1 00:00:06,040 --> 00:00:08,050 Welcome in this lecture. 2 00:00:08,110 --> 00:00:17,130 We are going to see how to recover silver passwords from remote machine using less than two. 3 00:00:17,140 --> 00:00:22,950 Here is our middle decision is already open in my previous lectures. 4 00:00:23,020 --> 00:00:26,690 I have already shown how to get a moderate position. 5 00:00:27,040 --> 00:00:30,940 So in this lecture I am skipping this part. 6 00:00:30,940 --> 00:00:41,240 So now let's download the lay down tool so open a browser and type liaison on GitHub 7 00:00:45,230 --> 00:00:45,710 now. 8 00:00:45,770 --> 00:00:46,880 Click on this link 9 00:00:50,840 --> 00:00:55,720 scroll down and download the own tool for windows. 10 00:01:01,380 --> 00:01:09,120 As you can see here the design tool has been downloaded and I have sent it to the desktop now. 11 00:01:09,120 --> 00:01:17,070 Next we need to upload the laser tool on the machine by using upload command which is used to upload 12 00:01:17,100 --> 00:01:20,190 a file from one system to another. 13 00:01:23,020 --> 00:01:28,150 So I upload space. 14 00:01:28,440 --> 00:01:30,810 Now do the part of listen to 15 00:01:34,320 --> 00:01:35,540 now it end. 16 00:01:38,900 --> 00:01:45,130 As you can see here we successfully uploaded alisan tool on with the machine. 17 00:01:45,200 --> 00:01:52,670 So now put under his own tool flash do we need to go to the desktop or directory with our lives on file 18 00:01:52,700 --> 00:01:53,830 is present. 19 00:01:53,990 --> 00:02:02,870 So in my case our alisan file is on desktop because our payload is opened or executed on the desktop 20 00:02:04,910 --> 00:02:15,270 so type shell come on which will take us to directory where our payload is executed as you can see now 21 00:02:15,270 --> 00:02:20,880 we are on top next up our victim machine type. 22 00:02:20,970 --> 00:02:32,280 The AI are to see the derrick bays of the machine here is our lives until not receive the options of 23 00:02:32,280 --> 00:02:32,970 this tool 24 00:02:37,490 --> 00:02:47,470 on dot e e space hyphen edge. 25 00:02:47,510 --> 00:02:50,830 Here again see the options and usage of this tool. 26 00:02:52,640 --> 00:03:05,530 Now we are going to run all the models of this tool so type laser on dot e e space all 27 00:03:13,650 --> 00:03:23,600 as you can see we have got all of these sealed passwords of the machine so that's how you can get every 28 00:03:23,600 --> 00:03:31,070 single sealed passwords from the machine using less than two thank you.