1 00:00:00,500 --> 00:00:05,490 Recovered from the previous few years of the metal sprite, we have clear this matter better towards 2 00:00:05,580 --> 00:00:09,900 deception and we have character to put to the put forward for four. 3 00:00:10,140 --> 00:00:15,340 So what if, uh, the four four four four pot is broken without fireworks? 4 00:00:15,450 --> 00:00:23,220 So that's why we to change the pot to the observers put like eight zero eight zero zero are four for 5 00:00:23,220 --> 00:00:23,500 the three. 6 00:00:24,150 --> 00:00:30,080 So first of all, let me run this massive of console meanwhile. 7 00:00:31,710 --> 00:00:40,410 So in the meantime, we will get the payload using a massive so massive venom, minus B of plus. 8 00:00:47,750 --> 00:00:50,290 Bitter, bitter divorce, divorce, sorry. 9 00:00:52,160 --> 00:00:58,090 So this will come to the point eight zero zero or 80. 10 00:00:59,870 --> 00:01:03,470 So it was more like a provocation from the federal point of view. 11 00:01:03,620 --> 00:01:07,150 So whatever the point, it is running out. 12 00:01:07,160 --> 00:01:08,490 We do not care. 13 00:01:08,660 --> 00:01:16,360 So if he copied into this machine, will copy into these Windows XP and then it will run on the sunspot, 14 00:01:16,370 --> 00:01:18,340 which is said 2000. 15 00:01:18,770 --> 00:01:23,490 But the definition should be it is already at 443. 16 00:01:23,750 --> 00:01:27,940 So in that case, the firewall allows the user to communicate with Web server. 17 00:01:28,040 --> 00:01:35,780 So because no user wants to communicate with the Web servers that way are eighty four for the three 18 00:01:35,780 --> 00:01:41,600 and eight zero zero are generally open for these Web server requestion responses. 19 00:01:42,230 --> 00:01:45,620 So it doesn't matter whether it should be. 20 00:01:46,790 --> 00:01:50,450 And I want to say it is my IP address. 21 00:01:54,490 --> 00:02:03,740 And will this airport is equal to zero eight zero, so then we need to say spicewood architecture, 22 00:02:04,000 --> 00:02:06,240 that will do it and backcourts. 23 00:02:13,110 --> 00:02:22,700 These three are the gender bad characters and format executable, and we will not exceed. 24 00:02:28,510 --> 00:02:35,990 So we will generate the message to the people and with the options. 25 00:02:36,010 --> 00:02:37,400 I lost my in. 26 00:02:39,520 --> 00:02:42,080 So let's resume let's set up the reserve. 27 00:02:42,670 --> 00:02:47,350 We need to use the multi exploit, Marty and. 28 00:02:50,600 --> 00:02:59,090 So we need to set this period, which we are, which we want to cut the catch, the connection, separate 29 00:02:59,510 --> 00:02:59,700 matter. 30 00:03:00,910 --> 00:03:03,110 So this one I just copied this one. 31 00:03:06,900 --> 00:03:15,510 And paste it in here, so whenever we execute or execute well, then it will connect to our local host 32 00:03:15,510 --> 00:03:16,230 and the local. 33 00:03:16,700 --> 00:03:24,080 Ejiro, uh, let's host our next IP address. 34 00:03:31,240 --> 00:03:40,060 So I think we need to just run this and it will start to debate, Senator, on this, uh, you are out 35 00:03:40,070 --> 00:03:40,570 and about. 36 00:03:40,600 --> 00:03:46,750 No, no, let me copy this into the desktop so that I can easily copy. 37 00:03:52,250 --> 00:03:59,540 All right, here is our video to see me copy this and paste it in our Windows machine. 38 00:04:08,970 --> 00:04:17,010 OK, now I'm going to open up this defender will easily identified Perutz. 39 00:04:35,590 --> 00:04:36,640 So. 40 00:04:40,050 --> 00:04:47,220 So now let me copy this again, and we are successfully covid this now let's try this on our Windows 41 00:04:47,220 --> 00:04:47,910 XP machine. 42 00:04:48,420 --> 00:04:51,100 Let's copy this and push it in here. 43 00:04:52,240 --> 00:04:58,960 Now, this is, uh, handwriting reasoning and we to run this executable. 44 00:04:59,640 --> 00:05:03,730 So this you should actually build a connection to this guy. 45 00:05:03,730 --> 00:05:10,110 Your next machine, as you can see, materialisation opened up from this computer. 46 00:05:10,150 --> 00:05:15,500 I mean, we are initiating the materialisation after getting a correction from our IP address phone 47 00:05:15,540 --> 00:05:15,840 number. 48 00:05:16,710 --> 00:05:22,770 And the machine is Windows XP and the vote is one zero five or so on the machine, the one that is running 49 00:05:22,770 --> 00:05:25,340 on the port, one zero five four. 50 00:05:25,890 --> 00:05:27,450 And it does not care. 51 00:05:27,870 --> 00:05:34,740 Fiderer does not care because user can run any service on any port, in any program, on any port. 52 00:05:34,740 --> 00:05:41,080 But it will check the open connections so that this binary is connected to a generator. 53 00:05:41,130 --> 00:05:46,120 So that's why it has allowed us to, uh, for the connection. 54 00:05:46,380 --> 00:05:55,260 So in normal cases, which puts the firewall rules for 4000, 5000, 6000 ports, but generally the 55 00:05:55,260 --> 00:06:02,400 firewall settings will be a zero and four for the three for the website or web surfing. 56 00:06:03,420 --> 00:06:12,660 So that's how you just, uh, one of these basic technique to bypass the firewall and you need to use 57 00:06:12,660 --> 00:06:16,620 some common ports that are open for the victim. 58 00:06:18,930 --> 00:06:28,920 And then we can say to get the command, that XP machine go, that, uh, it. 59 00:06:38,210 --> 00:06:46,130 So that's how you create the HTP pillar of a new thing that the foreign fighters imports are broken, 60 00:06:46,730 --> 00:06:48,550 then you can create the original. 61 00:06:51,590 --> 00:06:53,110 So I hope he understood. 62 00:06:53,130 --> 00:06:57,590 That's all for this next year, we'll use the word WCP. 63 00:06:57,590 --> 00:07:05,900 Our ports to brute force are the ports which are open, and we will get the connection on one open port.