1 00:00:01,010 --> 00:00:07,240 In this lecture we're going to learn how to generate an undetectable backdoor about her is just a file 2 00:00:07,500 --> 00:00:12,860 that when executed on the target computer it will give us full access to that computer. 3 00:00:13,120 --> 00:00:18,490 So it'll basically allow us to hack it and do anything that we want on that computer. 4 00:00:18,490 --> 00:00:24,520 There is a number of ways to generate back doors and what we're interested in is to generate a backdoor 5 00:00:24,760 --> 00:00:28,290 that is not detectable by antivirus programs. 6 00:00:28,300 --> 00:00:31,510 Now this is not very hard to achieve as you'll see. 7 00:00:31,840 --> 00:00:36,580 And we're going to do this using a tool called vild framework. 8 00:00:36,580 --> 00:00:42,880 Now I already have villes project page open and here I'm going to include its link in the resources 9 00:00:42,880 --> 00:00:45,600 of the lecture on the top left. 10 00:00:45,610 --> 00:00:52,090 Now if you're not familiar with good this is a version control system that allows programmers to host 11 00:00:52,270 --> 00:00:54,940 share and update their programs. 12 00:00:55,600 --> 00:01:01,670 So to download something from get help all you have to do is click on the green button in here. 13 00:01:01,750 --> 00:01:10,230 Copy this link and then go to terminal navigate to the location where you want to download this project. 14 00:01:10,340 --> 00:01:18,860 And in this example I want to go to all Petey this is a directory where you should be installing optional 15 00:01:18,860 --> 00:01:20,340 software. 16 00:01:20,450 --> 00:01:29,530 If I do ls you will see I only have one directory in here called Keith so to download the bill and here 17 00:01:29,740 --> 00:01:34,370 all you have to do is first of all right the get command which is good. 18 00:01:34,870 --> 00:01:42,070 And what we want to do is we want to clone a repository and the link for this repository is the links 19 00:01:42,070 --> 00:01:45,060 that were copied in here from the green button. 20 00:01:45,070 --> 00:01:46,880 So I'm just going to paste it here. 21 00:01:48,560 --> 00:01:54,920 So a very very simple command we're using get to download a repository from Get we're saying that I 22 00:01:54,920 --> 00:02:01,660 want to clone this repository and the link of the repository that I want to clone is this one. 23 00:02:01,760 --> 00:02:05,510 So if I hit Enter now you'll see it's going to download it for me. 24 00:02:05,510 --> 00:02:12,560 And once it's done if we do you will see we have a new directory called Bill and we can navigate to 25 00:02:12,560 --> 00:02:21,420 this directory by doing she Divell and in here if I list you'll see we have a number of files but the 26 00:02:21,420 --> 00:02:24,220 main file for the program is this one. 27 00:02:24,270 --> 00:02:25,810 Well dot why. 28 00:02:26,520 --> 00:02:32,570 But we can't run this file right now because we still didn't install this tool. 29 00:02:32,580 --> 00:02:38,250 Now Villere relies on a large number of libraries and a third party programs. 30 00:02:38,400 --> 00:02:42,760 So you're going to have to install all of these first before you can use it. 31 00:02:43,980 --> 00:02:50,560 Now luckily you don't have to do this manually because Bill comes with an installation script. 32 00:02:50,730 --> 00:02:53,700 Now the script is placed in the config directory. 33 00:02:53,880 --> 00:02:56,720 So we have to navigate in this directory first. 34 00:02:56,760 --> 00:03:07,910 So Will do you the config and if we list here you'll see we have a file called set up dot SH now as 35 00:03:07,910 --> 00:03:13,130 the name suggests if you're on this file it will install all the needed libraries. 36 00:03:13,130 --> 00:03:21,440 And third party applications that Bill uses so to run an SH or abash file from the terminal. 37 00:03:21,440 --> 00:03:26,680 All you have to do is type that forward slash followed by the file name. 38 00:03:26,840 --> 00:03:30,970 And in our case it's called set up that sh. 39 00:03:31,040 --> 00:03:38,330 Now you can run the set up as is like this but I want to add two arguments to this. 40 00:03:38,330 --> 00:03:42,820 The first argument that I want to add is the dash dash silent. 41 00:03:43,490 --> 00:03:48,030 This argument will run the installer as an unattended installer. 42 00:03:48,140 --> 00:03:54,620 So basically it will install everything with its default settings and it won't ask cause to configure 43 00:03:54,620 --> 00:03:56,450 anything. 44 00:03:56,510 --> 00:04:04,130 The next argument that I want to add is the dash dash force so that in case you're running this a second 45 00:04:04,130 --> 00:04:09,480 time if you already installed fail and something went wrong and you're installing it again the fourth 46 00:04:09,530 --> 00:04:14,730 argument will override any existing installations. 47 00:04:14,740 --> 00:04:17,650 Now I didn't just figure out these arguments myself. 48 00:04:17,770 --> 00:04:23,800 If you actually read the description here on the project page you'll learn exactly how to install it 49 00:04:24,010 --> 00:04:26,710 and what each of these arguments do. 50 00:04:26,770 --> 00:04:33,460 So I'm going to hit Enter NOW and as you can see now it's going to automatically gather information 51 00:04:33,460 --> 00:04:35,510 about my current operating system. 52 00:04:35,620 --> 00:04:40,440 It's going to install the needed libraries and the needed applications. 53 00:04:40,510 --> 00:04:44,530 This might take some time because it's going to download a lot of packages. 54 00:04:44,650 --> 00:04:48,140 So please be patient and give it its time. 55 00:04:48,280 --> 00:04:53,360 Now I'm going to post the video because this is going to take some time and I'll continue recording. 56 00:04:53,410 --> 00:04:55,560 Once it's done. 57 00:04:55,770 --> 00:05:01,380 So right now as you can see the installation is finished and it's telling me that everything is done 58 00:05:01,950 --> 00:05:03,800 so I can run the tool now. 59 00:05:03,840 --> 00:05:10,260 But what I'm actually going to do is I'm going to first close this terminal window and open a new window 60 00:05:10,710 --> 00:05:14,060 just to show you how you would start it by default. 61 00:05:14,310 --> 00:05:18,650 Because usually when you open terminal you'll actually be in the root directory. 62 00:05:18,930 --> 00:05:23,740 So if I do PWT right now you'll see I am in route. 63 00:05:23,790 --> 00:05:31,380 So in order to run fail we have to first navigate to the location where you downloaded it and we downloaded 64 00:05:31,380 --> 00:05:33,290 it to the opiated directory. 65 00:05:33,390 --> 00:05:40,120 So we're going to do cd all pretty well now if we do. 66 00:05:40,110 --> 00:05:45,710 Elias you'll see we have the file that I told you that's the file for the program and we have the config 67 00:05:45,710 --> 00:05:48,950 directory where we were and where we were on the installer. 68 00:05:49,380 --> 00:05:51,310 Now we've already installed everything. 69 00:05:51,320 --> 00:05:58,160 So we don't need to run the installer to run they'll all we have to do is type 2 it forward slash followed 70 00:05:58,160 --> 00:06:03,290 by the program name which is the old UI. 71 00:06:03,540 --> 00:06:05,020 I'm going to hit enter. 72 00:06:05,280 --> 00:06:09,260 And as you can see the program is working with no issues at all. 73 00:06:10,330 --> 00:06:15,940 Now in the next lectures I'm going to show you how to use this program to generate undetectible back 74 00:06:15,940 --> 00:06:19,830 doors that can be used to hack Windows computers.