1 00:00:00,940 --> 00:00:03,590 Hello, everyone, and welcome to this video. 2 00:00:04,330 --> 00:00:12,070 So in this video, we are going to see about masculinization techniques, which is a very, very important 3 00:00:12,070 --> 00:00:13,690 part of a skill and addiction. 4 00:00:14,700 --> 00:00:23,010 So using this technique, you may get a squirrel shell or different types of shell onto the target of 5 00:00:23,220 --> 00:00:31,020 application, so once you get the shell onto the target server, you are able to execute your commands 6 00:00:31,020 --> 00:00:32,080 onto the target server. 7 00:00:32,670 --> 00:00:41,250 So now you can guess the impact of any user executing his or her own commands onto the target server. 8 00:00:41,760 --> 00:00:45,780 This makes the vulnerability as a critical vulnerability. 9 00:00:46,650 --> 00:00:47,190 All right. 10 00:00:47,550 --> 00:00:54,810 So what are the different types of shells that we are going to attack and get onto the target of applications? 11 00:00:55,380 --> 00:01:02,880 So the first one is a squirrel shell in which we are able to execute all the actual commands onto the 12 00:01:02,880 --> 00:01:04,400 target of application. 13 00:01:05,040 --> 00:01:12,900 The second type of shell that we are going to get is a level shell on which we can execute all the system 14 00:01:12,900 --> 00:01:19,680 level commands onto the target of application, which can include deletions of files and data. 15 00:01:20,970 --> 00:01:26,940 The third type of shell that we're going to see is the reverse shell using meter reader in which we 16 00:01:26,940 --> 00:01:33,840 are going to upload a revision and we need to get the shell or the system access onto the target of 17 00:01:33,900 --> 00:01:34,670 application. 18 00:01:35,160 --> 00:01:43,920 And the last one is a situation in which we are going to upload our SSL keys onto the Target Web application, 19 00:01:43,920 --> 00:01:50,850 which is one level, and perform SSX onto the target web server to get the system level access. 20 00:01:51,960 --> 00:02:00,660 So these are all the techniques that we are going to see in the upcoming videos to get the maximum advantage 21 00:02:00,990 --> 00:02:03,750 of the target of application server. 22 00:02:05,210 --> 00:02:07,830 So now you may ask, what is a shell? 23 00:02:08,640 --> 00:02:16,460 So it is the ability to execute commands under the target server or perform sensitive actions on the 24 00:02:16,460 --> 00:02:17,600 database or server. 25 00:02:18,140 --> 00:02:24,860 So basically, you get to execute your commands in short order, the target web application where you 26 00:02:24,860 --> 00:02:26,880 can perform any sensitive action.