1 00:00:00,620 --> 00:00:05,670 This initiative will see how to pivot into other machines using the metals, but soon the police will 2 00:00:05,670 --> 00:00:08,400 be seen using the proxy kings. 3 00:00:08,670 --> 00:00:10,320 So how explain the theory. 4 00:00:10,830 --> 00:00:19,110 So I will just briefly explain about pivoting to this then Xbox One, not for and the Windows seven 5 00:00:19,110 --> 00:00:23,720 machine, which is in the same network of this car, the next one, not three. 6 00:00:23,970 --> 00:00:27,630 And it has also another adapter, 126 to control it. 7 00:00:27,810 --> 00:00:30,620 And it is connected to this part of the machine. 8 00:00:31,620 --> 00:00:36,450 So, uh, we cannot connect from guardedness to this world. 9 00:00:36,510 --> 00:00:40,040 So so that's why we need to compromise this machine. 10 00:00:40,050 --> 00:00:45,710 And then from here on out, we need to, uh, pivot into this machine and scan the machine. 11 00:00:45,900 --> 00:00:46,920 So let's do that. 12 00:00:48,930 --> 00:00:52,110 We can generate the, uh, shirker. 13 00:00:57,700 --> 00:01:00,980 So, OK, now we need to read the meter reader. 14 00:01:12,780 --> 00:01:20,200 sars-cov-2 GP and said they're hussian the report to our Guardedness IP address and say Yuxi output 15 00:01:20,430 --> 00:01:22,620 say something temporary. 16 00:01:23,640 --> 00:01:25,580 So it already created this one. 17 00:01:26,340 --> 00:01:29,270 So it's in my eye. 18 00:01:29,470 --> 00:01:30,100 I do your name. 19 00:01:30,100 --> 00:01:31,940 Ritters one two three four four four four. 20 00:01:31,950 --> 00:01:35,190 That is Monastery's IP address and the forward esport. 21 00:01:35,580 --> 00:01:37,560 So get already created this one. 22 00:01:41,540 --> 00:01:48,770 So you can see here, uh, this is I have transferred to this Wintersun machine, so before, uh, running 23 00:01:48,770 --> 00:01:50,650 that we need to set the handwrote. 24 00:01:56,930 --> 00:02:05,350 So when you said the panel said it, as a matter of you, copy this, Petrea. 25 00:02:16,660 --> 00:02:18,050 Prince said that Horst. 26 00:02:26,660 --> 00:02:30,330 Options now, everything you said, no, let's run the handle. 27 00:02:30,920 --> 00:02:32,390 So get out of is running. 28 00:02:32,420 --> 00:02:35,880 Now let's run this one so we get the connection. 29 00:02:36,770 --> 00:02:43,220 So were you doing the machine strike in the works or what? 30 00:02:44,390 --> 00:02:47,110 So you'll get the initial exercise of this shirt. 31 00:02:47,660 --> 00:02:52,490 OK, now take the idea of conflict so you can see there are so many adapters. 32 00:02:52,760 --> 00:02:55,220 So you can see that I want you to do whatever it takes. 33 00:02:55,710 --> 00:02:56,810 This is our machine. 34 00:02:57,080 --> 00:03:00,910 So it may be that maybe some other like hosting this summit. 35 00:03:01,280 --> 00:03:07,580 So to add road to this, you need to run a model Garderobe run. 36 00:03:10,130 --> 00:03:19,160 Arcaro, so it will add a road from the car next to this is where the Bluebox via decision, but not 37 00:03:19,160 --> 00:03:20,200 to my knowledge. 38 00:03:22,100 --> 00:03:24,770 OK, this one is deprecatory Garceau. 39 00:03:24,770 --> 00:03:28,090 Use the post multi-manager so you can also use this model. 40 00:03:28,280 --> 00:03:37,580 So far, no, I'm using this other route so I need to specify the subnet and I can say 192 dot 168 dot 41 00:03:37,940 --> 00:03:39,440 126. 42 00:03:39,440 --> 00:03:41,390 Dot one says 24. 43 00:03:43,270 --> 00:03:51,100 And he didn't know the road has been successfully added, he can see added rope to this subnet. 44 00:03:51,490 --> 00:03:53,430 Well, yeah, this one not so. 45 00:03:53,440 --> 00:03:56,660 OK, let's on this and road. 46 00:03:57,250 --> 00:03:59,470 So why not three's our own mission. 47 00:03:59,950 --> 00:04:05,850 So subunit there is a road to the summit and wired session one. 48 00:04:06,250 --> 00:04:09,300 So the session one is that we do not have access to. 49 00:04:11,410 --> 00:04:15,010 OK, now we can search for Potiskum. 50 00:04:17,160 --> 00:04:22,770 So you can use this 51 and options. 51 00:04:25,550 --> 00:04:27,290 And you can set Darvas. 52 00:04:33,890 --> 00:04:37,010 And I'm keeping the folks who want to handle. 53 00:04:49,310 --> 00:04:54,730 Secretariats, so Albertus has been set and the both have been set. 54 00:04:54,780 --> 00:04:58,770 OK, now let's simply run the command. 55 00:05:01,730 --> 00:05:09,050 So you can see 21 is open, 22, 24, 23 open, so our boats can get comparators. 56 00:05:09,070 --> 00:05:17,300 So that's how you use the, uh, metal spreader at the root module to add a rope from this car next 57 00:05:17,300 --> 00:05:21,500 to the other machine via this compromisable. 58 00:05:21,740 --> 00:05:24,410 So it is very simple using the metal plate. 59 00:05:24,950 --> 00:05:28,370 And I'll show you how to use the socks also. 60 00:05:29,720 --> 00:05:36,620 It's socks, socks, proxy, yes, oxalis socks, proxy's one. 61 00:05:40,010 --> 00:05:41,810 So let me describe the options. 62 00:05:43,760 --> 00:05:52,070 So you can you need to set a proxy on this side and then you need to similar we both for using that 63 00:05:52,070 --> 00:06:00,950 as his age or even authority wrote, is that we can, uh, set up as a proxy and you can scan this machine 64 00:06:00,950 --> 00:06:03,660 and this will be transferred to this bedspread. 65 00:06:04,280 --> 00:06:05,930 So it's similar. 66 00:06:05,930 --> 00:06:08,330 But here the section. 67 00:06:12,550 --> 00:06:17,860 So he had this session will act as a bridge between our guardedness and.