1 00:00:00,120 --> 00:00:03,840 So in this video, we were taking a look at the resource basic navigation attack. 2 00:00:04,470 --> 00:00:06,820 This is very similar to the previous British tags. 3 00:00:07,620 --> 00:00:09,630 There is only one difference. 4 00:00:09,630 --> 00:00:11,850 That is the machine. 5 00:00:12,000 --> 00:00:13,680 The computer is. 6 00:00:15,920 --> 00:00:19,250 Crash tests and other computer for that is nonsense. 7 00:00:19,640 --> 00:00:24,170 So here you have the workstation and there is a fake machine. 8 00:00:24,170 --> 00:00:24,260 I. 9 00:00:25,040 --> 00:00:33,470 Whenever we can write the attribute, this attribute, it must be to on behalf of other identity for 10 00:00:33,470 --> 00:00:34,490 this workstation. 11 00:00:35,120 --> 00:00:36,170 Then what? 12 00:00:36,170 --> 00:00:44,990 This workstation thinks it blindly press this computer and gives you the impersonation you can impersonate 13 00:00:44,990 --> 00:00:48,290 as any user to access the services on this workstation. 14 00:00:48,860 --> 00:00:56,720 So for that, we need to how a user should have the right permission on this workstation and we should 15 00:00:56,720 --> 00:01:02,060 have the ability to create the machine are going to run this domain by default. 16 00:01:03,150 --> 00:01:05,930 Then computers can be created by normal users. 17 00:01:09,020 --> 00:01:10,970 So here you can see the computers. 18 00:01:11,240 --> 00:01:13,520 I don't have any other computers. 19 00:01:13,550 --> 00:01:17,180 This one is a lot of windows and it's not working right now. 20 00:01:19,250 --> 00:01:23,230 So be sure to have access as a dashboard user. 21 00:01:30,450 --> 00:01:34,200 So this testimony, there is not any administrator. 22 00:01:54,590 --> 00:01:56,060 So if we need to 23 00:01:58,640 --> 00:02:06,170 verify this attribute further domain control and must be asked to assess how many complex accounts we 24 00:02:06,170 --> 00:02:07,370 can create under domain. 25 00:02:11,240 --> 00:02:17,810 After that, we need to create a fake computer account and then we need to get the seed of this account 26 00:02:17,810 --> 00:02:23,570 and we need to assign that seed value to this attribute of this workstation. 27 00:02:25,190 --> 00:02:30,590 Then this workstation, my brain blew this, uh, this computer. 28 00:02:37,010 --> 00:02:38,870 So let's go and see. 29 00:02:38,870 --> 00:02:40,460 I have already written this. 30 00:02:40,460 --> 00:02:41,560 This is very simple. 31 00:02:41,570 --> 00:02:47,330 Just looping over through the, uh, this easy. 32 00:02:47,780 --> 00:02:52,670 And then we are just printing this and must be some sort of task created. 33 00:02:53,030 --> 00:02:59,120 Write the code for create new computer so it takes the my name and the machine address parameters. 34 00:03:00,230 --> 00:03:03,780 It will return the signature of this newly created computer. 35 00:03:03,780 --> 00:03:07,580 Because we want we want the set of the newly created computer. 36 00:03:14,060 --> 00:03:17,270 Sort of to try and catch broke. 37 00:03:37,390 --> 00:03:47,110 So we can just directly bind to this our computers, or you will not see anything close to computers. 38 00:03:47,350 --> 00:03:48,310 Commodities, gold. 39 00:03:48,310 --> 00:03:50,500 Transitioning commodities goes through Oracle. 40 00:03:51,220 --> 00:03:57,600 You can modify this going to the to the router and go for this distinguished name. 41 00:03:57,880 --> 00:04:00,010 And you can see computers narrow. 42 00:04:00,760 --> 00:04:02,800 So you can double click on this and grab that. 43 00:04:02,800 --> 00:04:03,010 Right. 