1 00:00:00,450 --> 00:00:05,070 So residents in this area will be looking about the suit and its boundaries. 2 00:00:05,800 --> 00:00:12,870 Uh, so let's with this comment so it will take search for the files and the permission user Bittoun 3 00:00:12,870 --> 00:00:14,130 and GroupM. 4 00:00:14,400 --> 00:00:20,880 And then upon searching those penalties and this part gets executed, that is the list. 5 00:00:21,360 --> 00:00:25,340 That is what gets shown for these penalties. 6 00:00:25,350 --> 00:00:29,030 And we are putting the standard error to be OK. 7 00:00:29,490 --> 00:00:38,310 So that's a this mindset that so far, short of an expression with the, uh, assurity at least Gerdy 8 00:00:39,090 --> 00:00:42,030 suppose a thing and. 9 00:00:45,000 --> 00:00:53,970 This file, we're getting this file as an executable site, so sometimes one user wants to execute a 10 00:00:53,970 --> 00:00:55,270 command as a route user. 11 00:00:55,560 --> 00:01:04,470 So in that case, administrator, least this bit to us and the administrator said this bit so that any 12 00:01:04,470 --> 00:01:09,330 user can use this executable as the parade route user. 13 00:01:10,620 --> 00:01:13,810 So that is the advantage of this suit and a bit. 14 00:01:14,310 --> 00:01:25,660 So if this, uh, Betty said that means, uh, the user can run this, uh, can run this file as a route 15 00:01:25,660 --> 00:01:30,270 to the produce and in the same way this, uh, user group. 16 00:01:30,300 --> 00:01:32,040 So this is the group permissions. 17 00:01:32,220 --> 00:01:40,200 And if the executive to the group permissions have been said, then that can be run by the users belonging 18 00:01:40,200 --> 00:01:41,980 to the group as a route user. 19 00:01:42,210 --> 00:01:45,390 So that is the, uh, absolutely necessary. 20 00:01:45,390 --> 00:01:45,930 But it is. 21 00:01:46,320 --> 00:01:48,170 So now let's paste this comment. 22 00:01:48,210 --> 00:01:52,470 And, you know, you can see are these which are the yes. 23 00:01:52,470 --> 00:01:52,790 On. 24 00:01:52,830 --> 00:01:58,670 So that means, uh, we can run these boundaries as a part of this user or this group. 25 00:01:58,680 --> 00:01:59,870 So you can see a split. 26 00:02:02,290 --> 00:02:11,940 All right, now, touching on this, I can see what did they do was the first one, so the symbol. 27 00:02:12,220 --> 00:02:17,620 So you can see there is a four eight four three so that you can copy that. 28 00:02:18,190 --> 00:02:20,260 And let's Google for further exploit. 29 00:02:21,520 --> 00:02:26,860 And you can see there is a local police description with this one hundred. 30 00:02:26,870 --> 00:02:35,740 See, so you need to so you can just aggregate this script file. 31 00:02:36,040 --> 00:02:38,010 So this contains this code. 32 00:02:39,120 --> 00:02:44,470 So, OK, I think they have already posted here to see the pools. 33 00:02:49,700 --> 00:02:51,100 So, Exuma. 34 00:02:55,430 --> 00:02:57,890 So orange trees run this group. 35 00:03:01,580 --> 00:03:06,230 So it's the same call as the next day, so you can just run this. 36 00:03:11,040 --> 00:03:18,990 And we were told no exit to display some progress, but so let's clear this one. 37 00:03:24,020 --> 00:03:30,030 So the next morning, we are going to take advantages of this bill so soon. 38 00:03:30,170 --> 00:03:31,370 So let's copy this. 39 00:03:31,730 --> 00:03:44,240 And what you can do is you can run the strings on this so you can see it is using this library and also 40 00:03:44,240 --> 00:03:46,210 it's using this one. 41 00:03:46,220 --> 00:03:46,820 This one. 42 00:03:49,760 --> 00:03:51,900 And God creating something, OK? 43 00:04:00,970 --> 00:04:13,960 And you can see what they given us and we need to find Siddharta so so Garci Library, I don't think 44 00:04:13,960 --> 00:04:15,460 we are seeing in this world. 