1 00:00:00,480 --> 00:00:06,930 So think this will be doing another technique that is called underwater service, but so there is a 2 00:00:06,930 --> 00:00:09,900 service running on, so that is uncoded. 3 00:00:09,900 --> 00:00:17,130 As you see, we will find out how to find the underwater services, the solutions with underwater part. 4 00:00:17,460 --> 00:00:20,830 So what you have is here there is a quarter report, right? 5 00:00:20,910 --> 00:00:28,020 So I'm going to find Chris this. 6 00:00:36,980 --> 00:00:45,870 So we need to find the services that have the uncoded part, so one tool you can use is the beauty of 7 00:00:45,890 --> 00:00:54,340 my seat, so he normally can be executed by the users of the administrator group. 8 00:00:54,770 --> 00:01:02,720 So but the default configuration allows normal user to use the debris. 9 00:01:02,920 --> 00:01:04,060 My seat, he said. 10 00:01:04,080 --> 00:01:08,150 Mr Brogden, real WMI psychosis. 11 00:01:09,020 --> 00:01:10,460 Then you can use the PowerShares. 12 00:01:11,090 --> 00:01:12,470 So first the. 13 00:01:12,790 --> 00:01:13,300 I see. 14 00:01:13,970 --> 00:01:16,150 So you need to see a service. 15 00:01:16,430 --> 00:01:18,230 So this will restore the services. 16 00:01:20,800 --> 00:01:27,830 It's going to take a while and, ah, the seriousness with the parts, so how to filter in a need for 17 00:01:27,860 --> 00:01:33,520 format so you can get name and Puttnam. 18 00:01:37,560 --> 00:01:41,010 So on now, full stop. 19 00:01:41,040 --> 00:01:47,040 So not on this, no, you can see it, this is the service name and this is the part. 20 00:01:47,160 --> 00:01:49,140 And there you can see there is no code. 21 00:01:49,590 --> 00:01:52,110 And one example for the quarter services. 22 00:01:52,140 --> 00:01:54,480 This is the service name and this is the code. 23 00:01:54,660 --> 00:02:01,120 So you can see the codes here and there is no double cuts over here. 24 00:02:01,260 --> 00:02:11,200 OK, so what I'm going to do is I'm going to filter the narcoterrorists, so find Ishtiaq. 25 00:02:11,550 --> 00:02:14,930 So this financial year is similar to the group in Linux. 26 00:02:15,240 --> 00:02:18,510 So instead of minus, you can keep this trash. 27 00:02:18,960 --> 00:02:26,730 So we prefer not to include a system that the bigger system that cannot be readable by the normal user. 28 00:02:31,140 --> 00:02:34,680 So this will lead to. 29 00:02:36,420 --> 00:02:42,880 So it will not include the capitalist system that we do and a system that now we don't know. 30 00:02:42,930 --> 00:02:48,600 We got some services and they're part of the quote and unquote. 31 00:02:48,610 --> 00:02:48,980 Right. 32 00:02:48,990 --> 00:02:54,480 So what we are going to do is you can sort of find string. 33 00:02:56,220 --> 00:03:04,830 Strategy not to include quotation marks, so you need to put the back rush, because this is Pescatore 34 00:03:04,830 --> 00:03:08,400 to remove get rid of their specialness. 35 00:03:08,420 --> 00:03:11,330 So you need to put the backorders no hit enter. 36 00:03:11,760 --> 00:03:18,000 And you can see the only services are with their uncoded service spots. 37 00:03:18,820 --> 00:03:21,960 So there is one vulnerability. 38 00:03:22,340 --> 00:03:30,470 So so let's compare this one and there is a track me I have on the box. 39 00:03:30,480 --> 00:03:34,050 So we're all going on to this and the same goes. 40 00:03:43,380 --> 00:03:44,610 So if you run this. 41 00:03:54,170 --> 00:04:02,870 So now you can see we had a program first, etc., so another one is uncoded, as you see, so that 42 00:04:02,870 --> 00:04:06,440 is what they're telling us, uncoded, as you see. 43 00:04:07,040 --> 00:04:12,620 So they did not only to find the solution with encoders of his part, but we can use that WNYC. 44 00:04:12,980 --> 00:04:16,980 So now let's concentrate on why we are interested in uncoated. 