1 00:00:00,720 --> 00:00:04,470 So he can also perform filesystem operations from interpretor. 2 00:00:06,270 --> 00:00:10,710 It allows you to work on both your local system as well as the target system. 3 00:00:12,040 --> 00:00:17,290 And the syntax is pretty similar to the Linux bash syntax. 4 00:00:18,920 --> 00:00:24,090 If you your current local working directory, just type El PWP. 5 00:00:26,050 --> 00:00:30,250 And you can change your local directory with the LCD command. 6 00:00:31,160 --> 00:00:32,690 LCD desktop. 7 00:00:35,460 --> 00:00:41,080 Now to list the content of that directory on your local machine type LLN. 8 00:00:42,940 --> 00:00:43,630 All right, that's good. 9 00:00:44,630 --> 00:00:50,140 But real good is that you can do this on the target machine as well. 10 00:00:51,680 --> 00:00:55,610 So let's get the working directory the would come in. 11 00:00:56,650 --> 00:01:00,610 And you can change the remote directory to another. 12 00:01:01,530 --> 00:01:06,720 Seemed to move in the upper level directory. 13 00:01:07,680 --> 00:01:14,580 And move again and look at that, see, so now I am in the sea directory over the target. 14 00:01:15,800 --> 00:01:18,680 You can also just list the content of that directory. 15 00:01:19,600 --> 00:01:27,700 This type less to do this or typing directory Dyax, it'll be the same thing. 16 00:01:29,380 --> 00:01:34,960 While penetration testing, sometimes you may need to directly view a file from the command line. 17 00:01:35,930 --> 00:01:44,060 Cat is the command that can do this for you, so type cat and then the file name on the target system. 18 00:01:46,150 --> 00:01:54,550 Also, you can create and remove directories on the target, so type mkdir to create a directory. 19 00:01:56,700 --> 00:02:06,600 And there it is, it's a folder that I've created now to remove that folder type R.M. Dyax and in the 20 00:02:06,600 --> 00:02:07,320 name of the folder. 21 00:02:08,470 --> 00:02:11,200 And voila, the folder's gone. 22 00:02:12,540 --> 00:02:20,190 And of course, you can download and upload files, interpretor makes this very easy for you, you don't 23 00:02:20,190 --> 00:02:23,880 even need to exploit the system from the start to do these operations. 24 00:02:24,430 --> 00:02:31,260 I'll show you so tight download and then the path of the file that you want to download as you see me 25 00:02:31,260 --> 00:02:31,710 to here. 26 00:02:33,730 --> 00:02:35,440 And now I'm going to upload a file. 27 00:02:36,580 --> 00:02:42,610 Type upload and the name of the file and then the path on the target system. 28 00:02:43,700 --> 00:02:50,240 So I'm going to upload all ports that xii's my file to the C directory. 29 00:02:52,900 --> 00:02:56,470 And let's check and there it is, we succeeded. 30 00:02:58,790 --> 00:03:03,230 Now, there are two more commands regarding filesystem that I want to show you. 31 00:03:04,300 --> 00:03:09,760 In a real world penetration test, there may be a mounted drive on the target. 32 00:03:10,800 --> 00:03:16,230 In order to view these drives, you can use the show Mount Command. 33 00:03:17,890 --> 00:03:21,690 And this will pull up the list of drives for you. 34 00:03:22,910 --> 00:03:27,200 And you could also check the modified hash of a file on the system. 35 00:03:30,500 --> 00:03:33,530 Who knows, you might need that command one day.