1 00:00:00,360 --> 00:00:06,260 So in this box, the the box and I got to spend one on one. 2 00:00:08,370 --> 00:00:15,300 You can see I have ordered them and my scan and these books are open as switchboard is open and property 3 00:00:15,660 --> 00:00:17,400 and some other spots are open. 4 00:00:17,760 --> 00:00:21,910 So six, six, nine, seven, six, seven and six, five, four, three, four. 5 00:00:23,410 --> 00:00:23,820 OK. 6 00:00:23,850 --> 00:00:30,560 And no YouTube reports, although since I had seen servers running on and it also got the abortion. 7 00:00:30,590 --> 00:00:33,880 And so we can use the search. 8 00:00:33,930 --> 00:00:34,530 Right. 9 00:00:37,520 --> 00:00:47,780 And until I see so it says under your CD and the number is through to the back door, come on, execution 10 00:00:47,930 --> 00:00:48,830 and downloader. 11 00:00:49,100 --> 00:00:56,730 And so we are not going to use this staggering floor and the three point dinner service. 12 00:00:56,730 --> 00:01:01,000 So we don't want this to we are focused on this current execution. 13 00:01:02,360 --> 00:01:07,160 So we need to confirm whether the Russian is three point four point eight point one or not. 14 00:01:11,090 --> 00:01:20,990 So to the extent so how you that should not click on our new connection, so name this, uh, connection 15 00:01:20,990 --> 00:01:22,620 as HDB. 16 00:01:23,360 --> 00:01:31,520 So in this conflict now here we need to add another now type diverters here. 17 00:01:38,010 --> 00:01:45,760 And then then one 17 and the one six six nine seven six, six, nine, seven and eight. 18 00:01:46,770 --> 00:01:49,380 So this note will be added. 19 00:01:50,460 --> 00:01:54,680 And this one now to this kind of. 20 00:01:57,330 --> 00:01:58,890 So we are trying to log in. 21 00:02:05,430 --> 00:02:12,990 So correction, but it could actually be complete to the open the open the channel. 22 00:02:14,730 --> 00:02:16,160 So there are no channels here. 23 00:02:16,170 --> 00:02:17,130 It's empty. 24 00:02:21,970 --> 00:02:28,980 OK, here you can see the hostess El-Katatney TV and the service Andreea, three point two point hundred 25 00:02:29,000 --> 00:02:29,220 one. 26 00:02:29,560 --> 00:02:37,360 So you can see the number and we have the event number that is to come in execution. 27 00:02:42,720 --> 00:02:50,400 So I have really heard this before, and if you go to that, so it's just a simple one, you need to 28 00:02:50,400 --> 00:02:55,290 connect using the socket and you need to send this, not one message. 29 00:02:55,800 --> 00:02:58,710 So me and the we want to do so. 30 00:02:58,710 --> 00:03:00,280 I tried using the. 31 00:03:00,780 --> 00:03:01,350 You can. 32 00:03:05,060 --> 00:03:10,010 I tried typing here and 33 00:03:12,830 --> 00:03:14,360 so it did not work. 34 00:03:14,780 --> 00:03:16,340 So you need to join the channel. 35 00:03:37,860 --> 00:03:41,970 So let's go to the browser. 36 00:03:44,800 --> 00:03:56,740 And now let's switch for Andrea Exploit and we need to suchin that have come so far Pythonesque so you 37 00:03:56,740 --> 00:03:58,120 can use the python scoop. 38 00:04:05,370 --> 00:04:07,920 So it's been a similar thing as 39 00:04:10,740 --> 00:04:10,950 far. 40 00:04:11,070 --> 00:04:15,180 No, I'm no expert, I am losing the grip of it. 41 00:04:16,920 --> 00:04:25,020 So you can just simply put the you can see change the code here, uh, change the net built here and 42 00:04:25,050 --> 00:04:25,890 you're going to execute. 43 00:04:41,080 --> 00:04:50,210 So we can search for and there are so there is only one expert that's used that and options. 44 00:04:51,040 --> 00:05:01,270 I'm sitting globality our house and set our boat six, six, nine, seven, and then show options. 