1 00:00:09,560 --> 00:00:19,790 Megaupload is a when it isn't as bad form that enables you to find exploit and validate these beauties 2 00:00:19,860 --> 00:00:29,100 an open source project that provides the infrastructure content and it has to perform but it doesn't 3 00:00:29,100 --> 00:00:33,570 test and actually in supersecret the auditing. 4 00:00:33,640 --> 00:00:36,550 So before executing you would exploit. 5 00:00:36,620 --> 00:00:41,410 Let's see some come on that we are going to use most in this course. 6 00:00:42,290 --> 00:00:49,780 So if you have the helper come on on the console it will show you lift off or come on in. 7 00:00:49,790 --> 00:01:01,120 It has played along with their description typing in the combined search along with the word list or 8 00:01:01,150 --> 00:01:05,470 the radius possible explains that how you would back a 9 00:01:08,710 --> 00:01:09,380 here. 10 00:01:09,730 --> 00:01:18,070 So that is the common name is the name of the object that you are looking for and that is the kind of 11 00:01:18,070 --> 00:01:19,630 script you are searching 12 00:01:23,570 --> 00:01:25,360 piping sure explodes. 13 00:01:25,360 --> 00:01:30,840 COME ON YOU are the currently available exploits. 14 00:01:30,840 --> 00:01:40,650 There are more exploits for various platforms and applications including Windows Linux Apache and so 15 00:01:40,650 --> 00:01:51,150 on which help to test the flexibility and understand the working of metabolite with this same show. 16 00:01:51,160 --> 00:01:59,090 C'mon we can also list the payloads available we can use a short whaler's or 17 00:02:03,390 --> 00:02:12,060 now said come on set the payload that is used to gently reload that will do a shell. 18 00:02:12,060 --> 00:02:21,360 When is or is is exploited piping set to come on with respect local host IP. 19 00:02:21,750 --> 00:02:27,390 Because our target machine is to connect to our machine. 20 00:02:27,570 --> 00:02:30,630 Now piping set L port. 21 00:02:30,630 --> 00:02:40,150 Come on the local port number that the payload will open on the server when an exploit is exploited. 22 00:02:40,170 --> 00:02:48,990 It is important that this port number be a port that can be pull on this or that is it is not in use 23 00:02:48,990 --> 00:02:53,870 by another set of use and not resort for Mr to use. 24 00:02:55,230 --> 00:03:04,580 And the last exploit come on is a program or tool that will inject a payload into that little application. 25 00:03:04,570 --> 00:03:15,530 Could you access so next lecture we are going to see how to create a simple payload with MSF in Hank.