1 00:00:00,270 --> 00:00:07,680 Before we get into the framework and its structure inside of our clinics, let us first talk about reverse 2 00:00:07,680 --> 00:00:09,690 shells and find shells. 3 00:00:10,710 --> 00:00:17,610 As we already mentioned, Shell is our access to the target machine with the help of Shell, we execute 4 00:00:17,610 --> 00:00:19,720 command and control the target system. 5 00:00:20,520 --> 00:00:26,430 So Shell is essentially our payload that we drop on machine after exploiting it. 6 00:00:27,150 --> 00:00:29,510 However, there are two different types of shells. 7 00:00:30,090 --> 00:00:33,170 We got reverse shells and pine shells. 8 00:00:33,990 --> 00:00:37,170 Now, reverse shells are something that you will use a lot. 9 00:00:37,510 --> 00:00:42,630 It works on principle of target machine trying to connect back to over the next machine. 10 00:00:43,290 --> 00:00:49,500 For this to work on our killing machine, we must first listen for the incoming connection over some 11 00:00:49,500 --> 00:00:49,890 port. 12 00:00:50,430 --> 00:00:56,490 Then we explain the target and drop a shell, which will tell the target machine to connect to our port 13 00:00:56,490 --> 00:00:58,170 and clinics that we're listening on. 14 00:00:58,710 --> 00:01:02,280 After it completes the connection, we can then control that machine. 15 00:01:02,700 --> 00:01:08,790 On the other hand, bandshell is when the target machine opens their port for us to connect to. 16 00:01:09,540 --> 00:01:15,000 In this case, it is the target machine that is listening for the incoming connection on that port. 17 00:01:15,840 --> 00:01:19,380 And we are the ones that must connect to that port. 18 00:01:19,950 --> 00:01:22,770 After we do it, we can control that target machine. 19 00:01:23,520 --> 00:01:26,070 However, there is one problem. 20 00:01:26,070 --> 00:01:31,590 We find Shell, and it is also one of the main reasons why we want to use it that much. 21 00:01:32,130 --> 00:01:37,350 And that is because firewall can forbid target machines to open port. 22 00:01:38,350 --> 00:01:45,460 Many variables could have a rule that says don't open any random port for security reasons, therefore 23 00:01:45,460 --> 00:01:49,490 our bandshell would not work even after exploiting the target. 24 00:01:50,170 --> 00:01:53,200 However, reversed Shell's will always work. 25 00:01:54,050 --> 00:01:54,440 Why? 26 00:01:55,100 --> 00:01:59,060 Well, because the target in that case is just connecting to us. 27 00:01:59,600 --> 00:02:02,870 It is the same process as when the target visits our website. 28 00:02:03,290 --> 00:02:08,930 It connects to a port on that Web server and it gets the Web page of that website back. 29 00:02:09,350 --> 00:02:14,720 Just in this case, it will connect to port and our clinic's machine and we will establish a shell like 30 00:02:14,720 --> 00:02:15,040 that. 31 00:02:15,450 --> 00:02:19,040 That's why Reverse Shell is always a better option if possible. 32 00:02:19,730 --> 00:02:20,510 All right, cool. 33 00:02:21,170 --> 00:02:26,390 Now we are ready to start introducing ourselves to the metal framework, the number one tool that we 34 00:02:26,390 --> 00:02:27,590 will use for exploitation. 35 00:02:28,310 --> 00:02:32,120 It is as important as a map and we will use it a lot. 36 00:02:32,120 --> 00:02:34,960 So it is important we get its basics down first. 37 00:02:35,600 --> 00:02:36,580 It is not hard. 38 00:02:36,590 --> 00:02:39,680 However, it will take some practice to get used to it. 39 00:02:40,190 --> 00:02:41,540 Let's get straight into it.