45 00:05:01,930 --> 00:05:09,970 So these two settings, I said we need to set the payload short periods and set up this one system uniques. 46 00:05:12,560 --> 00:05:19,900 So this Sapelo seemed a unique solution, our shot options certainly host. 47 00:05:26,050 --> 00:05:36,010 And then in 16 to OK, and you can also set the rules like 10 zero here and you can see automatically 48 00:05:36,050 --> 00:05:36,760 it has been set. 49 00:05:36,780 --> 00:05:43,410 So that's where you need to practice to split us a few commands you can forget if you do not practice. 50 00:05:44,370 --> 00:05:45,280 One, two, three, four. 51 00:05:47,040 --> 00:05:48,430 So everything is fine. 52 00:05:48,450 --> 00:05:50,490 Now, let's run this exploit. 53 00:06:04,020 --> 00:06:12,930 OK, we need to encode the payload and then we need to send the special session with conch shell session 54 00:06:12,930 --> 00:06:14,790 on Open the Shell. 55 00:06:17,550 --> 00:06:19,690 So upgradable producer. 56 00:06:22,540 --> 00:06:23,650 Now, who am I? 57 00:06:24,280 --> 00:06:27,400 I should probably address. 58 00:06:29,500 --> 00:06:31,900 So I had to keep this under a tree there. 59 00:06:31,940 --> 00:06:37,870 No, interesting, first, let's go to KDDI home unless. 60 00:06:40,080 --> 00:06:49,550 I love your city, so it's the same for me and I'll be the model. 61 00:06:53,790 --> 00:06:55,440 Let's find it out. 62 00:06:57,700 --> 00:07:00,260 Are we going to find the mom? 63 00:07:04,220 --> 00:07:15,690 We'll get what we can do is find out grep minus, we will not be in court this spring, but we shouldn't 64 00:07:16,170 --> 00:07:16,660 be night. 65 00:07:16,860 --> 00:07:17,900 So we need to check. 66 00:07:17,910 --> 00:07:20,380 We are checking what we can access. 67 00:07:21,370 --> 00:07:25,860 Well, let's do that again. 68 00:07:27,630 --> 00:07:32,600 Group minus V, permission denied. 69 00:07:34,020 --> 00:07:39,180 And we need to therefore only be the model group for legitimate, but. 70 00:07:45,490 --> 00:07:49,220 OK, what do we have the best history? 71 00:07:51,160 --> 00:07:54,550 So let me finish. 72 00:07:56,890 --> 00:07:58,750 So let's go to that Florida. 73 00:08:03,340 --> 00:08:04,650 But as the search. 74 00:08:08,470 --> 00:08:09,750 Magistris. 75 00:08:17,850 --> 00:08:19,260 Let's Google desktop. 76 00:08:23,110 --> 00:08:29,050 Unless I receive nothing, let's go to documents. 77 00:08:32,220 --> 00:08:35,500 So that back up fight, so it can be read by everyone. 78 00:08:35,520 --> 00:08:38,520 So let's you that series back up. 79 00:08:45,960 --> 00:08:47,190 So they set 80 00:08:49,620 --> 00:09:02,880 up this in the past phrase for an image that is, uh, they may be hiding some secret information and 81 00:09:02,910 --> 00:09:05,220 you can use this pass this administration. 82 00:09:06,030 --> 00:09:09,210 So we need to find that image. 83 00:09:09,210 --> 00:09:09,600 Right. 84 00:09:10,440 --> 00:09:14,430 So find a profile. 85 00:09:15,180 --> 00:09:21,500 And I name start out Benji. 86 00:09:22,770 --> 00:09:25,890 And there are areas to record. 87 00:09:27,700 --> 00:09:29,730 OK, we are getting a lot of information. 88 00:09:42,470 --> 00:09:48,500 Now, in this, I don't want the military starting with such a group. 89 00:09:49,730 --> 00:10:01,430 Don't include this new research ship so you can go back to this and now you got some Letrozole standard. 90 00:10:05,490 --> 00:10:14,800 So we have pilottown files, but there are some of us, it's not being me, GBG are cheaper. 91 00:10:15,180 --> 00:10:18,800 So what you can do is you can say J-P study. 