1 00:00:00,690 --> 00:00:07,890 So let's talk about this vulnerability exploits Pilate's so vulnerable to the arms configuration of 2 00:00:07,890 --> 00:00:09,660 a software, it's called vulnerability. 3 00:00:11,300 --> 00:00:18,020 So this vulnerability, right, this one, there is no proper coding or poor coding application. 4 00:00:19,440 --> 00:00:24,540 And this, uh, misconfiguration are from is called vulnerability. 5 00:00:26,670 --> 00:00:33,510 And this was identified by the hacker and that expert, the way a hacker takes advantage of vulnerability 6 00:00:33,600 --> 00:00:34,400 is called expert. 7 00:00:34,650 --> 00:00:42,660 So the hacker phone that there is a vulnerability for attack as some people are building or any network 8 00:00:42,670 --> 00:00:43,100 protocol. 9 00:00:43,830 --> 00:00:48,880 So the hacker writes, the exploit could take advantage of this one winnability. 10 00:00:49,260 --> 00:00:55,480 So after exploiting, the hacker gets access to our current system. 11 00:00:55,500 --> 00:00:58,270 And so this general definition of the payload. 12 00:00:58,740 --> 00:01:06,270 This is not an exact definition, but in general, hacker, it reversal are a common problem of the 13 00:01:06,270 --> 00:01:15,130 system and hacker controls that stop using our common problem in general, I guess it is said as a parent. 14 00:01:15,810 --> 00:01:20,470 So let me compare this three to a real world scenario. 15 00:01:20,690 --> 00:01:26,600 Suppose think you are a thief and the Reserve Bank and you need to rob the credit. 16 00:01:27,240 --> 00:01:30,650 Of course, you choose the right thing because there will be no one. 17 00:01:30,660 --> 00:01:40,410 And you found that there is a door which is very weak and you can just simply use some tools and you 18 00:01:40,410 --> 00:01:45,510 can take advantage of the weak dollar that is called vulnerability. 19 00:01:45,780 --> 00:01:49,020 That Nick Birdie's controversial ability and the expertise. 20 00:01:50,340 --> 00:01:55,190 You are using some tools to exploit that victor to break that record. 21 00:01:55,860 --> 00:02:00,020 So the process of breaking is caught exploiting and the penalties. 22 00:02:00,030 --> 00:02:03,880 Of course, you get money from the bank and the money is called. 23 00:02:05,220 --> 00:02:07,160 So Hacker gets access to them. 24 00:02:07,350 --> 00:02:10,830 In this case, our bank robber gets money from their bank. 25 00:02:10,830 --> 00:02:17,550 That is useful from the other organization in our real world. 26 00:02:17,550 --> 00:02:22,230 Example from the bank, the money is culpable, right? 27 00:02:23,130 --> 00:02:24,840 Are you going to the bank? 28 00:02:24,840 --> 00:02:26,940 Which the robber carries is Carapella.