1 00:00:01,660 --> 00:00:07,850 Such is right, and first before that, we will discuss about this expert who will come visit our expert 2 00:00:07,870 --> 00:00:08,440 advice. 3 00:00:08,440 --> 00:00:17,000 And here on the main page, you can see some keys and you can see the software and the remarkable execution. 4 00:00:17,290 --> 00:00:23,950 So if you go into this, you get the manual expert, you can download and tested this software. 5 00:00:25,270 --> 00:00:28,870 So here there is the option to download this expert. 6 00:00:28,870 --> 00:00:33,310 And for some applications, you have the application to download also. 7 00:00:34,240 --> 00:00:41,830 So this is the expert and you can use the search option to search for CCH exploits. 8 00:00:42,580 --> 00:00:48,040 Then you see are the records with a search in that title. 9 00:00:48,760 --> 00:00:52,330 So this is only the basic search. 10 00:00:52,390 --> 00:00:58,840 And also you need some Internet to connect to this expert database and you need to search through this 11 00:00:59,020 --> 00:00:59,500 Web site. 12 00:00:59,800 --> 00:01:07,140 So these are some nice websites, but this Web site will have a database, right? 13 00:01:07,570 --> 00:01:10,560 And this database will be used by our tool cart. 14 00:01:10,600 --> 00:01:11,380 Such right. 15 00:01:11,530 --> 00:01:17,260 And this will automatically get results based on this regular. 16 00:01:18,070 --> 00:01:22,660 So it has some more search capabilities than this website. 17 00:01:23,230 --> 00:01:26,600 So let's go ahead and at collect and search. 18 00:01:26,620 --> 00:01:27,040 Right. 19 00:01:27,040 --> 00:01:30,000 And mindstate for the HelpAge here. 20 00:01:30,030 --> 00:01:31,870 You can see there are a lot of options. 21 00:01:33,430 --> 00:01:38,200 And you can see, uh, these are the US, uh, search terms. 22 00:01:38,590 --> 00:01:43,660 And, uh, if you put the money in, it will be cases since you do so by default. 23 00:01:43,660 --> 00:01:47,270 The search parties case in Central to choose a computer. 24 00:01:47,290 --> 00:01:47,530 Yeah. 25 00:01:47,530 --> 00:01:50,260 It will also get the results for the spot also. 26 00:01:50,710 --> 00:01:54,370 And you need to specify minus for exact time. 27 00:01:55,090 --> 00:02:02,670 And you can also do the minus the option to search in the title of that, uh, exploit them. 28 00:02:03,160 --> 00:02:10,900 And you can see minus B to describe the part of this exploit minus three for purpose to see what's happening 29 00:02:11,800 --> 00:02:14,260 and minus you for a bit minus for her. 30 00:02:14,860 --> 00:02:17,720 So these are the basic options we will see in the search. 31 00:02:18,760 --> 00:02:22,300 So all you need to do is, uh, we need to search. 32 00:02:22,300 --> 00:02:22,690 Right. 33 00:02:22,960 --> 00:02:26,140 Let's buffer overflow. 34 00:02:29,710 --> 00:02:39,840 And there you can see there are so many exploits regarding this buffalo for now, you can also see and 35 00:02:39,970 --> 00:02:45,410 see it and you get the multiple options combining this is the hits. 36 00:02:45,780 --> 00:02:46,240 Awful. 37 00:02:47,260 --> 00:02:52,770 So now what I want to do is I want the exact value of this for fraud. 38 00:02:54,640 --> 00:03:02,080 So it has given this before or from now, let me say before or from one. 39 00:03:04,000 --> 00:03:10,060 So it's exactly getting the results of this before or for one. 40 00:03:15,150 --> 00:03:25,710 Now, let us search for eternal, this is the famous expert will be, uh, doing this, uh, Manat exploitation 41 00:03:25,710 --> 00:03:33,780 later and you can see this eternal recurrence of three exploits and both these three are the reward 42 00:03:33,780 --> 00:03:34,230 exploits. 43 00:03:34,230 --> 00:03:35,970 You can see here a remote. 44 00:03:35,970 --> 00:03:43,160 So you can assume that you get some reversal or anything like that because of this remote. 45 00:03:43,530 --> 00:03:49,600 So if you want to use this exploit, you need to copy this hour. 46 00:03:49,650 --> 00:03:56,630 First, there is a inWorld option in such right to sell ISP. 47 00:03:58,600 --> 00:04:05,530 Minus, you need to define that you are the expert, that the data is this number that we call this. 48 00:04:11,430 --> 00:04:19,680 And who don't know, it will show you that you are from the expert review and also the obsolete part 49 00:04:19,680 --> 00:04:22,520 of this remote four, two, three, one pilot. 50 00:04:23,370 --> 00:04:31,200 And either way, you need to or you can find this, you need to copy this file and you can simply say, 51 00:04:31,200 --> 00:04:31,710 look at. 52 00:04:33,990 --> 00:04:43,080 And you'll get the exact part of this fight and you can also send a copy of the symbol and you can look 53 00:04:43,080 --> 00:04:47,100 at this four, two, three, one fight at that point. 54 00:04:48,090 --> 00:04:53,710 So what this does is it will execute this command and it will put the all prepare. 55 00:04:53,910 --> 00:04:56,300 So we are simply copying this file. 56 00:04:56,550 --> 00:04:58,890 But to say desktop. 57 00:05:01,970 --> 00:05:09,100 So that it is similar to sleep, you're such an expert witness in what 141 further point to describe 58 00:05:09,470 --> 00:05:18,490 is similar to this, but we can use this summer to get around this comment and, uh, set up here. 59 00:05:20,850 --> 00:05:30,060 So we also can put this case to case change to such and such, right, by Nancy. 60 00:05:32,360 --> 00:05:43,640 For over four now we got to know this, because by default, there is there are only exploits with A 61 00:05:43,640 --> 00:05:45,750 capital, B and capital. 62 00:05:45,770 --> 00:05:46,700 All right. 63 00:05:47,090 --> 00:05:53,780 Every exploit has been cavalcades for strategies are uppercase. 64 00:05:53,780 --> 00:05:57,380 And the first letter of every word is Apricus. 65 00:05:57,650 --> 00:06:08,630 So what we have done is we are free to do not set for any other apparatus, other cases except this 66 00:06:08,630 --> 00:06:08,880 one. 67 00:06:09,440 --> 00:06:13,550 So it will only search for broadcast power or for it, announce it for uppercase. 68 00:06:13,550 --> 00:06:18,550 But for all that is useful for the that is the use of this C option. 69 00:06:19,440 --> 00:06:23,930 Wait until we get the results so we can also take a message. 70 00:06:24,010 --> 00:06:26,120 Now, it will not get any results. 71 00:06:29,020 --> 00:06:36,880 So the term for this we exploit this suspect is mainly used for searching this resource, and I hope 72 00:06:36,880 --> 00:06:40,780 you will even search for multiple results. 73 00:06:40,780 --> 00:06:43,980 You'll get the results and you can just use the expertise. 74 00:06:43,990 --> 00:06:46,780 The main purpose of this search, vital.