1 00:00:00,090 --> 00:00:06,030 So in this, we are going to talk about this amount of venom in the older versions or the Russians at 2 00:00:06,030 --> 00:00:15,750 this point, there is a mass of silly, uh, interface, but, uh, are those are remote and then they 3 00:00:15,750 --> 00:00:19,140 have to use this amount of venom for all the common purposes. 4 00:00:19,500 --> 00:00:28,770 So I received a message of my message for the minor or the well usage of this film, because there is 5 00:00:28,770 --> 00:00:37,380 an example, uh, I explain are the options he can use vitamins from, uh, minister to list are the 6 00:00:37,380 --> 00:00:44,880 types of the modules available, uh, for us to use vitamins and minus P to specify the payload we need 7 00:00:44,880 --> 00:00:53,430 to uh, uh, generate and minister for for the period should be in which format either and C format 8 00:00:53,430 --> 00:00:54,960 are executable format. 9 00:00:54,960 --> 00:00:59,490 Alternate format that is good work and so on and minus C for. 10 00:00:59,500 --> 00:01:07,770 And so this encoder will encode this period and it will display the result printed on T minus Hurston's 11 00:01:07,770 --> 00:01:09,110 stands for architectural displays. 12 00:01:09,160 --> 00:01:18,840 Whether that'll do it for our unique architectural Solaris architecture and minus four or five minus 13 00:01:18,840 --> 00:01:23,810 B to remove the bad characters and we need to specify the bad characters we do with this. 14 00:01:23,820 --> 00:01:27,840 We option to make sure that our payload is free of this backorders. 15 00:01:28,860 --> 00:01:36,800 And my design for Knob's, uh, we are not to be able to prevent that before this, uh, payroll and 16 00:01:36,810 --> 00:01:40,260 minus s to set the, uh, of this pillar. 17 00:01:40,470 --> 00:01:42,600 So minus H transliterations. 18 00:01:42,930 --> 00:01:45,230 Uh, these iterations are used by encoders. 19 00:01:45,240 --> 00:01:51,020 So this encoder will, uh, encode this payload these many times. 20 00:01:51,030 --> 00:01:56,760 So if I show my inside, uh, trade four or five times and this encoder will then go this period, uh, 21 00:01:56,760 --> 00:02:06,360 five times and minus C to add some, uh, Chalco to include in our payload and minus X to generate the 22 00:02:06,370 --> 00:02:06,900 template. 23 00:02:07,350 --> 00:02:12,830 And you can also see the timeout here and minus it to show this message already. 24 00:02:12,830 --> 00:02:20,550 This like a brief introduction about these options we can use with the I know what I will do is minus 25 00:02:20,550 --> 00:02:23,850 all I know is uh sorry. 26 00:02:24,720 --> 00:02:29,940 Uh, I will say our list, every module that I can use with myself when. 27 00:02:32,850 --> 00:02:33,980 So it will take some time. 28 00:03:23,650 --> 00:03:24,670 So there you go. 29 00:03:25,490 --> 00:03:25,970 No way. 30 00:03:26,100 --> 00:03:27,360 How are these Modjeska? 31 00:03:28,180 --> 00:03:38,350 For them now if you look at this Rashtrapati saying Fermat, so we can specify the format and we can 32 00:03:38,350 --> 00:03:43,990 type in these values, we can produce the better in the batch format and see variable format. 33 00:03:49,300 --> 00:03:58,540 And, uh, sharp vegetable farmers and small farmer and farmer, better, powerful and potent, etc., 34 00:03:58,540 --> 00:04:03,400 you can also join a real farmer and Ruby and Shulsky and also Subasic. 35 00:04:03,760 --> 00:04:08,200 So these are all farmers you can generate and we can happen in Overexploit. 36 00:04:08,440 --> 00:04:17,050 You can also specify it is easy to, uh, generate an adequate Spizer executable. 37 00:04:18,790 --> 00:04:25,210 So these are the, uh, I like programming than just language specific formats. 38 00:04:25,210 --> 00:04:27,730 And we can also see Frevert executable formats. 39 00:04:28,030 --> 00:04:31,360 Are you going to create a digital file for Yuxi? 40 00:04:31,600 --> 00:04:34,440 And then we can also create the Java Javal. 41 00:04:34,780 --> 00:04:39,430 And so you can also create a visual basic, uh, executable as well. 42 00:04:40,060 --> 00:04:46,520 And we can also create this, uh, Microsoft Service HSP as well. 43 00:04:47,530 --> 00:04:54,130 So these are my frameworks and capture format and we need to specify, encrypt and the value you need 44 00:04:54,130 --> 00:04:54,610 to parse. 