1 00:00:00,210 --> 00:00:08,240 This video, we're going to see the known vulnerabilities and there are already so many guys who wrote 2 00:00:08,260 --> 00:00:13,990 the expose for this one lied it is there is there any software about Tomcat? 3 00:00:14,070 --> 00:00:20,910 And there are innumerable Descender now operate these exploits into this exploit so expertly, which 4 00:00:20,910 --> 00:00:26,670 is the one of the best, uh, database that exploits and vulnerabilities. 5 00:00:26,670 --> 00:00:34,530 And also for pilots, you will see in the despite the there is a tool called the search point and it 6 00:00:34,530 --> 00:00:37,610 will use this expert database to search over the experts. 7 00:00:37,980 --> 00:00:43,170 So here they are saying that they have already have the machine and it has running water is four point 8 00:00:43,170 --> 00:00:48,080 six and it's vulnerable to an article and indicator, uh, remote code execution. 9 00:00:48,240 --> 00:00:51,560 So we need to find out this expert. 10 00:00:51,570 --> 00:01:00,900 I need to run this to the computer and and this one, this Nostromo one nine point six. 11 00:01:01,410 --> 00:01:06,450 And this is like a bookstore and it's having this remarkable execution. 12 00:01:06,450 --> 00:01:07,110 Wonder this. 13 00:01:07,110 --> 00:01:11,820 You can go to this particular call and you can search here. 14 00:01:13,050 --> 00:01:17,910 Nostromo option number one point nine point six. 15 00:01:22,640 --> 00:01:30,120 So we got this remarkable execution so we can actually run this. 16 00:01:30,770 --> 00:01:36,410 I have I have actually did this one and it took me so much time to run this group because this group 17 00:01:36,410 --> 00:01:36,740 failed. 18 00:01:36,770 --> 00:01:38,410 And how is it this and this group? 19 00:01:38,690 --> 00:01:40,790 So this is just a comment here. 20 00:01:41,150 --> 00:01:44,200 And this is like sending a verbal request. 21 00:01:44,330 --> 00:01:46,840 We are not getting actually any reversal. 22 00:01:47,480 --> 00:01:50,720 So this you can try you can do to try. 23 00:01:52,550 --> 00:01:59,880 And what we're going to do is we need to search another way to explain this one. 24 00:01:59,900 --> 00:02:03,500 So what you want to do is you need to go to this. 25 00:02:05,960 --> 00:02:12,000 Go to this website first and let's roll Marone for version number. 26 00:02:12,020 --> 00:02:19,970 So obviously I did not find any version number here that is just showing up on NCSA bookstore Comprehensibility. 27 00:02:21,230 --> 00:02:24,230 So I have already searched through all of these links. 28 00:02:24,230 --> 00:02:27,810 I did not get any, uh, Russian. 29 00:02:27,860 --> 00:02:28,160 No. 30 00:02:28,190 --> 00:02:33,100 So they have already told this one by nine point six, but I use it to search for it. 31 00:02:33,320 --> 00:02:39,590 So this tool I have covered in this book publishing section and all you want to say is online book. 32 00:02:42,100 --> 00:02:47,760 So this is some online so you can see online bookstore zero on other indicators. 33 00:02:48,100 --> 00:02:59,410 So they have told us to look for this and other digital RC and I copied this one writing copy and copying 34 00:02:59,410 --> 00:03:00,960 it to this distributor to. 35 00:03:06,660 --> 00:03:15,370 So these suspect will have the track of this latest and fix it exploits inexpertly with some other expert 36 00:03:15,390 --> 00:03:18,420 and we need to understand more and we need to fix some. 37 00:03:19,080 --> 00:03:23,630 So you'll see this in the manual exploitation contesting section. 38 00:03:24,240 --> 00:03:25,440 So I have covered this. 39 00:03:25,470 --> 00:03:29,740 Let's go ahead and check this for seven radiation therapy. 40 00:03:29,800 --> 00:03:32,660 Right now. 41 00:03:32,670 --> 00:03:40,260 It's asking for you are you are at the target and then it's executing the Shetlanders. 42 00:03:40,260 --> 00:03:40,560 Correct. 43 00:03:41,970 --> 00:03:50,340 And it's using the parameter in the you are this close to us, then it will execute and then we will 44 00:03:50,340 --> 00:03:52,240 get the reversal. 45 00:03:53,070 --> 00:04:01,500 So it is attempting to approach the rapture and we are posting that of a shell and we are going to this 46 00:04:01,870 --> 00:04:09,480 other then the bite of the reversion script, which will it in the current parameter value, then it 47 00:04:09,480 --> 00:04:10,090 will be loaded. 48 00:04:11,310 --> 00:04:14,340 So that's the brief theory of what this, uh. 49 00:04:16,930 --> 00:04:29,070 This X-Rite or that Surbiton Bryton, three, four, seven, and that's on this expert to see any usage. 50 00:04:30,430 --> 00:04:34,260 So we need to specify you are so right. 51 00:04:37,220 --> 00:04:39,910 So this one is there you are so 52 00:04:43,850 --> 00:04:45,720 so we can do this here. 53 00:04:48,100 --> 00:04:53,830 So it has a part of this that you can see this here we go to this. 54 00:04:54,100 --> 00:04:58,380 You have this controversial script, which it has already uploaded. 55 00:04:58,720 --> 00:05:02,710 So I'm on I'm entering way to get this. 56 00:05:03,070 --> 00:05:07,720 You can see we have got the order to allow us to see any flex. 57 00:05:08,650 --> 00:05:13,890 So we have all these BHP files and image files to who might. 58 00:05:15,700 --> 00:05:17,410 So we are double double the data. 59 00:05:17,740 --> 00:05:24,460 So now what they're asking, so how many characters are tonetti positivity and how are they told us 60 00:05:24,460 --> 00:05:25,330 to use W.S.? 61 00:05:25,390 --> 00:05:26,500 That is what concurrent. 62 00:05:27,760 --> 00:05:29,390 So C minus. 63 00:05:29,410 --> 00:05:32,730 See let's see past. 64 00:05:34,420 --> 00:05:36,600 So if you're on this, we got this one six one one. 65 00:05:38,320 --> 00:05:46,920 So this is how you use the already nonlinearities exploit and get their version back to us. 66 00:05:47,530 --> 00:05:48,640 So that's how far this year. 67 00:05:48,810 --> 00:05:49,690 I hope you understand. 68 00:05:49,900 --> 00:05:55,480 So this if this seems confusing, don't worry. 69 00:05:55,480 --> 00:06:02,200 After the network contesting the section, you just come back here and try to exploit this easy to exploit 70 00:06:02,200 --> 00:06:05,020 this one because you have no understanding of the expert. 71 00:06:05,090 --> 00:06:12,310 We anticipate and matosi, even in the matters where it may contain this exploit, can set further than 72 00:06:12,310 --> 00:06:15,510 you can execute the expert and you get the. 73 00:06:16,330 --> 00:06:19,340 So the after this, you know, I hope we understood the nonlinearities. 74 00:06:19,570 --> 00:06:21,580 There are already vulnerabilities and exploits. 75 00:06:21,580 --> 00:06:25,900 You need to find those exploit and fix those, exploit and run those exploits.