44 00:04:03,190 --> 00:04:04,150 So copy this one. 45 00:04:08,320 --> 00:04:17,800 So for the most uh uh domains this deal computers are they can just enumerate the uh for use using PowerShell 46 00:04:17,800 --> 00:04:19,420 and create a backdoor you. 47 00:04:26,330 --> 00:04:29,240 The U.S. goes to new territory in three of. 48 00:04:31,520 --> 00:04:33,830 And based that you're. 49 00:04:37,940 --> 00:04:38,260 No. 50 00:04:38,260 --> 00:04:41,690 We need to add a channel to this one. 51 00:04:41,870 --> 00:04:43,910 That will be our computer. 52 00:04:45,020 --> 00:04:47,300 So these are children that. 53 00:04:47,360 --> 00:04:50,330 And so this year they bring them. 54 00:04:51,340 --> 00:04:55,550 And so this is a regular user of the computer. 55 00:04:57,040 --> 00:05:02,740 So the string is a machine name that will be passing as the second barometer. 56 00:05:02,740 --> 00:05:04,410 And the second one is computer. 57 00:05:09,020 --> 00:05:15,010 So this will give you the directory entry for the computer object. 58 00:05:15,020 --> 00:05:16,370 So it's a computer object. 59 00:05:17,270 --> 00:05:19,340 Now we need to set some parameters for this. 60 00:05:19,340 --> 00:05:23,240 We need to simulate this one as a computer object. 61 00:05:25,550 --> 00:05:28,130 So that's why I took on these properties. 62 00:05:29,300 --> 00:05:32,390 And go back to the letter and search for user account control. 63 00:05:36,470 --> 00:05:46,670 And here you can see we have one where you that is the workstation and the writing is broken in hexadecimal. 64 00:05:46,850 --> 00:05:54,380 So we're going to copy this user icon control to this one computer object properties of. 65 00:05:56,340 --> 00:06:03,210 User account control dot value is equal to zero 6000. 66 00:06:06,630 --> 00:06:13,470 Now when you do that this Americanism so we can object our properties our Sam name condemn remember 67 00:06:13,470 --> 00:06:20,810 for the combat response there should be done right then be ready to machine them. 68 00:06:21,660 --> 00:06:22,170 Whereas. 69 00:06:29,680 --> 00:06:30,020 DA. 70 00:06:32,410 --> 00:06:35,100 Now we need to commit this year. 71 00:06:35,110 --> 00:06:38,920 Otherwise it will not be so. 72 00:06:41,830 --> 00:06:46,480 Normally how commentary changes, our converter addict will be created. 73 00:06:47,680 --> 00:06:50,440 And another thing is we need to set the password for this. 74 00:06:50,560 --> 00:06:54,940 So password is mush because we will be creating the hash for this. 75 00:06:55,150 --> 00:06:59,510 So let's set the password convert rather than invoke. 76 00:07:00,220 --> 00:07:03,010 So there is a matter called set password. 77 00:07:08,950 --> 00:07:13,060 And that's their strong base for this record to. 78 00:07:15,560 --> 00:07:16,490 Password to. 79 00:07:22,480 --> 00:07:24,610 And then we need to commit that genius again. 80 00:07:28,190 --> 00:07:32,510 Now the computer object has been successfully created. 81 00:07:35,660 --> 00:07:37,240 Wiggins created. 82 00:07:38,730 --> 00:07:39,410 Computer. 83 00:07:52,130 --> 00:08:00,350 We can also print them a password to the output so we can copy paste later to go through. 84 00:08:05,860 --> 00:08:14,620 And the possibility to now fetch the seal so we can carry the attribute to the object. 85 00:08:14,890 --> 00:08:16,750 So this written object said. 86 00:08:18,210 --> 00:08:19,650 Object field of gyro. 87 00:08:20,430 --> 00:08:24,780 And we need to, uh, convert this to here. 88 00:08:30,540 --> 00:08:31,590 Izzy is equal to. 89 00:08:33,770 --> 00:08:33,940 Right. 90 00:08:34,460 --> 00:08:35,530 So we got this need. 91 00:08:35,540 --> 00:08:37,310 We need to convert this into strings. 92 00:08:39,720 --> 00:08:43,080 That will be returning our powder, our function. 93 00:08:47,770 --> 00:08:50,080 Are we getting security identifier off? 94 00:08:58,830 --> 00:09:00,600 New security identifier. 95 00:09:01,620 --> 00:09:03,860 And we need to send this to. 96 00:09:09,810 --> 00:09:14,880 Now we can just put into this said two strings or we can. 97 00:09:17,840 --> 00:09:19,790 Sid these. 