1 00:00:00,430 --> 00:00:00,790 OK. 2 00:00:00,820 --> 00:00:02,710 No, this is for the password using FTB. 3 00:00:02,740 --> 00:00:04,820 Now what if I want to capture files? 4 00:00:04,870 --> 00:00:05,320 OK. 5 00:00:05,470 --> 00:00:07,510 So for example, it's good. 6 00:00:09,540 --> 00:00:10,770 From the connection. 7 00:00:12,040 --> 00:00:18,310 So, for example, let's touch a file, and it's this file, it's got it filed a text. 8 00:00:19,030 --> 00:00:21,200 OK, in this fine, OK, let's see. 9 00:00:21,320 --> 00:00:22,750 But some inside it. 10 00:00:22,930 --> 00:00:24,250 So this is the first line. 11 00:00:24,370 --> 00:00:26,260 This is first line. 12 00:00:26,680 --> 00:00:27,520 Second line. 13 00:00:29,910 --> 00:00:30,330 There. 14 00:00:31,940 --> 00:00:32,720 Etsy. 15 00:00:33,290 --> 00:00:34,100 Etsy. 16 00:00:34,520 --> 00:00:35,160 Blah blah blah. 17 00:00:35,200 --> 00:00:35,570 Or what? 18 00:00:36,080 --> 00:00:36,500 OK. 19 00:00:36,680 --> 00:00:37,880 So this is our fight. 20 00:00:38,090 --> 00:00:39,350 OK, fine. 21 00:00:40,280 --> 00:00:42,920 Now let's restart the caption. 22 00:00:43,160 --> 00:00:47,370 OK, so we can have a nice beat or clear Beijing. 23 00:00:48,330 --> 00:00:52,540 So here, FTB open the connection to our IP address. 24 00:00:52,560 --> 00:00:52,950 OK. 25 00:00:54,700 --> 00:00:58,360 Now, but Kelly Kelly, one, two, three four, five six. 26 00:00:58,990 --> 00:01:06,280 And here, if I take an diet, you can see that we have the funny, so I need to increase the font size 27 00:01:06,280 --> 00:01:09,700 like that so that you can see here is the fine. 28 00:01:09,730 --> 00:01:10,680 Find the text. 29 00:01:11,020 --> 00:01:12,340 Now I want to get it. 30 00:01:12,430 --> 00:01:14,350 So get that. 31 00:01:14,350 --> 00:01:21,190 Find the text OK and what it that slash which means on my current directory or after this, put it on 32 00:01:21,190 --> 00:01:23,260 the desktop so we can distinguish. 33 00:01:23,260 --> 00:01:27,660 Because if I watch the current day three, it is the same Kelly home directory. 34 00:01:27,670 --> 00:01:31,660 So I slash desktop so you can see that transfer is complete. 35 00:01:31,990 --> 00:01:39,610 Now, if I go to Wireshark, if I right click on the first, as you can see the first, then ECB photo 36 00:01:39,740 --> 00:01:43,900 ECB stream, you can see we are start receiving. 37 00:01:44,980 --> 00:01:47,950 This is Candy Candy Bars. 38 00:01:48,580 --> 00:01:53,920 Here is the board some information and finally, we are receiving, as you can see, retrieve the find 39 00:01:53,920 --> 00:01:58,090 the text and the other sum that is transcript complete or whatever. 40 00:01:58,540 --> 00:02:06,400 So how to do and how to get the content of the fight, which is FTB Desktop Data Center. 41 00:02:06,430 --> 00:02:07,090 You can see that. 42 00:02:07,090 --> 00:02:08,270 Yeah, it is here. 43 00:02:08,289 --> 00:02:11,500 So from here, right click DCB Stream. 44 00:02:11,920 --> 00:02:14,410 You can see that we are receiving some data. 45 00:02:14,470 --> 00:02:16,760 This is the remember when we I type data. 46 00:02:17,140 --> 00:02:19,750 So we received the directory or lists. 47 00:02:21,150 --> 00:02:21,470 OK. 48 00:02:22,380 --> 00:02:29,040 Again, this would have to be this data here and here you can see we have the retrieved the file list 49 00:02:29,040 --> 00:02:30,810 list and here retained the file. 50 00:02:31,050 --> 00:02:38,370 So for the DCB stream and the Oh my god, you can see that we are seeing the plain text here completely. 51 00:02:38,640 --> 00:02:46,170 So you can see that this is the file as explained or as a plain text, which is something very dangerous.