1 00:00:00,390 --> 00:00:06,290 So very soon this year, we're going to see the country explode and like in a relax, we have seen economic 2 00:00:06,300 --> 00:00:06,720 spikes. 3 00:00:06,720 --> 00:00:12,180 We have used this Kleenex expression to suggest the country expects for that system. 4 00:00:12,780 --> 00:00:16,940 So in this video, we're going to see the similar to that is Windows experts. 5 00:00:17,520 --> 00:00:24,240 So you go on to Browsr and such Furnas Specialisterne and you get to the top of the Wall Street. 6 00:00:24,240 --> 00:00:31,320 You know, I cannot open the browser because these windows on that machine is running and I cannot open 7 00:00:32,610 --> 00:00:33,720 my laptop getting. 8 00:00:34,110 --> 00:00:37,110 So I have already grown that capacity. 9 00:00:44,040 --> 00:00:48,790 So this is the witness exposed at the start, so let's move on to this barratry. 10 00:00:53,630 --> 00:01:02,690 So this one so this is the pattern and this is the pattern to so we need to run this with on, too, 11 00:01:03,620 --> 00:01:11,530 so we need to see a pattern to witness experts and we need to say a bit. 12 00:01:12,350 --> 00:01:14,000 So we need to update this pattern. 13 00:01:14,420 --> 00:01:21,470 So what this update does is despite an effort to create a spreadsheet database of all the exploits, 14 00:01:22,010 --> 00:01:23,650 so different this one. 15 00:01:25,610 --> 00:01:30,050 So it has created this data and this Excel. 16 00:01:30,260 --> 00:01:32,510 There is a spreadsheet, Excel spreadsheet. 17 00:01:32,750 --> 00:01:36,430 It contains a database of all Windows, uh, exploits. 18 00:01:37,340 --> 00:01:43,010 So now what you're going to do is we want to get the system information from the non-commercial. 19 00:01:45,450 --> 00:01:47,370 So let's go ahead and this. 20 00:01:48,270 --> 00:01:50,430 Oh, it's. 21 00:01:52,750 --> 00:01:56,860 So let's listen on this one, two, three, four. 22 00:01:58,240 --> 00:02:04,300 Let's go ahead and respond to the already clear that this is just simple reverse distribution. 23 00:02:04,750 --> 00:02:06,400 You'll get the shuttle back to us. 24 00:02:14,780 --> 00:02:16,120 So it's not working. 25 00:02:16,380 --> 00:02:23,140 Let's just extract the system information so it does open up. 26 00:02:23,450 --> 00:02:27,580 And so this is a prescription, right? 27 00:02:27,590 --> 00:02:35,810 So we need to get the system in Fogelman system in full and get the ah, the information. 28 00:02:40,750 --> 00:02:47,860 So you can run in a normal year after getting a normal year and let's return to this. 29 00:02:53,740 --> 00:02:59,420 Scooter put in to say, siccing for not paying. 30 00:03:03,630 --> 00:03:05,280 So now let me call this. 31 00:03:15,950 --> 00:03:21,340 And again, no red carpet, our current Kleenex machine seen for attention. 32 00:03:21,380 --> 00:03:25,070 So this Furqan, been to all the information about this Wintersun mission. 33 00:03:25,370 --> 00:03:28,970 Now, this will be input to our update on. 34 00:03:39,220 --> 00:03:43,480 So we copied this system for the text you find Dover, Florida. 35 00:03:43,620 --> 00:03:53,380 Now we want to run this by turn to Windows Express only to do the database option and the filename for 36 00:03:53,380 --> 00:03:57,160 this database, which is the spreadsheet file. 37 00:03:58,600 --> 00:04:01,360 So now we need to define this system in four. 38 00:04:03,640 --> 00:04:11,430 System info, I need to specify this picture that containing the basic information of our local region 39 00:04:11,590 --> 00:04:11,970 shall. 40 00:04:14,470 --> 00:04:22,500 Now, what you need to turn to see the syntax python, too, and exploit the Python file and the database, 41 00:04:22,510 --> 00:04:26,810 we need to refer this spreadsheet for which are created using the update. 42 00:04:26,860 --> 00:04:34,230 So this information would be checked, this database, and you could find the experts that we can leverage 43 00:04:34,240 --> 00:04:37,970 our, uh, uh, pruritus. 44 00:04:38,290 --> 00:04:43,420 Zoroaster on this fancy database for digital, as expressed are RSX. 45 00:04:52,840 --> 00:05:00,250 Now, it has read information and has described what are the vulnerabilities, so it has also given 46 00:05:00,250 --> 00:05:03,550 some links to these exploits. 47 00:05:04,210 --> 00:05:05,350 You can check those as well. 48 00:05:07,240 --> 00:05:09,870 So you can see there are a ton of experts. 49 00:05:10,360 --> 00:05:13,180 So now what we're going to do is I'm going to perform. 50 00:05:13,180 --> 00:05:19,670 This cannot exploit this is this one, just kanamori drivers, Koraro College Education. 51 00:05:19,990 --> 00:05:21,120 So Mr. Bindura. 