1 00:00:06,240 --> 00:00:13,270 Welcome in previous lecture we saw that we can perform what forwarding we in Europe. 2 00:00:13,530 --> 00:00:21,120 So in this lecture we are going to see how to have any windows machine is outside the network using 3 00:00:21,350 --> 00:00:31,480 NET get to basically in that get is a powerful information security tool used for reading from and writing 4 00:00:31,480 --> 00:00:36,780 to and network connections using VCP or UDP protocol. 5 00:00:37,060 --> 00:00:48,090 The names that get is there from net for networking and gagged for connecting data to a file and netcat 6 00:00:48,130 --> 00:00:55,360 is capable of performing multiple functionalities something which has only the name of the Swiss army 7 00:00:55,360 --> 00:00:57,460 knife for ethical hacking. 8 00:00:58,630 --> 00:01:07,800 Get easy pre-charge tool that is capable of creating nearly any type of connection which makes it extremely 9 00:01:07,800 --> 00:01:13,820 useful for performing network debugging and exploration. 10 00:01:13,830 --> 00:01:22,970 So let's see how we can hack any Windows machine using and get up and netcat to to open Ellsler port 11 00:01:22,980 --> 00:01:24,590 on the machine. 12 00:01:24,810 --> 00:01:28,690 We need to install the net get all in the machine. 13 00:01:29,450 --> 00:01:35,380 So here I already installed the netcat tool in the machine. 14 00:01:35,420 --> 00:01:41,850 Now let's go to the machine and type and get here. 15 00:01:41,970 --> 00:01:51,120 We need to end the end of you at least not what number next we are willing to initiate by indecl on 16 00:01:51,120 --> 00:01:52,240 the target machine. 17 00:01:52,350 --> 00:02:05,840 Not get to initiate a connection to the machine so I went e c and d not exceed as you know the hyphen 18 00:02:06,200 --> 00:02:10,890 option sends back a bashful to the back of the machine. 19 00:02:12,170 --> 00:02:17,890 Before we hit Enter we need to start at least not on our machine. 20 00:02:18,830 --> 00:02:30,690 So I see when we see it the now we are ready to listen. 21 00:02:30,710 --> 00:02:33,460 It was going from the machine 22 00:02:36,140 --> 00:02:47,890 now and the let's go to our Kaleem wishing as you can see here we successfully created a back door into 23 00:02:47,980 --> 00:02:52,340 the machine which is outside the network. 24 00:02:52,410 --> 00:03:01,210 So that's how you can hack any Windows machine which is all third of your network thank you.