98 00:09:23,440 --> 00:09:24,130 Siddhartha. 99 00:09:28,200 --> 00:09:32,010 And we can turn this weekend's contest to. 100 00:09:33,130 --> 00:09:34,570 See the dark blue string. 101 00:09:36,880 --> 00:09:37,340 I'm. 102 00:09:42,080 --> 00:09:49,010 We need to retain this as our knowledge as we are finally returning at the outset of this catch block. 103 00:09:50,440 --> 00:09:51,610 Starting the career. 104 00:09:51,610 --> 00:10:00,640 New computer will work and it will return the spring of the I said the spring of the newly created computer. 105 00:10:10,530 --> 00:10:15,930 So we can change this to the we can divide this domain name to this position. 106 00:10:15,930 --> 00:10:20,370 And this is going to take this disease blocker like we did previously. 107 00:10:23,970 --> 00:10:29,900 So I know our code is printing number of computers we can create if we print ten. 108 00:10:29,910 --> 00:10:31,350 So let's go and bring this one. 109 00:10:48,280 --> 00:10:51,970 And here you can see number of convert you can create are ten. 110 00:10:53,980 --> 00:10:56,120 So I got runner. 111 00:10:56,320 --> 00:11:02,440 Whenever I was able to create a computer icon using this PSP user, I got this access denied. 112 00:11:03,110 --> 00:11:05,530 Uh, I don't know what I did wrong. 113 00:11:05,890 --> 00:11:14,140 So what I did is I have delegated this control to the testing user, add the special user, and in the 114 00:11:14,140 --> 00:11:18,220 next selection you get this, I create accounts. 115 00:11:18,460 --> 00:11:23,230 Then you can, uh, check this and click on get. 116 00:11:32,670 --> 00:11:33,090 No. 117 00:11:33,120 --> 00:11:35,520 What we need to do is we need to move forward. 118 00:11:35,520 --> 00:11:38,760 This computer objects. 119 00:11:39,030 --> 00:11:45,360 So this is one is a computer object and this one is computer that we need to loop over the computer 120 00:11:45,360 --> 00:11:52,800 object and see if the current things that are how the right permissions over this computer are not supposed 121 00:11:52,800 --> 00:11:53,310 to do that. 122 00:11:53,700 --> 00:12:04,290 So I applied the filter object sequence to computer and moving over the search result so we can start 123 00:12:04,290 --> 00:12:06,150 to not get better entry. 124 00:12:17,370 --> 00:12:24,450 Now we need to get the object security so this will return the type to their security. 125 00:12:34,280 --> 00:12:36,320 So two years ago to security. 126 00:12:36,620 --> 00:12:38,990 Now we can just get the access. 127 00:12:40,770 --> 00:12:42,060 Access control rules. 128 00:12:49,180 --> 00:12:51,590 So we need to specify this. 129 00:12:52,320 --> 00:12:56,980 How to turn and bypass and vehicle. 130 00:13:01,860 --> 00:13:02,190 No. 131 00:13:02,190 --> 00:13:04,800 The return babies are the traditional collection. 132 00:13:07,980 --> 00:13:13,260 And so now in this race, we need to move forward these first. 133 00:13:13,440 --> 00:13:14,400 So for each. 134 00:13:15,500 --> 00:13:15,830 I. 135 00:13:17,330 --> 00:13:18,380 I do better. 136 00:13:19,400 --> 00:13:20,330 Access rule. 137 00:13:20,750 --> 00:13:24,400 You are in charge now. 138 00:13:24,410 --> 00:13:27,830 We can normally print the rules, but we need to compare whether. 139 00:13:31,360 --> 00:13:32,590 With our username. 140 00:13:32,590 --> 00:13:33,150 So right. 141 00:13:33,160 --> 00:13:35,650 We need to correct the username that is. 142 00:13:36,190 --> 00:13:39,730 This program is running on under so we can do that using. 143 00:13:42,900 --> 00:13:43,860 Windows dot. 144 00:13:53,600 --> 00:13:56,600 Windows identity don't get current. 145 00:13:58,910 --> 00:14:01,970 So this will give you the string. 146 00:14:02,360 --> 00:14:03,050 Who am I? 147 00:14:04,700 --> 00:14:05,650 So who am I? 148 00:14:05,680 --> 00:14:09,120 Represents the current username. 