45 00:04:15,480 --> 00:04:16,720 I think we picked the wrong. 46 00:04:18,370 --> 00:04:19,480 So it's cartoon. 47 00:04:21,800 --> 00:04:23,450 You should see Dallasite. 48 00:04:29,390 --> 00:04:30,890 So let me grab for that. 49 00:04:36,930 --> 00:04:42,030 OK, it's not OK, you here, I'm sorry, home users are confused, reconsidered. 50 00:04:42,230 --> 00:04:44,570 OK, so let's go to the home three. 51 00:04:59,100 --> 00:05:06,360 And we need to make up for that is not conflict, so you can see here the conflict and we need to make 52 00:05:06,360 --> 00:05:07,850 them reconsider this offer. 53 00:05:08,410 --> 00:05:21,980 So right now, what we can do is they have given some C-code assurance, the sweet. 54 00:05:24,030 --> 00:05:25,740 So yet this is the sequel. 55 00:05:25,980 --> 00:05:27,500 So let me give you the contents. 56 00:05:27,510 --> 00:05:30,630 It's simple, uh, burning the Bashur. 57 00:05:33,080 --> 00:05:36,670 So you can see here setting the use radius and then finding the bush. 58 00:05:37,220 --> 00:05:38,710 OK, now let's compare this. 59 00:05:39,830 --> 00:05:41,760 So we need to compare the shared object. 60 00:06:02,510 --> 00:06:03,320 And no, you don't. 61 00:06:04,670 --> 00:06:13,280 So now what you can do is you can run the soda and then covid this one. 62 00:06:13,760 --> 00:06:21,920 So upon execution it will load the shelter from this, uh, configuration folder and then execute our 63 00:06:22,190 --> 00:06:23,620 core and hit internal. 64 00:06:24,320 --> 00:06:25,610 So type in the password. 65 00:06:28,120 --> 00:06:28,860 And he the. 66 00:06:39,670 --> 00:06:41,740 So I think you could just run this. 67 00:06:43,750 --> 00:06:51,690 OK, so not only does it run as you, uh, it will automatically reproduce, so exec. 68 00:06:55,680 --> 00:06:58,450 So let's again, from the federal government, the. 69 00:07:01,940 --> 00:07:09,740 So the next one is going to be a in Rome, that's Cofidis, and that's her understrength. 70 00:07:14,170 --> 00:07:19,340 So it is now turning this service about to start. 71 00:07:19,360 --> 00:07:19,740 OK. 72 00:07:23,270 --> 00:07:27,490 So we can take the bin Bash version. 73 00:07:32,050 --> 00:07:33,650 So it's four point one here. 74 00:07:33,670 --> 00:07:34,710 They have mentioned. 75 00:07:40,390 --> 00:07:45,280 OK, so here we need to modify the pot variable. 76 00:07:45,910 --> 00:07:51,780 All right, we have also given the service that so do not see that less. 77 00:07:52,660 --> 00:08:00,910 So let's go see service, not C minus for service. 78 00:08:04,850 --> 00:08:08,320 So I'm throwing in the towel for the. 79 00:08:13,030 --> 00:08:15,970 So now all we need to do is we need to export the. 80 00:08:27,680 --> 00:08:36,640 So now the path first contains the template and then this remaining part and now we can run this one 81 00:08:38,210 --> 00:08:42,860 so we can run this and we should get the roots. 82 00:08:46,950 --> 00:08:57,100 So exude this, so the next one would be Robin, OK, so here what we are going to raise in Bashkortostan. 83 00:08:57,120 --> 00:09:05,250 Resident for Pintu can create a own function and we can name that function as this user has been service. 