1 00:00:00,330 --> 00:00:07,470 So, guys, in this area, we are going to inaugurate this as a service using the map, we do not get 2 00:00:07,470 --> 00:00:14,330 much more information from the router, uh, where cavium because it's just a normal service. 3 00:00:14,790 --> 00:00:25,800 And let me show you need me to know the NSA and Blendtec other neighborhoods and support 22. 4 00:00:26,250 --> 00:00:31,280 So because I know the search is running, I could just simply scan only the 422. 5 00:00:34,960 --> 00:00:42,970 As you can see, we got the open as it suggests that port is open and let me try to find a version of 6 00:00:42,970 --> 00:00:50,080 this as a server, whether it is open to any other software. 7 00:00:50,080 --> 00:00:51,700 So it's using openness. 8 00:00:51,700 --> 00:00:59,020 Is it, uh, this is by default to use it in normal, uh, operating systems. 9 00:00:59,140 --> 00:01:04,150 Uh, but there is, uh, there are other types of software you can use in embedded Linux systems. 10 00:01:05,270 --> 00:01:10,800 Um, this is very important to get the information about this information. 11 00:01:11,140 --> 00:01:14,410 So Tuggle openness is five point five P1. 12 00:01:14,410 --> 00:01:16,180 Any exploit is there or not. 13 00:01:16,930 --> 00:01:21,430 Now, let's try to, uh, check further before the scripts. 14 00:01:22,090 --> 00:01:27,220 These different groups will try to get the algorithms that are used in this search. 15 00:01:30,090 --> 00:01:35,830 So we have got the assistant host, you know, using our DSL to generate these hostages. 16 00:01:36,600 --> 00:01:40,230 Now I want to show you another one that is called. 17 00:01:48,500 --> 00:01:58,670 So this is the I I want to show you this is to eat them out, the rhythms this in my script will give 18 00:01:58,670 --> 00:02:03,210 you are the rhythms that are being used for research organization. 19 00:02:03,860 --> 00:02:06,430 Let me go and say. 20 00:02:09,870 --> 00:02:12,040 Script page written here. 21 00:02:12,060 --> 00:02:21,560 And let's take a look and see there are so much so many algorithms that are being used in terms of analysis 22 00:02:21,600 --> 00:02:22,170 each year. 23 00:02:22,610 --> 00:02:30,930 And then if you see any of this algorithm as a weak algorithm, then you can probably expect that algorithm 24 00:02:30,930 --> 00:02:34,080 or just the private key and so on. 25 00:02:35,340 --> 00:02:42,270 So this is one of the important message to algorithms in some in the embedded systems. 26 00:02:42,270 --> 00:02:47,740 You're the only if you are and you can, there'll be some vulnerable rhythms also. 27 00:02:49,140 --> 00:02:52,180 So that's what this as the generation I hope we understood. 28 00:02:52,740 --> 00:02:58,140 So you'll also see that this is a brute force in using the high drama Disha and also.