149 00:14:10,380 --> 00:14:14,510 Are we just a current user name? 150 00:14:17,570 --> 00:14:24,710 So this you're gonna return the where you like the domain name slash the use of we need to cut that 151 00:14:24,920 --> 00:14:25,520 domain name. 152 00:14:27,550 --> 00:14:32,230 They are split, so there will be a backwards rash. 153 00:14:36,140 --> 00:14:39,950 And the second spring we need to update. 154 00:14:42,920 --> 00:14:45,830 So you can put the comment here. 155 00:14:47,090 --> 00:14:49,580 Take 69 slash bash two. 156 00:14:49,790 --> 00:14:52,730 So we are splitting the string by this operator. 157 00:14:53,060 --> 00:14:54,760 And this one is a junior element. 158 00:14:54,770 --> 00:14:56,000 This one is first element. 159 00:14:56,480 --> 00:14:58,990 So we get the current, the user name, as does two. 160 00:15:00,080 --> 00:15:01,880 Now we are going to match this one. 161 00:15:02,120 --> 00:15:05,330 If I fear that identity of friends. 162 00:15:05,540 --> 00:15:13,310 So this identity of ends means which object has the x axis role on this? 163 00:15:14,980 --> 00:15:19,870 A computer backed posting, Will took an additional one year. 164 00:15:20,470 --> 00:15:26,170 So it would be very easy to convert the dark contents. 165 00:15:29,480 --> 00:15:31,850 Now we can say current username username. 166 00:15:31,940 --> 00:15:32,700 But who? 167 00:15:40,750 --> 00:15:42,160 Now there is a match. 168 00:15:42,520 --> 00:15:44,260 Then we can print this. 169 00:15:47,340 --> 00:15:48,810 Active Directory rights. 170 00:15:51,350 --> 00:15:55,760 So this will give you the right read, execute the car, etc.. 171 00:15:59,450 --> 00:16:04,010 Make sure it is access control like this water you are denied. 172 00:16:04,460 --> 00:16:06,050 You can print others as well. 173 00:16:15,130 --> 00:16:16,300 So let's bring this one. 174 00:16:42,020 --> 00:16:44,000 Now if you go and run this and we can see. 175 00:16:51,580 --> 00:16:55,030 We got some, uh. 176 00:16:55,870 --> 00:16:56,680 Access rooms? 177 00:16:56,980 --> 00:16:57,270 No. 178 00:16:57,530 --> 00:16:59,700 Let's also printout this. 179 00:17:01,510 --> 00:17:01,800 Uh. 180 00:17:06,270 --> 00:17:08,360 Let's also print out the computer name. 181 00:17:08,400 --> 00:17:11,370 That is this s r to. 182 00:17:13,930 --> 00:17:15,100 As I do that part. 183 00:17:15,100 --> 00:17:17,020 This will give you the end of that part. 184 00:17:33,960 --> 00:17:35,850 Another can see me. 185 00:17:35,880 --> 00:17:36,420 How? 186 00:17:37,290 --> 00:17:40,850 Now I'll write property on this PC. 187 00:17:40,860 --> 00:17:47,400 And also we have the right property and this control and I have put this right property here so we can 188 00:17:47,880 --> 00:17:49,590 go and right click on this. 189 00:17:51,690 --> 00:17:53,510 Properties and global security. 190 00:17:53,520 --> 00:17:57,720 And I have added this dispute further reading write access. 191 00:17:59,420 --> 00:18:04,920 Now we need to filter along these properties, which we know are. 192 00:18:07,600 --> 00:18:08,110 Right. 193 00:18:09,010 --> 00:18:09,910 So that's. 194 00:18:14,320 --> 00:18:18,190 So in this computer, we have some access on this. 195 00:18:18,580 --> 00:18:20,550 Now I need to filter some more. 196 00:18:20,560 --> 00:18:25,200 That is, if you're not Active Directory. 197 00:18:25,240 --> 00:18:25,770 Right. 198 00:18:26,200 --> 00:18:27,790 Dark blue lawyer. 199 00:18:29,370 --> 00:18:33,630 Sort of too strong, not too rare and indistinct. 200 00:18:33,930 --> 00:18:35,370 If I have some. 201 00:18:41,850 --> 00:18:42,260 Jan. 202 00:18:43,620 --> 00:18:44,070 Right. 203 00:18:47,670 --> 00:18:48,960 So with this. 204 00:18:55,510 --> 00:19:00,970 Or are you generally called the naughty prince? 205 00:19:05,820 --> 00:19:11,060 So then I'm going to print the actual letters. 