1 00:00:00,600 --> 00:00:07,200 Hello, everyone, welcome to another video of our Pythonesque since last time we talked about how to 2 00:00:07,200 --> 00:00:10,660 create a show code and how to send it over Python socket. 3 00:00:11,820 --> 00:00:16,830 Today we will talk about other useful python functions that we can use for our back as well. 4 00:00:18,660 --> 00:00:24,060 Like, for instance, we can make our battledore to download some files from from our server using the 5 00:00:24,150 --> 00:00:29,030 open function function with read binary and write binary. 6 00:00:30,390 --> 00:00:31,390 If you look at the left side. 7 00:00:31,410 --> 00:00:32,250 This is a client. 8 00:00:33,180 --> 00:00:38,610 It's using the Arbi for read binary and the server is using the right B for write binary. 9 00:00:39,720 --> 00:00:43,440 Only one of them need to send and the other one needs to receive. 10 00:00:43,650 --> 00:00:46,800 Of course you can make both of them to send and receive at the same time. 11 00:00:47,880 --> 00:00:54,060 But the one is receiving it needs to use the WB for writing the file to the server. 12 00:00:57,240 --> 00:00:59,370 I will leave that for you to try on your own. 13 00:01:01,590 --> 00:01:07,860 Finally, we need to talk talk about how to convert this backdoor into an easy file using the pie in 14 00:01:07,860 --> 00:01:08,730 a Stolar script. 15 00:01:14,900 --> 00:01:22,010 The pioneer solar takes few arguments, the dash dash, one final argument or dash upper case f create 16 00:01:22,010 --> 00:01:29,510 a single file, the dash dash new console or the dash dummy runs the Pythonic C file in the background. 17 00:01:29,990 --> 00:01:34,070 Of course we want both of them right now. 18 00:01:34,070 --> 00:01:36,890 I'm going to show you a tool that I built before that. 19 00:01:36,890 --> 00:01:38,870 Maybe it will give you some inspiration. 20 00:01:39,290 --> 00:01:42,380 And also I will summarise everything we've been talking about. 21 00:05:48,060 --> 00:05:51,380 Well, the in command didn't work at the first time, so let's try again. 22 00:05:57,500 --> 00:06:02,980 Should work on the system, reboot or log off and log on it, and so let's try again. 23 00:06:07,830 --> 00:06:10,020 And it's in. 24 00:06:16,900 --> 00:06:18,250 Yup, we got an interpreter. 25 00:06:22,580 --> 00:06:29,740 So this, in fact, command should be working upon a system reboot or of course, if you log off a log 26 00:06:29,740 --> 00:06:31,990 of log on again, it should work. 27 00:06:32,560 --> 00:06:38,830 But the first command and interpreter is the same one that we discussed before, is injecting interpretor 28 00:06:38,830 --> 00:06:39,890 into a running process. 29 00:06:41,170 --> 00:06:45,880 You can also do download something from Target and upload. 30 00:06:46,300 --> 00:06:52,960 This is just an example of how your command and control or your backdoor should be looking like or all 31 00:06:52,960 --> 00:06:54,850 the functions that you should be implementing. 32 00:07:06,570 --> 00:07:11,880 I think we have reached the end of this lesson, so please practice and see you in the next one.