45 00:04:54,610 --> 00:05:04,030 Are these for any of any one of these four can see a algorithm base64 for annexure and we can see from 46 00:05:04,030 --> 00:05:09,580 framework cartridges we can specify these architectures to make sure that our payload will work on this 47 00:05:09,580 --> 00:05:10,270 are just. 48 00:05:12,210 --> 00:05:17,710 So there are clearly 62 with 64 bit and Paternot teacher and Ruby and so on. 49 00:05:17,880 --> 00:05:20,540 You can also create for the Armada just as well. 50 00:05:21,960 --> 00:05:29,280 Now here we go for the platforms like it's a niche operating system you can use like an Apple, Android 51 00:05:29,280 --> 00:05:32,520 and Cisco and Firefox browser Java. 52 00:05:32,520 --> 00:05:41,550 And you can see here the whole USX Open, BSD, Unix, Windows, etc. These are the platforms available. 53 00:05:41,610 --> 00:05:47,760 And for this purpose, you can create the payload that will work on these platforms and you can see 54 00:05:47,760 --> 00:05:55,260 the framework knobs we have and knobs and we can use these knobs to make sure that there are no Norbert's 55 00:05:56,460 --> 00:05:57,480 before the Chalco. 56 00:05:58,620 --> 00:06:03,870 And you can see these are the encoders, uh, you can see the encoder name and the rank and description. 57 00:06:04,980 --> 00:06:11,610 And you can see there is a lot there is a rank and you can see there are some possibilities for this 58 00:06:11,610 --> 00:06:12,750 as the excellent rank. 59 00:06:13,350 --> 00:06:15,110 And and she got organized. 60 00:06:15,120 --> 00:06:19,230 This has an excellent track and it's just polymorphic to feedback. 61 00:06:19,230 --> 00:06:26,520 And so we can use this accident-Prone call or even the great rank and you can see the base 64. 62 00:06:26,800 --> 00:06:35,430 So we this these encoders do a good job, then a low rank and us. 63 00:06:37,260 --> 00:06:41,170 So we will also use these anchors to incorporate. 64 00:06:43,710 --> 00:06:50,610 So you can see here, these are the payloads available for Windows System and for potential Bine DSP 65 00:06:50,610 --> 00:06:52,260 and so on the GCP. 66 00:06:55,530 --> 00:07:04,340 So we have a lot of discussion about this, but this is generally the way people run on this client, 67 00:07:04,380 --> 00:07:08,880 so I need to go on listening for any connections and then we can talk to the victim. 68 00:07:09,420 --> 00:07:12,270 But in general, there will be a over rules out. 69 00:07:12,270 --> 00:07:14,230 Any ideas in that? 70 00:07:14,260 --> 00:07:16,010 In that case, we use the reverse. 71 00:07:16,200 --> 00:07:20,890 So we go on on and ground that character back to us. 72 00:07:21,030 --> 00:07:24,900 So first we'll discuss how to generate the parrot. 73 00:07:24,900 --> 00:07:29,520 Using that software you need to tape is a metaphor so that we create the screen. 74 00:07:35,720 --> 00:07:39,180 And Mr. Furnham, minus B, you need to specify the payload. 75 00:07:39,830 --> 00:07:47,120 Let me say by this, um, shall shall underscore. 76 00:07:52,600 --> 00:08:00,910 By now and we have space with the successfully and what we have to do is we need to set some options 77 00:08:00,910 --> 00:08:01,650 for this pillar. 78 00:08:01,870 --> 00:08:12,220 So this pillar should require the IP address and support number so that when executed, the soccer program 79 00:08:12,610 --> 00:08:17,090 inside the splitter will get reset on this IP address and the output number. 80 00:08:17,500 --> 00:08:22,840 So we need to find out this IP address. 81 00:08:28,860 --> 00:08:36,420 Sorry, I think first we need to clear this one, so generally we use the reverse DP. 82 00:08:41,350 --> 00:08:44,990 So first, we need to switch our IP address and the port. 83 00:08:45,310 --> 00:08:49,630 No, that is an option, Brocklehurst. 84 00:08:54,140 --> 00:08:59,870 And a local port is equal to the two, one, two, three, four. 85 00:09:00,260 --> 00:09:03,800 Are we going to four for four if you do not special production. 86 00:09:04,520 --> 00:09:09,740 This takes the port four four four four as their default space with their host. 87 00:09:09,740 --> 00:09:13,550 And that is what we do with architecture that we do with our teacher. 88 00:09:13,880 --> 00:09:15,960 And then we use the format. 89 00:09:16,290 --> 00:09:22,060 I want to see variable format so that I can put in my, uh, C script. 90 00:09:33,860 --> 00:09:40,230 So for the Shelburn DGP, we need to go to the IP address of this commission and put number two just 91 00:09:41,720 --> 00:09:42,900 based on that mission. 