206 00:19:51,350 --> 00:19:51,620 Well. 207 00:19:52,790 --> 00:19:55,430 So this was missing. 208 00:20:09,360 --> 00:20:18,410 I think we learn from this and here we can see we how the right exist on this 1016. 209 00:20:19,340 --> 00:20:20,960 So which is exactly what we need. 210 00:20:22,730 --> 00:20:24,410 Now we have found that. 211 00:20:27,620 --> 00:20:30,110 On this particular computer, we have red X's. 212 00:20:30,110 --> 00:20:35,690 So what we're going to do is we're going to create the computer's fake computer icons. 213 00:20:36,560 --> 00:20:41,970 So we've got great access on broken windows, so we're going to create poofy computers, or we can also 214 00:20:42,020 --> 00:20:44,330 create one fake account as well. 215 00:20:46,520 --> 00:20:53,060 We can write the one account, Siebel Computers as well. 216 00:20:54,680 --> 00:21:03,680 So since we are in this room, it's better to create icons, so it will be easy to create a new computer. 217 00:21:04,370 --> 00:21:11,540 I can just use some domain name because we are not using their domain name, their function, and now 218 00:21:11,870 --> 00:21:17,330 return a function that will generate the random string. 219 00:21:17,340 --> 00:21:25,340 So here you can see they are shooting and it will each time it will in the new random character from 220 00:21:25,340 --> 00:21:25,640 this. 221 00:21:26,060 --> 00:21:28,400 So it will just generate the random name. 222 00:21:34,580 --> 00:21:38,550 So let's give this random name. 223 00:21:43,370 --> 00:21:45,360 And this will return the strings. 224 00:21:45,800 --> 00:21:46,000 Right. 225 00:21:46,160 --> 00:21:48,880 String art to music. 226 00:21:50,960 --> 00:21:52,670 And I'm going to print this. 227 00:22:00,010 --> 00:22:01,180 Brenda Wilson, U.S.. 228 00:22:04,400 --> 00:22:05,690 So let's go and buy this one. 229 00:22:18,010 --> 00:22:21,040 Now, if you to read this, we should see new computer icons. 230 00:22:23,920 --> 00:22:26,230 Invalid syntax has been specified. 231 00:22:40,220 --> 00:22:41,840 Invalid dense index. 232 00:22:43,960 --> 00:22:44,410 Okay. 233 00:22:44,440 --> 00:22:53,240 So I think first, let's bind to the base and then DNC and. 234 00:23:04,580 --> 00:23:04,970 Okay. 235 00:23:04,970 --> 00:23:06,410 I forgot this one. 236 00:23:12,040 --> 00:23:15,010 We need to add this one as CNN's equals to. 237 00:23:16,240 --> 00:23:17,020 Sorry for that. 238 00:23:17,920 --> 00:23:19,660 Now we are going to go. 239 00:23:33,780 --> 00:23:36,420 Now I think we have greater pelicans. 240 00:23:36,420 --> 00:23:39,420 We're going to see the random names and the password. 241 00:23:39,430 --> 00:23:40,620 So the same password. 242 00:23:41,220 --> 00:23:43,980 Now we can check that and go and refresh this. 243 00:23:44,430 --> 00:23:46,740 And here we can see blue computers. 244 00:23:47,460 --> 00:23:47,910 Okay. 245 00:23:49,400 --> 00:23:50,060 Should. 246 00:23:54,730 --> 00:23:55,950 I see stronger bank. 247 00:23:56,030 --> 00:23:56,580 So. 248 00:23:59,550 --> 00:24:02,880 We are not printing into the shooting format. 249 00:24:08,090 --> 00:24:09,440 So sorry for this. 250 00:24:10,460 --> 00:24:13,160 We need to say I say that boosting. 251 00:24:13,160 --> 00:24:15,770 So I seize the strings here. 252 00:24:16,100 --> 00:24:20,300 So I'm just printing this close to this said this battery to a string. 253 00:24:20,310 --> 00:24:21,530 So that's all we are getting wrong. 254 00:24:29,390 --> 00:24:31,520 So let's go and build these accounts. 255 00:24:35,030 --> 00:24:36,260 And let's run this again. 256 00:24:36,410 --> 00:24:38,780 And here we can see we got the. 257 00:24:41,620 --> 00:24:44,710 Since and also created the computers. 