1 00:00:00,420 --> 00:00:01,200 Continuing. 2 00:00:04,590 --> 00:00:12,660 So we are here, I'm explaining this one, so we have the permission to run the parallel and already 3 00:00:12,840 --> 00:00:15,440 on this binary back of the bill. 4 00:00:15,570 --> 00:00:19,550 So let's see what is there in the back of that bill. 5 00:00:26,580 --> 00:00:36,020 So this is the better command to execute this script as a better script and the system of a sitcom on 6 00:00:36,030 --> 00:00:39,460 it see that it sees less copyright as it. 7 00:00:40,800 --> 00:00:49,120 So what this script is doing is it's executing this comment, this Shell script as a producer. 8 00:00:50,100 --> 00:00:53,760 So let's see if we can modify this back up that duckbill. 9 00:00:57,020 --> 00:01:01,520 So back up that bill and all the route to the country to this. 10 00:01:02,210 --> 00:01:04,200 We cannot back up that hill, OK? 11 00:01:04,250 --> 00:01:07,720 Let's see if we can modify this computer as it. 12 00:01:15,750 --> 00:01:24,820 OK, that's the contents of the copy that I said use the reverser to this IP address and the fourth 13 00:01:24,840 --> 00:01:25,260 number. 14 00:01:26,790 --> 00:01:35,100 So don't confuse what these comments because these are creating a new pipe and that contents of that 15 00:01:35,100 --> 00:01:43,350 pipe has been retreating into the shell and that Shell's output and error has been retreating to this 16 00:01:43,350 --> 00:01:44,010 IP address. 17 00:01:44,010 --> 00:01:44,510 And the post. 18 00:01:44,530 --> 00:01:55,800 No, this is the best script for The Shell, but we need to place the IP address of our current mission 19 00:01:55,800 --> 00:01:58,050 and the number we the right. 20 00:02:02,920 --> 00:02:10,740 So to modify the script, we need to put diapers, but no, we need to modify this one, so let's send 21 00:02:10,780 --> 00:02:11,170 a.. 22 00:02:20,680 --> 00:02:30,070 Well, we cannot open a nano in this technology again, let's so one way to do this, we need to copy 23 00:02:30,070 --> 00:02:30,570 this one. 24 00:02:32,440 --> 00:02:34,390 I will read in the notepad. 25 00:02:42,610 --> 00:02:47,020 So this I know why I want to put my IP address of the transmission 26 00:02:49,420 --> 00:02:50,140 IP. 27 00:02:59,800 --> 00:03:01,780 No, I'm going to say one, two, three, four, what? 28 00:03:03,950 --> 00:03:07,400 Oh, I want to set a copy of this one. 29 00:03:11,720 --> 00:03:12,150 Copy. 30 00:03:13,370 --> 00:03:18,990 Now, what I'm going to do is I want to echo this this line. 31 00:03:21,410 --> 00:03:28,670 So in order to preserve all these slash and semicolon, I am just putting the quotations. 32 00:03:29,060 --> 00:03:33,080 And I want to read to the. 33 00:03:36,170 --> 00:03:38,290 It see Kopitar as it. 34 00:03:44,890 --> 00:03:48,360 Now, if I display the contents of cockpit. 35 00:03:54,710 --> 00:03:55,390 So there you go. 36 00:03:56,030 --> 00:04:01,520 Previously, it has appeared as something and something, but in this case we have Midford. 37 00:04:01,610 --> 00:04:05,460 I put this to our next mission and the number one, two, three, four. 38 00:04:05,870 --> 00:04:14,480 So before catching the revolution, we need to set up I'm going to use the net, get net, get me for 39 00:04:14,480 --> 00:04:15,650 what purpose? 40 00:04:16,280 --> 00:04:22,570 And Net to disperse the information, what it's doing and listen before put I into space. 41 00:04:22,790 --> 00:04:23,510 One, two, three, four. 42 00:04:23,960 --> 00:04:27,820 So now we are going on listening for an incoming connections. 43 00:04:29,150 --> 00:04:31,070 Know what this reversal does? 44 00:04:31,070 --> 00:04:39,200 Is it will it will troye to our connection and we are going to catch that. 45 00:04:42,120 --> 00:04:44,820 So let me take the pseudo my minister. 46 00:04:47,600 --> 00:04:51,260 So we are going to put this back up, that bill. 47 00:04:53,820 --> 00:04:59,940 We are going to get this back of with the foot and this back up that will educate our copy's. 48 00:05:12,310 --> 00:05:14,580 Where is the two nine zero one nine? 49 00:05:30,120 --> 00:05:33,120 The very wired discussion 019. 50 00:05:40,930 --> 00:05:43,360 OK, now I read this one two nine zero nine. 51 00:05:52,340 --> 00:05:53,630 OK, what is this? 52 00:05:57,490 --> 00:06:05,920 OK, because the Coliseum is multiple vulnerable vulnerabilities that the killer is also seems OK, 53 00:06:05,950 --> 00:06:10,450 it's not what I heard about this one and the risk that. 54 00:06:18,480 --> 00:06:20,300 Next, British technique is Dumont. 55 00:06:27,190 --> 00:06:34,660 Get to that, I would explain that script, OK, later, after we how we are completing this one. 56 00:06:36,580 --> 00:06:44,980 I don't know that Coliseum's I did not heard before, so I know what I'm going to do is I'm going solo 57 00:06:45,880 --> 00:06:50,620 and they have said that I can run this comment as a pseudo rootes. 58 00:06:50,640 --> 00:06:50,940 Right. 59 00:06:51,280 --> 00:06:54,170 I'm going to post here and I'm going to execute this one. 60 00:06:56,140 --> 00:07:03,190 Now we have got the Rucha, you can see the hash and you can also who might forget the route. 61 00:07:04,540 --> 00:07:05,470 Now we need to take. 62 00:07:08,000 --> 00:07:11,480 We need to look at the route that exit points. 63 00:07:13,230 --> 00:07:15,160 Good, that's in group the. 64 00:07:28,510 --> 00:07:29,440 So this is a very.