1 00:00:01,150 --> 00:00:06,370 In this lecture, we are going to see how we can exploit the vulnerability that we found out in this 2 00:00:06,370 --> 00:00:06,939 lecture. 3 00:00:09,530 --> 00:00:12,950 Once we know the vulnerability, the next step is to exploit it. 4 00:00:13,160 --> 00:00:18,740 And the easiest way is to, with the help of Metasploit, we are going to exploit the FTP. 5 00:00:18,770 --> 00:00:24,050 We FTP the 2.3.4 vulnerability that we found out in the previous lecture. 6 00:00:29,430 --> 00:00:32,520 So start Metasploit with MSF console command. 7 00:00:39,490 --> 00:00:41,950 Search for vs TBD exploits. 8 00:00:42,840 --> 00:00:45,390 They give the command to the particular module. 9 00:00:50,430 --> 00:00:55,080 No set our goals to set the target and give the target machine IP. 10 00:00:59,050 --> 00:00:59,170 No. 11 00:00:59,260 --> 00:01:00,760 Give the command to exploit. 12 00:01:05,870 --> 00:01:06,080 No. 13 00:01:06,080 --> 00:01:07,760 Let's see that demonstration. 14 00:01:08,890 --> 00:01:13,540 So on your machine launch Metasploit with MSF console command. 15 00:01:24,110 --> 00:01:26,000 No such receptivity. 16 00:01:29,370 --> 00:01:31,530 You can see that it is listed. 17 00:01:38,170 --> 00:01:39,820 Select to use the exploit. 18 00:01:44,650 --> 00:01:47,260 You can see that it has selected a payload. 19 00:01:52,450 --> 00:01:54,350 I'll give the commanders two options. 20 00:01:57,840 --> 00:02:01,410 You can see different options that need to be set before launch this point. 21 00:02:08,880 --> 00:02:12,330 No sweat or hoarse IP at the target machine IP. 22 00:02:19,460 --> 00:02:20,720 No, no to exploit. 23 00:02:28,700 --> 00:02:31,880 And you can see that we have gained share to the target machine. 24 00:02:36,750 --> 00:02:39,720 No, you can lower different commands and you check the the system. 25 00:02:50,070 --> 00:02:52,470 Tectonic processes give us command. 26 00:03:02,320 --> 00:03:04,090 We can move to different directories. 27 00:03:08,010 --> 00:03:08,520 It's list. 28 00:03:08,590 --> 00:03:12,730 It could download different files and you can form all type of factions. 29 00:03:14,220 --> 00:03:17,010 I hope you like this lecture and see you in the next lecture.