258 00:24:46,760 --> 00:24:47,050 Okay. 259 00:24:47,090 --> 00:24:51,020 We one last thing we need to do is we need to assign these kids. 260 00:24:51,900 --> 00:24:52,330 Uh. 261 00:24:58,060 --> 00:25:01,570 Well, this, uh, that is this computer that is. 262 00:25:01,570 --> 00:25:03,000 This wouldn't be driven six. 263 00:25:03,760 --> 00:25:04,200 Uh. 264 00:25:09,200 --> 00:25:09,980 We can. 265 00:25:11,090 --> 00:25:13,040 We are creating one fake. 266 00:25:16,020 --> 00:25:19,680 Italian TV have created two computers in a room. 267 00:25:20,070 --> 00:25:29,130 So in the foreign we are created this seed and we can just assign the side to this first 1016, and 268 00:25:29,130 --> 00:25:31,230 the second one will be assigned to this computer. 269 00:25:32,630 --> 00:25:35,950 So we need to find further particular resource as well. 270 00:25:38,920 --> 00:25:40,490 So we are printing this new seed. 271 00:25:40,510 --> 00:25:49,120 We need to convert this into bite form so we can use our security descriptor of. 272 00:25:59,060 --> 00:25:59,510 Okay. 273 00:25:59,510 --> 00:26:03,140 We need to add this issue to uniform. 274 00:26:03,150 --> 00:26:10,040 So I this I covered this from editing website so these are if you compared this studios index. 275 00:26:10,430 --> 00:26:16,130 So the first one is the owner owner B stands B stands for building administrator. 276 00:26:16,400 --> 00:26:18,340 So we are assigning the symbol. 277 00:26:19,840 --> 00:26:24,070 Are we retaining this engineer from that particular computer? 278 00:26:24,700 --> 00:26:32,350 Well, we are mentioning that, uh, the one of these built in administrator and the darkhold is, uh, 279 00:26:32,710 --> 00:26:39,010 this there are six entries and here you can see they each and the first one is the controller, that 280 00:26:39,010 --> 00:26:40,080 is access. 281 00:26:40,320 --> 00:26:46,440 And you can see here forever before Docker and second entries are flags. 282 00:26:46,480 --> 00:26:47,650 There is no inheritance. 283 00:26:47,950 --> 00:26:49,360 And third one is permissions. 284 00:26:49,540 --> 00:26:52,600 So you can see these are the directory service access rights. 285 00:26:53,050 --> 00:27:00,760 So again, you can just see all of these rights, uh, see ac DC and sister works. 286 00:27:01,780 --> 00:27:03,820 And the last one is should be our. 287 00:27:04,330 --> 00:27:06,070 So we can just copy this one. 288 00:27:10,490 --> 00:27:15,800 I began sexting as junior Zeke was to copy this. 289 00:27:16,130 --> 00:27:19,190 And here we need to press our the strings. 290 00:27:20,890 --> 00:27:23,410 Plus the closing record. 291 00:27:28,020 --> 00:27:31,590 So we need to send this one sen. 292 00:27:31,590 --> 00:27:36,380 This is to this as a barometer. 293 00:27:39,140 --> 00:27:42,530 Now we need to get the binary form of this. 294 00:27:46,240 --> 00:27:48,100 So we need to create a new, brighter. 295 00:27:52,840 --> 00:27:58,120 By significance to a shooting in New Bulgaria of. 296 00:28:00,100 --> 00:28:01,840 That's Judy Garland. 297 00:28:17,470 --> 00:28:23,600 So we'll be getting the binary format for this one in this bright side. 298 00:28:24,520 --> 00:28:26,830 So I do need to raise we need to. 299 00:28:30,930 --> 00:28:32,390 Where did this computer object? 300 00:28:33,710 --> 00:28:36,560 So this one temp is the data entry. 301 00:28:38,220 --> 00:28:40,950 So you can set temple dot properties off. 302 00:28:41,670 --> 00:28:43,940 So right is the property we were discussing at the starting. 303 00:28:44,010 --> 00:28:47,970 This one must be nice around Blacktown they are far far better. 304 00:28:47,970 --> 00:28:54,330 Identity dot values equals two bytes 80. 305 00:28:57,260 --> 00:29:04,340 Now we can just simply say temporary committee changes, so you can as a part of the value as well using 306 00:29:04,340 --> 00:29:05,660 the clear function. 307 00:29:13,200 --> 00:29:15,660 Now we can just sense the right rightly. 