I.P. address this one on and the ones you showed, 155 00:14:49,790 --> 00:14:50,800 150, 130. 156 00:14:50,800 --> 00:14:52,090 So 150, 130. 157 00:14:54,000 --> 00:14:57,090 One five zero one three zero annuitants. 158 00:14:57,870 --> 00:15:09,040 Now you can see there is a chain from our Brocklehurst 555 airport to this one 38, and you'll also 159 00:15:09,120 --> 00:15:11,720 see another chain of 221. 160 00:15:11,730 --> 00:15:18,460 So you can see we are successfully scanned the FTB and actually Pizarro and the chain is from this hour 161 00:15:18,610 --> 00:15:20,340 of these 21. 162 00:15:20,970 --> 00:15:26,690 So this is how you powered through the, uh, machines using the. 163 00:15:29,580 --> 00:15:35,890 So I can say clear, and now let's stop this one. 164 00:15:37,620 --> 00:15:39,380 Let's also stop this one. 165 00:15:43,300 --> 00:15:52,000 Let's clear the screen where they know what we want to do is we have successfully made this mess. 166 00:15:56,830 --> 00:16:04,790 So, OK, now we have successfully scanned the machine and found a vulnerability that gave us a reversion 167 00:16:04,810 --> 00:16:06,190 back to this current machine. 168 00:16:07,130 --> 00:16:07,530 OK. 169 00:16:09,710 --> 00:16:12,650 Now we have access to this machine. 170 00:16:14,770 --> 00:16:19,880 Sorry, I'm riding with the models, we have access and we have access to this mission. 171 00:16:20,300 --> 00:16:24,560 No, we need to scan this machine using this machine. 172 00:16:24,730 --> 00:16:27,880 So, OK, a thing like this. 173 00:16:28,300 --> 00:16:39,840 So whenever you have only one connection, what you did is you run the server and made this as a media 174 00:16:39,970 --> 00:16:44,000 machine and you transfer this package to this speaker in the same way. 175 00:16:44,410 --> 00:16:50,890 Think of this one as a the Nexavar and send the packets from this to this. 176 00:16:51,030 --> 00:16:57,040 OK, so to do that, whatever we have on the card next do like this. 177 00:16:59,660 --> 00:17:02,330 Gisel, 32, Sarovar. 178 00:17:05,210 --> 00:17:15,890 And what we want to do is we need to send a report, number two, to do and growers. 179 00:17:19,870 --> 00:17:24,800 So and so we are resuming on to Google Dupont. 180 00:17:25,000 --> 00:17:28,870 So now from this box, so let's go to this box once. 181 00:17:29,500 --> 00:17:33,550 Let's ipca so 59 one continent, right. 182 00:17:35,970 --> 00:17:45,150 So this box has 59, 128, OK, now from this box, you can also use the file transfer from, uh, this 183 00:17:45,150 --> 00:17:47,430 box to this box and you can get that. 184 00:17:48,660 --> 00:17:50,810 So I want to out to this client. 185 00:17:51,150 --> 00:17:53,670 Which client server? 186 00:17:53,940 --> 00:17:54,630 This server. 187 00:17:55,590 --> 00:18:04,830 So the service I.P. address is this one, 150, 120, because they are in the same subnet, 150, 128. 188 00:18:10,550 --> 00:18:18,170 Under current Witchboard so this is the port which we have run down to two two two two two two two. 189 00:18:18,360 --> 00:18:25,820 So after granting what you need to do, what we need to do is we need to set our current switchboard. 190 00:18:25,830 --> 00:18:31,100 Let's just fight, fight, fight, fight, fight, fight for port call. 191 00:18:31,200 --> 00:18:38,430 So where you need to uh farhod this whole traffic coming from fight, even if it means to this mission. 192 00:18:40,450 --> 00:18:42,870 So 159, self-fulfilment 108. 193 00:18:47,940 --> 00:18:50,040 So we got a and Anahita. 