1 00:00:00,540 --> 00:00:08,690 So is in this room, we are going to use the X Prize to get the shelter to us, and in order to do that, 2 00:00:08,700 --> 00:00:16,860 I have tried this machine and I have said in the previous year that Babloo of Observer has the fruit 3 00:00:16,860 --> 00:00:17,730 fly exploit. 4 00:00:17,730 --> 00:00:22,040 And I have also showed you how to just use exploit. 5 00:00:22,050 --> 00:00:23,760 And we do not run that in this. 6 00:00:23,960 --> 00:00:24,930 We're going to run this. 7 00:00:25,110 --> 00:00:27,330 And you can see this is a bad group 2.0. 8 00:00:27,380 --> 00:00:34,500 And addition to run this, I think it's already been running on the property. 9 00:00:34,500 --> 00:00:41,730 And it's a website where it has the Buffalo front runner, Rudy, and we could use that to our advantage 10 00:00:41,730 --> 00:00:43,500 to get the share of the computer. 11 00:00:43,530 --> 00:00:47,260 That is the common problem I have to use for Babloo. 12 00:00:47,940 --> 00:00:54,510 Sorry, I'm showing this in the Windows XP machine because my laptop cannot run colonics machine and 13 00:00:54,600 --> 00:00:57,930 the seven automation takes so much amount of ram. 14 00:00:57,930 --> 00:01:05,340 And I have the dual compressor and it does affect workers and obviously tanks. 15 00:01:05,970 --> 00:01:16,440 So I want to use this exploit one, which is the pass through exploit and various options. 16 00:01:19,190 --> 00:01:26,960 So we need to set this up, our whole strategy, which is I have already said this one to this IP address. 17 00:01:35,390 --> 00:01:43,370 So now we can set the payroll, which we want, but this, uh, I will be showing this matter better 18 00:01:43,370 --> 00:01:44,290 in the next video. 19 00:01:45,260 --> 00:01:51,630 So all you have to learn is you need to just run this, uh, module and that's it. 20 00:01:51,650 --> 00:01:52,910 You will get the shuttle back to us. 21 00:01:52,920 --> 00:01:56,690 You can see setting the stage for the stage is being set. 22 00:01:56,840 --> 00:01:57,530 That is right. 23 00:01:57,560 --> 00:02:02,680 Indictor and then our Stader, that is the actual payload will be sent to that mission. 24 00:02:02,900 --> 00:02:04,930 So you can see Metropia decision to open. 25 00:02:05,120 --> 00:02:06,770 But don't worry about this Maroota. 26 00:02:06,770 --> 00:02:09,540 I'll be explaining about this matter, actually. 27 00:02:11,000 --> 00:02:14,840 So this is like a correction. 28 00:02:14,840 --> 00:02:20,560 Hiner Uh, which we can execute the matters what commands on that system. 29 00:02:20,570 --> 00:02:25,130 So she, uh, got the shuttle type help in this metaprogramming prompt. 30 00:02:25,460 --> 00:02:27,950 I can execute all of these comments. 31 00:02:28,250 --> 00:02:30,440 These are the post extradition comments. 32 00:02:30,440 --> 00:02:32,540 We can run after we got the shuttle. 33 00:02:32,690 --> 00:02:37,970 Since we got the shuttle, we got all these comments to get much more information and control over that 34 00:02:37,970 --> 00:02:38,750 target mission. 35 00:02:39,170 --> 00:02:42,200 So what we're doing is push exploration in, uh, video. 36 00:02:42,640 --> 00:02:45,530 Oh, but no, I'm going to back on this. 37 00:02:45,530 --> 00:02:48,770 One can see it saying by growing session, too. 38 00:02:48,980 --> 00:02:52,490 So to restart the sessions, I can say sessions my minocin. 39 00:02:54,660 --> 00:03:01,380 So as you can see, the idea of the session and the Nimmitabel access to Windows and Expeditor, so 40 00:03:01,380 --> 00:03:09,090 that is the x ray machine and this is our IP address and the two connected to this, um, with the machine 41 00:03:09,090 --> 00:03:18,840 and this put out right now, I can just clear the session sessions of my desk and I have to pass the. 42 00:03:20,550 --> 00:03:24,770 So as you can see, there are no sessions no matter session to was closed. 43 00:03:25,230 --> 00:03:33,030 So that's how, you know, what I want to do is I will generate a payload that is reversible and I will 44 00:03:33,030 --> 00:03:36,210 execute on that Windows XP machine we are using. 45 00:03:36,210 --> 00:03:40,530 That was a for this and of my speed and I was for the payload. 