45 00:04:17,640 --> 00:04:21,400 So there is no quotes around this one around this. 46 00:04:21,410 --> 00:04:28,070 But so the first velocities for the program for us in the cedar tree, there is a program for and there 47 00:04:28,070 --> 00:04:31,770 is a space between this program, first name. 48 00:04:32,210 --> 00:04:39,290 So if you have the program, be ACCE in the C program files, then it will automatically execute the 49 00:04:39,290 --> 00:04:39,860 program. 50 00:04:41,570 --> 00:04:44,020 So you need to put the biorhythm. 51 00:04:44,030 --> 00:04:44,630 Exactly. 52 00:04:44,630 --> 00:04:46,190 Kepler P program. 53 00:04:47,390 --> 00:04:52,580 So when we're not taking this uncoded, as you see, it would take Fasi program first and there is a 54 00:04:52,580 --> 00:04:59,470 program that Yuxi it gets executer and in a similar way in the second quarter on quarter potteries. 55 00:04:59,870 --> 00:05:03,920 So you need to put the binary names uncoated that you see. 56 00:05:03,980 --> 00:05:11,450 So that gets executer and in the common files in the same where you can put the commander acce so whenever 57 00:05:11,450 --> 00:05:14,220 you start the service it gets executer. 58 00:05:15,440 --> 00:05:21,820 So before these are not good executer if you put the commander around are not easy. 59 00:05:22,070 --> 00:05:26,890 So that's why we will be executing our missions reverser. 60 00:05:27,770 --> 00:05:31,870 So we have created in the previous year that is reverse 64 you see. 61 00:05:32,750 --> 00:05:34,060 So let's washed-out. 62 00:05:37,430 --> 00:05:41,300 And we use power to transfer into, uh, machine. 63 00:06:09,380 --> 00:06:15,920 So you can also use the access to to find the right double digit trees and then you can move on to the 64 00:06:15,920 --> 00:06:19,640 territory so you can go out to the percentage. 65 00:06:20,020 --> 00:06:24,440 So there you can read any file there by any use. 66 00:06:35,220 --> 00:06:35,670 Oh. 67 00:06:41,440 --> 00:06:44,020 So it's obligatory for my Mr.. 68 00:06:49,420 --> 00:06:54,180 So now we have the reverse 64 deoxy. 69 00:06:56,750 --> 00:07:04,220 So let's start there, listener, know what we are going to do is we need to find out whether the trees 70 00:07:04,700 --> 00:07:05,730 are right or not. 71 00:07:05,750 --> 00:07:06,990 So what is the territory? 72 00:07:08,300 --> 00:07:09,260 So what is the. 73 00:07:12,310 --> 00:07:17,960 So what is the actual service, no service that is uncoded as USERRA. 74 00:07:20,360 --> 00:07:24,410 So let's ask for the configuration now we have, though, about. 75 00:07:27,880 --> 00:07:35,020 So that's on it's copy this one on good, bad service. 76 00:07:36,940 --> 00:07:39,160 Oh, no, you can use the common garden I. 77 00:07:41,950 --> 00:07:43,750 So this will show you the 78 00:07:46,660 --> 00:07:49,750 permissions on this. 79 00:07:52,420 --> 00:07:58,980 Now you can see the system administrators, users, users, how Nabavi inheritance and be executed. 80 00:07:59,590 --> 00:08:05,360 So their object inheritance and you can access all the objects in the Florida and container inheritance. 81 00:08:05,680 --> 00:08:09,600 You can also go access the folders inside the Florida. 82 00:08:09,880 --> 00:08:12,280 And we have some group or group. 83 00:08:12,490 --> 00:08:12,760 Good. 84 00:08:13,300 --> 00:08:14,500 I forgot about this. 85 00:08:14,530 --> 00:08:16,870 These are some special permissions. 86 00:08:16,870 --> 00:08:19,390 You can check that in the Microsoft documentation. 87 00:08:20,920 --> 00:08:23,860 And I think creator owners have the full access. 88 00:08:24,160 --> 00:08:30,420 OK, so let's go to another one. 89 00:08:30,430 --> 00:08:31,720 That's a common first. 90 00:08:39,800 --> 00:08:43,190 So it doesn't have the same properties. 91 00:08:43,220 --> 00:08:43,630 OK. 92 00:08:49,690 --> 00:08:53,740 So now you can say who my group's. 93 00:08:57,870 --> 00:08:59,850 Groups who are in the users group. 94 00:09:03,910 --> 00:09:09,280 All the negative results, so now you can go to these groups. 