194 00:18:52,730 --> 00:19:01,520 So, OK, now, up to now, we have set up the server and this box has been connected to this and forwarding 195 00:19:01,520 --> 00:19:04,310 packets coming from this. 196 00:19:04,910 --> 00:19:07,910 Fire, fire, fire, fire. 197 00:19:09,550 --> 00:19:17,740 To this box, Bucksbaum Baby Soderstrom, Saudi Exis Oncolytics, so that means we need to set up another 198 00:19:17,740 --> 00:19:19,270 connection from this box. 199 00:19:22,640 --> 00:19:31,670 So you need to reverse three three, three three, and you need to get the reversal two times from this 200 00:19:31,670 --> 00:19:32,060 box. 201 00:19:33,170 --> 00:19:36,130 So I'll just, as I said, to show you the result. 202 00:19:41,350 --> 00:19:47,610 Jazeerah, 32 and Glendower, so we need to cry and we need to connect to this oh. 203 00:19:52,130 --> 00:19:52,480 Got it. 204 00:19:52,530 --> 00:19:54,810 Next mission, I think, of my Episcopal. 205 00:19:56,510 --> 00:19:57,210 Yes, correct. 206 00:19:57,470 --> 00:19:58,580 And the number is. 207 00:20:01,520 --> 00:20:10,470 Three three three three three three three, and after guarantying, we need to open a port that's six, 208 00:20:10,480 --> 00:20:20,180 six six and transfer, so we to transfer are those that are coming from a newly opened Port 666. 209 00:20:20,540 --> 00:20:24,310 That means transfer to this 553. 210 00:20:25,520 --> 00:20:34,250 OK, what we can say is 127 0.01 Corran Phi Phi Phi Phi Annuitants. 211 00:20:36,590 --> 00:20:46,120 So you can see the connection, so whatever I send the physics, so 666, if the data goes to this 555 212 00:20:46,760 --> 00:20:53,650 of this machine and whatever I send to this fight, my fate will be going to this afternoon. 213 00:20:53,730 --> 00:20:55,120 Not one hooty. 214 00:20:55,850 --> 00:20:58,320 OK, let's go and open up Web browser. 215 00:21:00,110 --> 00:21:02,390 So I need to do is you need to. 216 00:21:04,940 --> 00:21:10,020 Sorry, just simply go to this one condition, not the regular one. 217 00:21:11,060 --> 00:21:17,540 So we put this six six foot current six six six six and into. 218 00:21:23,570 --> 00:21:24,440 Excuse me, what? 219 00:21:29,190 --> 00:21:30,600 So let's use another. 220 00:21:35,970 --> 00:21:40,260 That's used in six six six six one one one one. 221 00:21:44,900 --> 00:21:45,790 One, one on one. 222 00:21:47,730 --> 00:21:57,150 So you can see we have successfully connected to this lightbox, so we have successfully Carentan from 223 00:21:57,150 --> 00:22:04,800 one one one one, two five and this to this one and this will be related to the property. 224 00:22:05,250 --> 00:22:08,190 So this is like one one, two one pot. 225 00:22:08,210 --> 00:22:08,520 Right. 226 00:22:09,090 --> 00:22:16,760 So we can use the you can set up Busalacchi socks proxy's this one and this one. 227 00:22:18,240 --> 00:22:19,470 So let's go to and do that. 228 00:22:21,420 --> 00:22:24,660 Meanwhile, let's scan this. 229 00:22:25,080 --> 00:22:28,150 I don't know why and map is giving the wrong results. 230 00:22:28,470 --> 00:22:33,300 That's one one one one one seven zero zero one. 231 00:22:36,010 --> 00:22:39,070 So I don't know why and maybe showing the wrong to those. 232 00:22:41,010 --> 00:22:43,280 So maybe we should use the localhost. 233 00:22:49,340 --> 00:22:49,640 OK. 234 00:22:49,680 --> 00:22:56,240 Anyway, uh, what we can do is we can close this, we need to. 235 00:22:59,880 --> 00:23:02,610 Again, also close this one. 236 00:23:05,090 --> 00:23:06,350 So OK, so. 237 00:23:08,870 --> 00:23:10,140 In this misfortune. 238 00:23:16,980 --> 00:23:20,040 OK, we need to set up the socks. 239 00:23:21,960 --> 00:23:31,190 Socks, Sarver, come in here and then this will connect as a client and it will open up your share 240 00:23:32,760 --> 00:23:34,350 to two to two. 241 00:23:35,280 --> 00:23:44,010 And to try to redirect all the traffic from, uh, the data comes from this two to two. 242 00:23:44,670 --> 00:23:49,620 And it will be gone through these socks and it will be redirected to this one. 243 00:23:49,930 --> 00:23:51,960 OK, now this is Englishtown. 