84 00:09:05,980 --> 00:09:07,530 So to that. 85 00:09:11,600 --> 00:09:15,590 So this one, copy this and Ernestine's. 86 00:09:18,500 --> 00:09:25,690 So it is using this full report so we cannot modify the patchwork quilt instead, uh, we can modify 87 00:09:25,690 --> 00:09:25,870 it. 88 00:09:25,880 --> 00:09:27,410 We can create a new function. 89 00:09:27,440 --> 00:09:27,850 OK. 90 00:09:33,070 --> 00:09:37,270 So function and the function name, so Karaka. 91 00:09:47,350 --> 00:09:49,270 So you can also read a reversal here. 92 00:09:59,390 --> 00:10:06,290 OK, now I can just simply run this so I can see you the. 93 00:10:09,020 --> 00:10:19,850 So the last penalty we are going to see is the environment to Soheir, uh, bashes the environment, 94 00:10:19,850 --> 00:10:24,090 which will be useful to display an extra prompt for debugging shipments. 95 00:10:24,770 --> 00:10:27,920 Right now, we can change this useful part to this one. 96 00:10:27,980 --> 00:10:35,090 So you can see we are copying the been to that, uh, another copy of this, Rupesh, in the and then 97 00:10:35,090 --> 00:10:40,640 we are giving the, uh, the setting the user back so I can just simply copy this export. 98 00:10:47,550 --> 00:10:53,190 So I can push it in here so you can see at the end we have done this one. 99 00:10:54,070 --> 00:10:56,160 So I think we should see No. 100 00:11:12,880 --> 00:11:21,010 So you can see this is the function service function and it can be so arani to release and execute this 101 00:11:21,010 --> 00:11:21,220 one. 102 00:11:27,110 --> 00:11:36,550 So we got the Rucha, so this is how you take multiple ways to take advantage of this resistible so 103 00:11:36,580 --> 00:11:39,430 that we really what we have discussed and so forth. 104 00:11:39,890 --> 00:11:46,640 So when we have the permissions, we can just search for the expertise and we get there, OK? 105 00:11:47,630 --> 00:11:51,080 And then we can to know, order this suit. 106 00:11:51,080 --> 00:12:01,910 Somebody has been using the shrubbery and we created a fake script that just simply a and then we compared 107 00:12:01,910 --> 00:12:10,250 it to the shell and then, uh, we proceed instead of that. 108 00:12:11,100 --> 00:12:12,140 Uh oh no. 109 00:12:12,290 --> 00:12:13,680 So there should be original one. 110 00:12:13,790 --> 00:12:18,050 So we created a bash and we picked up there. 111 00:12:18,260 --> 00:12:21,770 So we got the user and then modifying the where. 112 00:12:22,220 --> 00:12:27,780 So whenever the buyer is using, uh, not using the full part and it's using the normal part. 113 00:12:28,010 --> 00:12:34,700 So then you can change the pathway and then here we create a new function because it's using the absolute 114 00:12:34,710 --> 00:12:35,390 potful. 115 00:12:35,390 --> 00:12:40,940 But you can see here, this is everybody choosing. 116 00:12:40,970 --> 00:12:45,260 So we created a, uh, fix function in the name of this one. 117 00:12:45,290 --> 00:12:50,550 So when, uh, this binary is executing this one, this function gets executed. 118 00:12:51,020 --> 00:12:57,190 So at the last we have seen that there is a peaceful variable and it works only under the versions of 119 00:12:57,190 --> 00:12:58,210 four Furbish. 120 00:12:58,670 --> 00:13:04,040 So we have created the code here and then we go through. 121 00:13:07,870 --> 00:13:10,480 So you can go to the Kerry camp. 122 00:13:13,710 --> 00:13:15,180 So we had the Rupesh. 123 00:13:23,650 --> 00:13:32,500 OK, so that's how you take my ways to get a rupture with when you have the switch originally, Benediktsson.