95 00:09:14,380 --> 00:09:22,850 I think I don't know, we have the right axis on also in the track meet down told using the access to 96 00:09:22,900 --> 00:09:23,670 dirty exit. 97 00:09:25,120 --> 00:09:27,490 So anyway, let's use that one. 98 00:09:34,070 --> 00:09:38,370 So you the suppressors were both you and tree, right? 99 00:09:39,260 --> 00:09:44,210 So writable and pushed the pot here. 100 00:09:47,520 --> 00:09:51,270 And you can see users have the Firaxis. 101 00:10:00,550 --> 00:10:03,700 So let's also give you the permissions for the common files. 102 00:10:13,510 --> 00:10:25,070 We do not have access, so that's just anyway, covid is one, so the worst is to the U.S. So Cappato 103 00:10:27,040 --> 00:10:33,730 are our program for us and we need to put the uncoded dirty. 104 00:10:39,110 --> 00:10:46,940 So I just so you know, if you do not check this one, you can just copy to this as a program where 105 00:10:47,310 --> 00:10:49,830 we are on your cosmonautics. 106 00:10:58,850 --> 00:11:06,050 So let's go to the common fight in Florida as a common dirty tender, and you can see we have it. 107 00:11:09,570 --> 00:11:13,970 Now we are visiting on our carry box, so let's restart this one. 108 00:11:14,000 --> 00:11:15,200 Let's start. 109 00:11:17,750 --> 00:11:19,100 And Encoders Harris. 110 00:11:22,200 --> 00:11:23,520 Not on this record. 111 00:11:25,470 --> 00:11:26,350 So who am I? 112 00:11:26,640 --> 00:11:34,810 And so the diplomacy is a good tool to enumerate. 113 00:11:34,830 --> 00:11:44,190 So we will make another video on WNYC and Renumeration Alone so you can use the WNYC to filter the services 114 00:11:44,400 --> 00:11:47,730 that have only the uncoded service spots. 115 00:11:48,510 --> 00:11:50,190 So you can also use the power of. 116 00:12:08,790 --> 00:12:11,400 So let me open this. 117 00:12:17,070 --> 00:12:21,660 So there are some functions bujagali for and some response. 118 00:12:44,060 --> 00:12:48,640 So it's always a best idea to run, are the Turks OK? 119 00:12:52,480 --> 00:12:54,580 So this is the war function. 120 00:12:57,090 --> 00:12:59,700 And she was called to some functions. 121 00:13:10,780 --> 00:13:15,340 So these are the I think these are the functions, so are you concerned? 122 00:13:19,650 --> 00:13:21,930 OK, so you can get service on. 123 00:13:22,310 --> 00:13:28,740 So I think this will get only the encoders service spots. 124 00:13:28,740 --> 00:13:30,000 So let's call this. 125 00:13:36,680 --> 00:13:37,580 So good service. 126 00:13:38,060 --> 00:13:39,890 So, OK, let's try to run this. 127 00:13:49,540 --> 00:13:56,090 So we are importing and then getting the services we don't call service spots. 128 00:13:56,800 --> 00:14:02,050 So let's run this and you can see there are two services. 129 00:14:02,050 --> 00:14:05,640 One is program funds like they do not exist. 130 00:14:05,890 --> 00:14:13,360 So if you can try to program the exceeds, fine, then you can see on the service. 131 00:14:14,560 --> 00:14:18,510 So this if you had a partial, you can use the power of be as one. 132 00:14:18,520 --> 00:14:23,140 This makes life easier or you going to use diplomacy. 133 00:14:23,770 --> 00:14:33,370 And if you don't have that Abramsky access, so you I think you can just use the committee as security. 134 00:14:33,430 --> 00:14:38,710 So you get all the service names you need to thurtell this one and you can. 135 00:14:40,880 --> 00:14:48,080 I see I don't know how to do this, so I think you need to act like this using a bad script, a run 136 00:14:48,080 --> 00:14:56,470 of bad scripting to copy the service name as security and Jerusalem, so to do the binary partner. 137 00:14:56,900 --> 00:15:00,110 So then you can understand this does not help quotes. 138 00:15:01,970 --> 00:15:11,240 So, OK, I will search for the net for this bad group to filter and display only the service spots. 139 00:15:12,650 --> 00:15:14,110 OK, that's all for this video. 140 00:15:14,120 --> 00:15:20,240 We have learned that the only service that is running from the part which does not have the codes, 141 00:15:20,690 --> 00:15:23,770 then you can play the malicious bandleader and get the reverser.