52 00:05:22,750 --> 00:05:26,170 So let's go into this matters. 53 00:05:26,270 --> 00:05:29,320 Right before that, I want to show you the miner exploitation. 54 00:05:30,130 --> 00:05:33,640 I don't know that this Yuxi but it did not work out. 55 00:05:33,880 --> 00:05:35,340 Let me show you this one. 56 00:05:39,660 --> 00:05:41,070 So that's who might. 57 00:05:44,110 --> 00:05:50,270 Have normal producer, and we need to run this mess that in 53. 58 00:05:52,470 --> 00:05:54,140 And they just keep saving. 59 00:05:56,580 --> 00:06:00,690 So still, I am Mickey. 60 00:06:01,000 --> 00:06:02,000 Let's run this again. 61 00:06:03,660 --> 00:06:07,020 So this minor explosion keeps fading. 62 00:06:07,950 --> 00:06:11,350 So we need to use the metaphor because it matters, right? 63 00:06:11,530 --> 00:06:13,250 All the experts are being tested. 64 00:06:13,470 --> 00:06:19,930 So before going to the will to get the basics right, so we need to use this exploit. 65 00:06:19,950 --> 00:06:21,330 Marty handwrote. 66 00:06:25,790 --> 00:06:35,330 These are the people I have already created this matter, Peter Yaguchi, which is a reverse super special. 67 00:06:47,820 --> 00:06:48,480 I'm sorry. 68 00:06:51,850 --> 00:06:54,830 So options and we have to set that horsnell. 69 00:07:06,320 --> 00:07:08,540 That's Rhonda Multi-Manager. 70 00:07:09,720 --> 00:07:11,160 Now let's run this. 71 00:07:14,450 --> 00:07:23,390 Order on matter this, you know, you got the two sessions open, so that's background this RSU sessions. 72 00:07:25,200 --> 00:07:39,380 Interesting musicians when we got the one we got from one zero one, so that is my main Windows computer, 73 00:07:39,390 --> 00:07:40,650 but we do not need that. 74 00:07:43,340 --> 00:07:44,670 Sort of take. 75 00:07:49,210 --> 00:07:56,380 So this one zero one, so I don't know why it's executer from my Windows machine, so let's hear this 76 00:07:56,380 --> 00:07:56,990 first one. 77 00:07:57,010 --> 00:08:00,120 That is my actual Wildenstein computer. 78 00:08:03,420 --> 00:08:10,630 So maybe I just copied the maybe I copied from that way, but I don't know. 79 00:08:11,190 --> 00:08:13,010 So let's just kill the first one. 80 00:08:15,880 --> 00:08:20,930 So we have got this 190 to 162 regular one one, which is this one. 81 00:08:22,510 --> 00:08:32,280 So now we want to search for a 13 and zero five three. 82 00:08:32,290 --> 00:08:33,700 So search for this one. 83 00:08:34,150 --> 00:08:35,890 And we have got this exploit. 84 00:08:36,310 --> 00:08:42,760 So let's say you use zero and type options. 85 00:08:45,280 --> 00:08:46,850 So need to set the session. 86 00:08:47,500 --> 00:08:50,320 So this is the session at least to. 87 00:08:55,580 --> 00:08:56,930 So we said this one. 88 00:08:56,960 --> 00:08:59,010 Let me show again options. 89 00:09:00,560 --> 00:09:01,880 So now let's run this. 90 00:09:06,060 --> 00:09:18,470 Now, it is also starting the handler, he concedes launching is not part of the process that is so 91 00:09:18,780 --> 00:09:25,470 bitter injection into this process and everything seems houseworker and materialisation three has opened. 92 00:09:26,280 --> 00:09:27,330 Now let's go. 93 00:09:27,330 --> 00:09:27,750 Shall. 94 00:09:29,910 --> 00:09:31,290 And who am I? 95 00:09:33,330 --> 00:09:41,010 So we have got this interactive system, so experts are better to use and they are thoroughly tested 96 00:09:41,010 --> 00:09:42,500 and important us. 97 00:09:42,750 --> 00:09:44,820 That's why I recommend this. 98 00:09:45,180 --> 00:09:45,510 Right. 99 00:09:45,870 --> 00:09:54,120 But if you are preparing for exams, then this matter, Peter matters has restrictions you can only 100 00:09:54,120 --> 00:09:54,630 use once. 101 00:09:54,990 --> 00:09:56,840 Then you need to search for this. 102 00:09:56,850 --> 00:10:01,850 A massive 13 53 executable are exploit and blunder. 103 00:10:02,310 --> 00:10:05,390 So this manually, whatever method failed. 104 00:10:05,400 --> 00:10:06,710 I don't know why it's failed. 105 00:10:07,650 --> 00:10:08,430 So just. 106 00:10:10,560 --> 00:10:17,250 So you need to try again and again, but this matters, right, expert, houseworker perfectly well, 107 00:10:17,940 --> 00:10:23,940 just once you were trying for this minor exclave downloading from the ghetto and you have this mess 108 00:10:23,990 --> 00:10:26,780 that you just search for this amazing Eurofighter. 109 00:10:27,390 --> 00:10:29,100 So we are seeing this from those experts. 110 00:10:29,820 --> 00:10:35,640 And you can also try other exploits that are so disturbing, these windows, especially stuff. 111 00:10:36,690 --> 00:10:37,590 So that's how far this. 112 00:10:37,920 --> 00:10:39,990 I hope you have understood this cannot exploit.