46 00:03:43,750 --> 00:03:45,170 Of intersectionality. 47 00:03:50,670 --> 00:03:52,030 And I want to put the whole. 48 00:03:59,950 --> 00:04:04,660 So this is my colleague Sipi machine, and I want to say the report is equal to one, two, three, 49 00:04:04,660 --> 00:04:05,020 four. 50 00:04:08,490 --> 00:04:12,020 Architecture 686, that is the root of it and the bad characters. 51 00:04:19,020 --> 00:04:26,010 Well, since it's a normal day, we put these bad characters and say executable and I want to point 52 00:04:26,010 --> 00:04:33,840 this out to the CIA, uh, shelled out the backdoor. 53 00:04:38,560 --> 00:04:44,230 So there is some difference between the normal cell and the normal windows. 54 00:04:45,550 --> 00:04:50,450 Uh, we can handle with, uh, it turns out that we have seen in that country. 55 00:04:50,530 --> 00:04:53,620 So you can catch this, uh, reversal using the net. 56 00:04:53,890 --> 00:05:00,460 But in case of metaphysicians, that is, uh, we are using stages and, uh, stagers, then we need 57 00:05:00,460 --> 00:05:05,070 to use the multi handwrote in a better way to handle those corrections. 58 00:05:05,470 --> 00:05:06,070 Uh, OK. 59 00:05:06,120 --> 00:05:08,740 You see the word multi handler in the next video. 60 00:05:09,610 --> 00:05:14,410 We so no less, uh, RTR. 61 00:05:16,760 --> 00:05:18,030 So we have to back Dorothy. 62 00:05:18,470 --> 00:05:19,960 OK, that's fine, right? 63 00:05:20,150 --> 00:05:21,560 We turn to the desktop. 64 00:05:30,190 --> 00:05:36,700 So now I'm going to copy this into this, understand? 65 00:05:41,600 --> 00:05:44,330 So now, again, according to those exclamation. 66 00:05:45,860 --> 00:05:49,130 So I have to love this because it's a basic. 67 00:05:50,120 --> 00:05:54,290 Uh, it will be Easy Rider and Forbearer, uh, defender. 68 00:05:54,920 --> 00:05:56,260 So this is my back door. 69 00:05:56,930 --> 00:06:00,370 So before running our back door, we need to listen. 70 00:06:01,580 --> 00:06:07,530 Uh, we need to set up a receiver to catch incoming connections, uh, with what we have said. 71 00:06:07,610 --> 00:06:08,320 One, two, three, four. 72 00:06:08,330 --> 00:06:15,050 Put in the back seat so that metadata will connect to our iReporters at this point. 73 00:06:15,740 --> 00:06:17,150 So we go on listening. 74 00:06:20,110 --> 00:06:22,570 And I have I got to show this. 75 00:06:25,700 --> 00:06:31,160 So care to get the love this can type shall? 76 00:06:33,060 --> 00:06:40,200 So as you can see, Windows XP coming from considerable to restore the tree and you can also open the 77 00:06:40,200 --> 00:06:42,400 contents using the more common and so on. 78 00:06:42,960 --> 00:06:48,420 So that's how you exploit using this exploit. 79 00:06:48,900 --> 00:06:51,960 Now, I'm going to end this. 80 00:06:53,520 --> 00:06:54,600 So this one. 81 00:06:59,740 --> 00:07:04,900 So, OK, that's how you got the cell phone, no matter whether you like the cell and you get the current 82 00:07:04,900 --> 00:07:10,120 problem, OK, no, let's come back to a normal execution of this. 83 00:07:11,020 --> 00:07:14,130 Shall better know you're going to sitting on one, two, three, four. 84 00:07:14,830 --> 00:07:15,820 Up upon execution. 85 00:07:16,210 --> 00:07:17,300 So let me run this. 86 00:07:18,730 --> 00:07:21,820 So as you can see, we got the same coming back to us. 87 00:07:22,330 --> 00:07:23,210 Concerta. 88 00:07:24,460 --> 00:07:25,810 So this is not the scrub. 89 00:07:25,810 --> 00:07:28,110 That's why we got this, uh, desktop. 90 00:07:28,120 --> 00:07:37,120 We are executing the current product from this desktop so we can sell more to the files, so. 91 00:07:40,290 --> 00:07:43,710 OK, I'm not familiar with from comments that much. 92 00:07:44,600 --> 00:07:46,790 That's all for this segment. 93 00:07:47,160 --> 00:07:47,970 It's this. 94 00:07:48,810 --> 00:07:49,920 So the for this area. 95 00:07:49,950 --> 00:07:52,950 This is the basic creation of this, a back door. 96 00:07:52,950 --> 00:07:55,230 And we can also include it. 97 00:07:56,130 --> 00:08:02,730 But it takes so much complexity for this video, the server, this video, how to use the word exploit 98 00:08:02,730 --> 00:08:07,130 and also how you create the appearance and execute using the image of.