92 00:10:19,530 --> 00:10:26,440 So this will include the GPS device and also the files on the. 93 00:10:30,480 --> 00:10:45,560 I think we are doing correct Group B and I don't want to include we are sure and also I don't want to 94 00:10:45,560 --> 00:10:49,690 include this on your side of it, so I can just say 95 00:10:51,950 --> 00:10:53,360 LibreOffice. 96 00:10:56,150 --> 00:11:05,300 So you can see we got one image there, so if you go to the website, the image will be displayed in 97 00:11:05,300 --> 00:11:10,390 the index at BHP Consumer Alerts. 98 00:11:10,880 --> 00:11:15,520 So this image may contain our secret information. 99 00:11:21,110 --> 00:11:26,810 So I have already downloaded this one, you can use the net to transfer the files, so what you need 100 00:11:26,810 --> 00:11:31,430 to do is you can from the stakeholders, extract. 101 00:11:33,600 --> 00:11:37,440 So expect definite that it could be you 102 00:11:40,710 --> 00:11:44,220 know what, we got the password previously. 103 00:11:47,220 --> 00:11:48,570 This is the puzzle, right? 104 00:11:49,320 --> 00:11:55,280 Oh, no, we don't passphrase, so get started. 105 00:11:55,620 --> 00:12:00,900 So we got the text file and this is the password and there is a Secich. 106 00:12:01,680 --> 00:12:05,820 And in the home to the desert user, it is home. 107 00:12:07,020 --> 00:12:08,000 So let's go. 108 00:12:08,010 --> 00:12:09,690 And as their user. 109 00:12:28,080 --> 00:12:29,130 So find it odd. 110 00:12:35,280 --> 00:12:37,390 So you can view the contents of the file. 111 00:12:38,790 --> 00:12:51,060 So I have tried a bunch of other techniques to find Perugia's factors I that we have got the Supernus. 112 00:12:55,820 --> 00:13:05,960 User Bittoun, so if you're on this and you can see there is a very new user, so let's copy and run 113 00:13:05,960 --> 00:13:12,000 this and it's just this application is being the user permissions, OK? 114 00:13:12,470 --> 00:13:17,930 Now it is executing the show with the temporary users. 115 00:13:18,620 --> 00:13:23,580 OK, so you can also apply the strings so you get the same result. 116 00:13:24,110 --> 00:13:27,260 So it's a play on the user running this file. 117 00:13:29,310 --> 00:13:30,230 So them. 118 00:13:31,530 --> 00:13:32,760 So we need to create the file. 119 00:13:38,440 --> 00:13:47,270 And we have to make that equitable, so in front of me and you can see we do not share, that means 120 00:13:47,470 --> 00:13:48,980 this has been done. 121 00:13:49,690 --> 00:14:01,420 Now, what we can do is you can put down the virtual golden retrievers, but it's a bit see, so the 122 00:14:01,420 --> 00:14:02,230 DNC. 123 00:14:07,420 --> 00:14:12,700 Six, six, six, six and Arcore and. 124 00:14:19,880 --> 00:14:32,130 And 666 and upon Conexion, execute this match and senator, still those not we're going to run the 125 00:14:32,130 --> 00:14:34,160 burglary and the connection has been. 126 00:14:34,820 --> 00:14:35,910 We are my group. 127 00:14:37,580 --> 00:14:38,840 So which Peyton? 128 00:15:04,770 --> 00:15:10,440 So we got some need to prompt, so let's go to Kelly Root. 129 00:15:14,720 --> 00:15:19,880 And we have to face this menace and there OK. 130 00:15:20,000 --> 00:15:27,170 And yes, I think so there is no such bargain for the group. 131 00:15:28,450 --> 00:15:35,420 OK, if you have that situation, you can grab the priority and put it in your next box. 132 00:15:36,590 --> 00:15:37,830 So get upset about this. 133 00:15:38,220 --> 00:15:45,230 We have learned that, Andrea, I see three point four point eight point one held up execution. 134 00:15:45,830 --> 00:15:51,810 And from there on what the initial shell and we found this Wolfberry and were.