92 00:09:42,950 --> 00:09:45,710 So we have got this, uh, Peyrard. 93 00:09:45,710 --> 00:09:48,880 We can just paste in it in our program. 94 00:09:52,050 --> 00:10:01,480 And you can see there are some words this is a slash zero in hexadecimal slash represents that number. 95 00:10:01,710 --> 00:10:02,970 So how to remove this? 96 00:10:04,080 --> 00:10:10,330 These are the bad characters and we can remove the bad characters using this A minus B option. 97 00:10:10,360 --> 00:10:13,500 We need to specify what characters we need to promote. 98 00:10:32,800 --> 00:10:40,390 So as you can see now, there are no zero zero bytes in our payroll, so this is a basic reversal, 99 00:10:40,990 --> 00:10:47,690 uh, reverse dissipation, but this can be easily Bailando. 100 00:10:48,110 --> 00:10:50,470 So that's why you can use the encoders. 101 00:10:52,360 --> 00:11:01,030 One thing you need to remember is your payroll need not to bypass every activators that are available, 102 00:11:01,270 --> 00:11:10,330 but your payroll can bypass the antivirus that that is using in that organization, supposedly your 103 00:11:10,330 --> 00:11:14,060 organization or the company, just Kaspersky or any others. 104 00:11:14,170 --> 00:11:19,540 So you focus on particular area of payroll building such that it will just this. 105 00:11:19,930 --> 00:11:24,870 Kaspersky So your organization uses Kaspersky, so why do you consider it or any other? 106 00:11:25,040 --> 00:11:32,650 And so for the organizations perspective, why do we just focus on this? 107 00:11:33,550 --> 00:11:35,230 Why can't we resist that using? 108 00:11:35,230 --> 00:11:42,040 So in that way you can bypass you can write a paper that will bypass only two or three activities that 109 00:11:42,040 --> 00:11:48,580 are using the organization only to generate a universal bypass or antivirus is by far better. 110 00:11:48,940 --> 00:11:51,000 That's a very tough tool. 111 00:11:51,010 --> 00:11:53,920 And, you know, specify the encoder. 112 00:11:54,160 --> 00:11:55,390 I'm using the Chicago. 113 00:11:55,670 --> 00:11:58,280 That is very good return. 114 00:12:07,790 --> 00:12:15,210 And in the sea for everybody can also, uh, use the farmer and you can run the system. 115 00:12:24,640 --> 00:12:26,550 So my period has been greater. 116 00:12:26,740 --> 00:12:33,820 Now this is in so far as you can see, there is a character and I reckon our content. 117 00:12:34,090 --> 00:12:36,040 Let's go. 118 00:12:36,220 --> 00:12:38,420 Let's go and create an easy format. 119 00:12:40,060 --> 00:12:43,890 Maybe I should I should do the Puttnam. 120 00:12:45,140 --> 00:12:46,080 OK, let's see. 121 00:12:46,090 --> 00:12:47,320 Total output now. 122 00:13:05,060 --> 00:13:07,460 So we have got to address. 123 00:13:11,670 --> 00:13:13,120 So at the about. 124 00:13:14,310 --> 00:13:16,070 OK, maybe I didn't do anything wrong. 125 00:13:29,230 --> 00:13:34,010 Maybe I should just redirect this output to temporarily exit. 126 00:13:35,050 --> 00:13:36,210 I think that will work. 127 00:13:55,460 --> 00:14:04,790 So I think the period has been successfully created our file, the rest minus 30 or. 128 00:14:08,320 --> 00:14:14,940 So here is our temporary supply and execution and our in the system, maybe we get the reversal. 129 00:14:17,150 --> 00:14:24,410 So that's thought about this freedom basics of this case, generally, we may need to do something to 130 00:14:24,410 --> 00:14:32,240 generate the payloads and that is charcoaled already executives and especially the payroll with the 131 00:14:32,290 --> 00:14:33,020 ISP option. 132 00:14:33,020 --> 00:14:39,530 And we specify the properties are the same options we need to set for this, whereas those are at the 133 00:14:39,530 --> 00:14:45,860 airport, which is our current IP address machine, because we are making the reverse shell such that 134 00:14:46,610 --> 00:14:48,170 the crown should connect back to us. 135 00:14:48,270 --> 00:14:52,390 And yes, we not deter us a of it and we are removing the backcourts. 136 00:14:52,670 --> 00:14:58,460 Those are not right and we are encoding, which she got a great encoder and we are just all putting 137 00:14:58,460 --> 00:15:04,840 everything into the temporada so that are about the basics of a massive Wynnum. 138 00:15:05,270 --> 00:15:13,130 So in this is not everything about them is in the future we will oh we are practicing any one of our 139 00:15:13,130 --> 00:15:15,560 machines, then we will use this massive.