1 00:00:00,240 --> 00:00:04,740 ‫File system commands of my interpreter are similar to the Linux shell commands. 2 00:00:05,520 --> 00:00:08,760 ‫Cat is used to read the content of the text files. 3 00:00:09,300 --> 00:00:14,670 ‫Well, you can use it with the binary files as well, but you'll see meaningless characters then. 4 00:00:15,700 --> 00:00:18,030 ‫A CD is to change directory. 5 00:00:18,570 --> 00:00:24,960 ‫If you want to change the location of the local system, which is calling for me, you can use LCD instead. 6 00:00:26,330 --> 00:00:30,740 ‫Download and upload commands are not similar to the Linux shell commands. 7 00:00:31,490 --> 00:00:37,070 ‫These commands are used to upload a file to the victim or to download a file from the victim. 8 00:00:38,280 --> 00:00:42,180 ‫And it opens a text editor to edit the specified file. 9 00:00:42,750 --> 00:00:45,810 ‫It looks like VI editor of Linux Systems. 10 00:00:47,180 --> 00:00:50,420 ‫Else is to list the files of the victim. 11 00:00:51,740 --> 00:00:55,400 ‫Now, m k the air is to create a directory. 12 00:00:56,320 --> 00:01:00,070 ‫M.V. is to move a file from one folder to another. 13 00:01:00,520 --> 00:01:01,150 ‫I'll give you a hint. 14 00:01:01,360 --> 00:01:03,700 ‫You can use this command to rename a file. 15 00:01:04,750 --> 00:01:12,040 ‫pWt is to print working directory of the victim, if you'd like to see the current location of the local 16 00:01:12,040 --> 00:01:13,090 ‫system you can use. 17 00:01:13,370 --> 00:01:14,980 ‫El pWt instead. 18 00:01:16,470 --> 00:01:20,130 ‫Our aim is to remove a specified file. 19 00:01:21,570 --> 00:01:25,020 ‫Armed air removes specified directory. 20 00:01:25,680 --> 00:01:30,630 ‫Now, as far as I can remember, you cannot remove a folder with this command unless it's empty. 21 00:01:32,090 --> 00:01:34,520 ‫Search is strange here. 22 00:01:34,550 --> 00:01:38,060 ‫It's used to search files in the victims file system. 23 00:01:38,600 --> 00:01:43,330 ‫There are several commands with different names in Linux, shell and interpreter. 24 00:01:43,340 --> 00:01:46,370 ‫You can use search command to find a file in the victim's system. 25 00:01:47,420 --> 00:01:53,840 ‫And if you remember, massive console has a search command which is used to find the modules exploited, 26 00:01:53,840 --> 00:01:55,070 ‫post modules, et cetera. 27 00:01:55,610 --> 00:02:01,130 ‫So do not confuse maturity or search command, which has a totally different purpose. 28 00:02:03,690 --> 00:02:06,270 ‫Let's see the file system commands in action. 29 00:02:07,860 --> 00:02:11,970 ‫So as you've recognized by now, I have my interpreter session income. 30 00:02:13,080 --> 00:02:19,840 ‫pWt tells me the working directory on the victim, and we are at the root of the partition. 31 00:02:19,900 --> 00:02:25,050 ‫See LP WD shows the working directory of the local system. 32 00:02:25,410 --> 00:02:26,640 ‫In this example, it's. 33 00:02:27,660 --> 00:02:30,090 ‫We're on the desktop of the user. 34 00:02:31,330 --> 00:02:37,570 ‫Else is used a list of files and folders inside the working directory here at the root of the C. 35 00:02:38,660 --> 00:02:47,060 ‫So we can change the current location using the CD command and go to Windows folder pWt to verify the 36 00:02:47,060 --> 00:02:47,690 ‫location. 37 00:02:47,810 --> 00:02:48,080 ‫Yep. 38 00:02:48,500 --> 00:02:49,970 ‫Working directory changed. 39 00:02:51,230 --> 00:02:57,410 ‫CD with a double dot brings us one folder up and we are again in the room to see. 40 00:02:58,320 --> 00:02:59,790 ‫So let's create a new folder. 41 00:03:00,820 --> 00:03:03,670 ‫New dirt using the murky dirt command. 42 00:03:05,800 --> 00:03:10,090 ‫Else to list the files and folders new dir is here is expected. 43 00:03:11,190 --> 00:03:13,920 ‫Go inside the new door using the CD command. 44 00:03:15,770 --> 00:03:21,500 ‫So I'm going to copy the text file located on the desktop of Kali into the new dirt folder of the victim. 45 00:03:22,870 --> 00:03:25,630 ‫So I'll use the upload command for this purpose. 46 00:03:26,440 --> 00:03:29,040 ‫The first parameter is the file being copied. 47 00:03:32,300 --> 00:03:36,770 ‫And the second parameter is the location on the victim's machine for copying. 48 00:03:37,250 --> 00:03:40,430 ‫Now don't forget to put the double backslash in the path. 49 00:03:41,120 --> 00:03:43,070 ‫So let's see if it's really uploaded. 50 00:03:43,490 --> 00:03:44,950 ‫Alas, yes. 51 00:03:44,960 --> 00:03:51,350 ‫And the file is here so we can see the contents of the file with the cat in. 52 00:03:52,780 --> 00:03:54,940 ‫I'll go back to the root of see again. 53 00:03:55,390 --> 00:04:03,370 ‫Now I want to copy the auto exact bad file from the victim to the local system collie so we can use 54 00:04:03,370 --> 00:04:05,050 ‫the download command for this purpose. 55 00:04:05,500 --> 00:04:07,960 ‫The first parameter is the file being copy. 56 00:04:10,040 --> 00:04:13,040 ‫And the second parameter is the location to put the file. 57 00:04:13,970 --> 00:04:17,600 ‫And I'll copy the file into the desktop of the root user. 58 00:04:18,560 --> 00:04:19,730 ‫OK, so here's the file. 59 00:04:20,000 --> 00:04:21,050 ‫Double click to open. 60 00:04:21,680 --> 00:04:22,940 ‫Well, it's empty. 61 00:04:24,060 --> 00:04:32,250 ‫This file is executed at the beginning of each boot, so if I call my back door here, I may have a 62 00:04:32,250 --> 00:04:34,410 ‫persistent back door on the machine, don't I? 63 00:04:35,160 --> 00:04:36,660 ‫I mean, you're the ethical hackers. 64 00:04:36,930 --> 00:04:38,790 ‫You should always think in this way, right? 65 00:04:39,840 --> 00:04:47,160 ‫So let's try to delete the new dirt folder, you know that we put a file in it so the folder is not 66 00:04:47,160 --> 00:04:52,410 ‫empty, but I want to see whether we can delete the folder when it's not empty. 67 00:04:53,810 --> 00:04:55,790 ‫Using the removed directory command. 68 00:04:57,750 --> 00:05:00,630 ‫Yes, the directory has been deleted. 69 00:05:02,560 --> 00:05:08,740 ‫And last, let's use the search function to find a file on the victim's system, so I'll search, for 70 00:05:08,740 --> 00:05:11,260 ‫example, kelp daddy acce file. 71 00:05:11,350 --> 00:05:11,770 ‫Oops. 72 00:05:12,640 --> 00:05:15,520 ‫We have to specify the fire with an f parameter. 73 00:05:16,740 --> 00:05:18,380 ‫Now here are the results.