1 00:00:00,450 --> 00:00:06,270 So I in this video, we are going to take a look at how to take advantage of this S.P. come in when 2 00:00:06,270 --> 00:00:08,190 it has the user permissions. 3 00:00:08,500 --> 00:00:12,660 So if you don't mind, sir, no, I can use Arbain. 4 00:00:12,660 --> 00:00:15,780 Keep it copies the file as a rule user. 5 00:00:17,010 --> 00:00:18,360 So, no, I don't want this. 6 00:00:18,360 --> 00:00:21,770 I want to copy it Surulere or possibly file. 7 00:00:22,800 --> 00:00:28,600 So let me copy this so I will demonstrate for the soldiers file. 8 00:00:28,890 --> 00:00:32,280 And you just do that for it's a partial default. 9 00:00:32,730 --> 00:00:37,110 So I'm going to copy you to, uh, this home. 10 00:00:37,620 --> 00:00:38,880 Let's back up for it. 11 00:00:40,260 --> 00:00:42,100 So let's back up. 12 00:00:42,450 --> 00:00:44,070 So if I get backup. 13 00:00:46,630 --> 00:00:50,060 So permission denied and certainly no backup. 14 00:00:52,690 --> 00:00:58,510 So far it is being a little bit so I would say no. 15 00:01:02,370 --> 00:01:10,440 So let me, uh, display the permissions and we have already relaxes even the routers are the real axis 16 00:01:11,400 --> 00:01:12,150 of this back. 17 00:01:12,510 --> 00:01:18,640 So what we want to do is you need to, uh, send this file to the next machine. 18 00:01:18,840 --> 00:01:25,150 So this is a temporary camp or any user which you have got the conversion and you need to send this 19 00:01:25,170 --> 00:01:28,970 to, uh, machine will attack attacker machine. 20 00:01:29,100 --> 00:01:35,900 And in this attack machine, you need to modify the contents of this file and listen to this, uh, 21 00:01:35,900 --> 00:01:40,770 with the machine and then you can copy in and replace those words. 22 00:01:40,840 --> 00:01:42,630 But I hope we have understood this. 23 00:01:43,060 --> 00:01:44,670 So let me covid this one. 24 00:01:44,970 --> 00:01:55,900 I have the revolution pseudo copy that backup and I'm going to home, uh, curry and desktop. 25 00:01:56,250 --> 00:02:03,360 So in normal cases, you will have another machine to machine and then you can just start the server 26 00:02:03,360 --> 00:02:06,450 on that machine and you can just do that together. 27 00:02:06,750 --> 00:02:12,570 So it's very simple so that we are going to compete on the desktop. 28 00:02:12,590 --> 00:02:13,470 Let's back up. 29 00:02:15,210 --> 00:02:19,440 And now if I go to this current desktop, I have this backup for. 30 00:02:20,340 --> 00:02:23,050 So let me change this permissions. 31 00:02:23,070 --> 00:02:25,640 You see, it's not because it's our colonics machine. 32 00:02:25,950 --> 00:02:30,830 I have every other permission, 777 backup. 33 00:02:31,680 --> 00:02:34,130 Now, I can just simply, uh. 34 00:02:34,230 --> 00:02:35,690 No, no backup. 35 00:02:37,380 --> 00:02:38,220 So it's easy. 36 00:02:38,520 --> 00:02:42,030 No, we can just type, uh, amp. 37 00:02:44,530 --> 00:02:55,720 All the courage to say, ah, ah, and then I'm defending our governments, not its contracts. 38 00:02:57,040 --> 00:03:05,650 Now, if I just say get back up and I can see there is a computer with every permission, now, we need 39 00:03:05,650 --> 00:03:11,050 to send this file back to this temp user. 40 00:03:11,260 --> 00:03:19,670 So Surah Sepi back home to. 41 00:03:23,600 --> 00:03:24,310 OK, sorry. 42 00:03:25,640 --> 00:03:29,210 I think it will replace us, so let me see a backup. 43 00:03:33,200 --> 00:03:42,770 So let me rename this, OK, Home Temp and Sir Swallowers to. 44 00:03:44,770 --> 00:03:47,470 For SARS, now, this this urge to. 45 00:03:48,280 --> 00:03:53,130 I can just simply view the fight and there we go. 46 00:03:53,350 --> 00:03:54,760 We got the modified. 47 00:03:54,830 --> 00:03:56,680 You know what I want to raise? 48 00:03:56,950 --> 00:04:01,510 I would just simply be doctors, lawyers. 49 00:04:02,950 --> 00:04:09,570 And I will replace this file with this suit filed. 50 00:04:12,440 --> 00:04:14,810 So now this will be covering the. 51 00:04:16,670 --> 00:04:20,750 Now, if I just get it, see Soraya's. 52 00:04:23,690 --> 00:04:24,760 Now it's Spanish. 53 00:04:25,420 --> 00:04:35,380 OK, but our contents have been pressured on this, so for you're facing a pseudo minus, let that the 54 00:04:35,380 --> 00:04:37,210 passport for the time and I get the. 55 00:04:38,230 --> 00:04:38,800 There you go. 56 00:04:39,400 --> 00:04:43,570 So what we have done is so we are made to conform. 57 00:04:44,090 --> 00:04:51,460 So what they've done is we have copied the Swiss file into our temporary user machine and then we have 58 00:04:52,150 --> 00:04:54,250 a copy to our current machine. 59 00:04:54,280 --> 00:05:01,060 And in that machine, we have changed the file permissions and added this line and the user name and 60 00:05:01,060 --> 00:05:01,990 our permissions. 61 00:05:01,990 --> 00:05:07,300 And then back we have copied back this file into this machine. 62 00:05:07,300 --> 00:05:13,520 And then we have replaced this, uh, original software with our modified server. 63 00:05:13,750 --> 00:05:21,250 So that's why I doing this, because we have the permissions of this pseudo, uh, to further speak 64 00:05:21,400 --> 00:05:24,240 it and we can copy without any password. 65 00:05:24,520 --> 00:05:31,930 So we have added the temple user with our permissions that say if we if I run this system and say I 66 00:05:31,930 --> 00:05:32,850 got this router. 67 00:05:34,270 --> 00:05:43,150 So this requires uploading and downloading files to and fro from the user machine and the machine user 68 00:05:43,150 --> 00:05:44,450 machine and the attacker machine. 69 00:05:44,500 --> 00:05:50,290 So you just you just practice with one or two times, then you will get to use it. 70 00:05:50,830 --> 00:05:52,390 So I hope you have understood this one.