308 00:29:18,150 --> 00:29:19,830 Center, Sid. 309 00:29:25,100 --> 00:29:31,610 The computer we need to put into the computer so that we don't get any confusion if there are more computers. 310 00:29:32,360 --> 00:29:36,590 So the first parameter is the seed that is new seed come out. 311 00:29:37,010 --> 00:29:39,920 Second one is the important part. 312 00:29:40,340 --> 00:29:41,990 So this should give you that. 313 00:29:42,440 --> 00:29:43,610 So let's build this one. 314 00:29:47,800 --> 00:29:49,150 And it's school based here. 315 00:29:52,280 --> 00:29:53,800 Let's do returning computers. 316 00:29:53,810 --> 00:29:54,350 We have. 317 00:29:56,290 --> 00:30:00,160 Now we will do so. 318 00:30:00,160 --> 00:30:05,740 This group will create new mobile computers and releasing their switch to the corresponding existing 319 00:30:05,740 --> 00:30:06,280 computers. 320 00:30:07,150 --> 00:30:09,790 But the user has the right access. 321 00:30:11,140 --> 00:30:15,430 And here you can see the seed has been set to this. 322 00:30:16,830 --> 00:30:17,310 Okay. 323 00:30:17,580 --> 00:30:19,200 As I said to this computer. 324 00:30:24,940 --> 00:30:26,760 Or there are other computers as well. 325 00:30:26,770 --> 00:30:27,340 So it's. 326 00:30:28,210 --> 00:30:29,860 So let's bring it out of this. 327 00:30:38,990 --> 00:30:43,130 So there are broken windows and we are created by another computers. 328 00:30:43,130 --> 00:30:48,390 Anyhow, said this to this little one six and the passwords are password. 329 00:31:00,710 --> 00:31:06,830 Now, if I go under pressure, this means you took on business and also seeks an approval. 330 00:31:06,830 --> 00:31:13,730 Ed ends a sort of MSDS and to act on behalf of other, uh, identity. 331 00:31:13,730 --> 00:31:18,470 No one's seen this Benadryl from my mother, she said. 332 00:31:19,460 --> 00:31:22,260 And what we need to do is we need to use Ruby. 333 00:31:22,260 --> 00:31:25,120 Yes, we get the hash of user. 334 00:31:25,490 --> 00:31:28,430 Oh, that is what what user? 335 00:31:29,390 --> 00:31:29,930 This one. 336 00:31:32,990 --> 00:31:33,920 British are. 337 00:31:38,240 --> 00:31:45,380 And the password is password two and we get this article. 338 00:31:45,800 --> 00:31:50,840 So these steps are similar to the previous consent variation so far with this one. 339 00:31:52,010 --> 00:31:52,280 And. 340 00:31:52,580 --> 00:31:53,270 Yes. 341 00:31:54,290 --> 00:31:55,100 As for you. 342 00:31:55,130 --> 00:32:01,000 So we are asking the ticket for our service on behalf of Edmond Shepard. 343 00:32:04,340 --> 00:32:05,060 Now. 344 00:32:06,830 --> 00:32:07,610 Copy this. 345 00:32:12,760 --> 00:32:13,660 Odyssey for. 346 00:32:19,600 --> 00:32:26,740 And the next one is impersonate the user as administrator. 347 00:32:35,380 --> 00:32:46,620 And there must be, as has been their DCA effort since the 16.9. rokkr and particle. 348 00:32:47,770 --> 00:32:51,280 And you can see pictures of this for me are important. 349 00:32:52,480 --> 00:32:53,770 Now, if I said garish. 350 00:32:56,910 --> 00:33:02,490 And here you can see we got the initiative to get further services, bigger ones. 351 00:33:02,910 --> 00:33:07,290 Now we can go ahead and reach to the convention center. 352 00:33:13,340 --> 00:33:15,200 So this is how you can. 353 00:33:17,120 --> 00:33:21,550 I do abuse this resource vessel control and allegation. 354 00:33:22,580 --> 00:33:32,900 If you want if you think, uh, uh, creating any computers can erase the thread so you can just, uh. 355 00:33:35,090 --> 00:33:38,270 Do the name Paul Singer, constrain them. 356 00:33:38,270 --> 00:33:44,540 So whenever this function will go a second time, you will get there that they'll get to really exist. 357 00:33:45,320 --> 00:33:48,070 So that's that's where you can create only one computer. 358 00:33:48,080 --> 00:33:52,400 But the seed will be assigned to the first computer.