244 00:23:52,170 --> 00:23:57,570 So what do is you need to set up the socks here, let's say on the board one one, one one. 245 00:23:58,680 --> 00:24:07,950 You need to set upon this one one on one and we need to return everything to this spot to to do OK. 246 00:24:08,000 --> 00:24:08,990 Let's do that. 247 00:24:11,820 --> 00:24:13,860 So we are running out one, two, three, three. 248 00:24:15,270 --> 00:24:20,790 Let's set up this, uh, second box for the socks. 249 00:24:24,110 --> 00:24:25,270 Socks fight. 250 00:24:32,960 --> 00:24:42,770 So now we need to connect to this and we need to return to our socks, so. 251 00:24:43,070 --> 00:24:50,930 OK, so what this means is we are connecting these two to two and then opening the 535 airport. 252 00:24:53,160 --> 00:25:02,220 OK, let's fight, fight, fight, fight, fight, fight, fight, fight, this is the main one and 253 00:25:02,220 --> 00:25:07,260 this is the main one and open the fight will be open on this one. 254 00:25:08,010 --> 00:25:14,170 And no, I will be this third box will be acting as their socks and hitting the. 255 00:25:16,880 --> 00:25:25,520 So, no, on this, we have set up and also we have a counter to this territory. 256 00:25:26,570 --> 00:25:28,600 We have the server on tritle data. 257 00:25:28,940 --> 00:25:36,470 So on our Nicolelis, I need to raise one more point on this current machine. 258 00:25:37,190 --> 00:25:40,640 So that's one one one one Coran. 259 00:25:43,620 --> 00:25:55,530 Socks and Hitler, so this will open a one on one important disconnects, and there are two proxy ports, 260 00:25:56,130 --> 00:26:05,280 so one is one one, one one, and the next one is which we have, uh, opened on the second box that 261 00:26:05,280 --> 00:26:05,820 is safe. 262 00:26:07,030 --> 00:26:09,300 So not these ports. 263 00:26:09,510 --> 00:26:12,450 We need to use those in the proxy chains. 264 00:26:24,520 --> 00:26:31,090 So one on one and next one is five one right one one one one, five, four, five. 265 00:26:31,130 --> 00:26:34,600 And so I think now we have successfully. 266 00:26:37,750 --> 00:26:48,450 Before that, so taboo to testing its 59, not 129, so which is the last box, so we have the one on 267 00:26:48,450 --> 00:26:56,990 one open and it is counter to these socks and which is connected to these socks, which will be forwarded 268 00:26:57,030 --> 00:26:58,460 to this box. 269 00:26:59,370 --> 00:27:02,010 So let's check that and you can see. 270 00:27:02,240 --> 00:27:09,450 OK, so here this is our one one on one port and it is connected to the FIFA file on the second box 271 00:27:09,840 --> 00:27:18,240 and third box will be in the middle here and it will be socks and forward everything to this 80. 272 00:27:18,510 --> 00:27:20,040 So that means the port. 273 00:27:20,970 --> 00:27:24,320 So she can see we have successfully scanned the boxes. 274 00:27:24,880 --> 00:27:27,480 We can also do the version scanning. 275 00:27:41,380 --> 00:27:44,550 So it will take some time because of the policy change. 276 00:27:47,070 --> 00:27:52,080 So for one, maybe Namath's getting second one for the version to continue, you got the Russians going 277 00:27:52,320 --> 00:27:55,020 so you can do normally, uh, right. 278 00:27:55,080 --> 00:27:59,650 As you do a normal box, you can scan normally. 279 00:27:59,670 --> 00:28:02,450 So that's how you use that chisel for that poverty. 280 00:28:05,290 --> 00:28:06,600 So that's what is with us. 281 00:28:07,060 --> 00:28:08,780 Thanks for watching, I hope you like it.