1 00:00:00,510 --> 00:00:04,950 So our will welcome back, so indisputable within in the box. 2 00:00:05,400 --> 00:00:06,500 This is a return machine. 3 00:00:06,510 --> 00:00:10,560 So you knew that, uh, gave you a subscription to this machine? 4 00:00:10,930 --> 00:00:14,670 OK, I have already poured on the machine, and this is like diverters. 5 00:00:15,180 --> 00:00:23,820 And also I have done that and Metzker so I have ordered done that in match condition or disease pots 6 00:00:23,820 --> 00:00:25,470 and there are no reports of that. 7 00:00:25,800 --> 00:00:27,520 So we have the two votes open. 8 00:00:27,540 --> 00:00:30,170 That is FTB Part and the website. 9 00:00:30,360 --> 00:00:36,200 But first, let's check whether we can access the piece of using the anonymous blogging. 10 00:00:39,350 --> 00:00:49,460 So if TB patient diabetes and not by the user anonymous and Advisory's also anonymous. 11 00:00:54,580 --> 00:01:01,060 As you can see here, enormous acts of terror and no, you can see we have successfully logged in as 12 00:01:01,060 --> 00:01:03,070 anonymous as a terrorist. 13 00:01:05,740 --> 00:01:13,990 So we are aware that a tree is Pinette ground and nature started and we're behind you, OK, if you 14 00:01:13,990 --> 00:01:20,830 go into this pear tree and you find nothing, OK, now what we're doing is we need to locate our welcome 15 00:01:20,830 --> 00:01:25,200 that Benji and I and the brother took it. 16 00:01:25,660 --> 00:01:28,380 This is the main Web page that is electronic. 17 00:01:28,750 --> 00:01:30,520 No press control you. 18 00:01:34,110 --> 00:01:43,920 Now, you can see here the source code and Don, you can see here a link to official documentation about 19 00:01:43,920 --> 00:01:45,870 this IRS Web server. 20 00:01:46,140 --> 00:01:49,970 And you can see here the sources equals to work on PMG. 21 00:01:50,220 --> 00:01:54,030 So that means there are no folders, uh, for this. 22 00:01:54,490 --> 00:02:03,590 Uh, that means this particular PMG has been directly from the root, uh, root, Florida. 23 00:02:03,810 --> 00:02:10,440 So what we can do is we can to slash will come to be. 24 00:02:10,440 --> 00:02:18,780 And now you can see we have successfully accessed that under using the uh. 25 00:02:18,810 --> 00:02:20,150 You are in the browser. 26 00:02:20,850 --> 00:02:22,630 OK, no. 27 00:02:24,410 --> 00:02:33,570 Now what we can do is, uh, let's upload a speed brochure so you can see here it has a dead tree. 28 00:02:33,570 --> 00:02:34,840 Is Pineta underscoring. 29 00:02:35,040 --> 00:02:46,420 So this is similar to the BHP, but it's from the Microsoft say, OK, now search for a -- towards. 30 00:02:51,390 --> 00:03:00,380 OK, now you look at this website, you double checked, oh, this shirt is fixed and not Alexandra 31 00:03:00,390 --> 00:03:02,150 and confidence and tell. 32 00:03:05,160 --> 00:03:09,300 So now create a new file. 33 00:03:13,130 --> 00:03:23,230 I think I have already done this, so again, this is the room that is because they care about is built. 34 00:03:23,390 --> 00:03:27,550 So there is so much code for the simple. 35 00:03:28,910 --> 00:03:30,550 This is in the ISP. 36 00:03:34,390 --> 00:03:38,090 And you need to change the IP address here, IP address and the port. 37 00:03:39,550 --> 00:03:43,720 OK, now let me know our IP address. 38 00:03:44,140 --> 00:03:44,930 We do the same. 39 00:03:45,550 --> 00:03:47,650 So I need to boost. 40 00:03:50,140 --> 00:03:54,070 I read this, I will address, and so I am fine with the one, two, three, four. 41 00:03:56,320 --> 00:03:57,870 OK, let's start over. 42 00:03:58,180 --> 00:04:00,570 Jack is not one, two, three, four. 43 00:04:01,870 --> 00:04:11,490 OK, back to our if to be sure now to put a robot in your speaks. 44 00:04:11,740 --> 00:04:17,320 So make sure that you have logged in in the effectiveness of using the same territory, home territory 45 00:04:18,010 --> 00:04:20,850 the way the reverse is rocket. 46 00:04:21,110 --> 00:04:21,780 No you don't. 47 00:04:21,780 --> 00:04:24,370 Who you can see a photo the service, not a word. 48 00:04:24,640 --> 00:04:27,540 That means a service has been disconnected. 49 00:04:34,360 --> 00:04:39,750 So you need to make sure that you have been active all the time in this institution. 50 00:04:44,040 --> 00:04:47,620 Now we can tell you that he because. 51 00:04:50,090 --> 00:04:59,390 And it's sells and you can see there is no water and you need to change this to SBX. 52 00:05:02,370 --> 00:05:03,210 No, he didn't to. 53 00:05:06,080 --> 00:05:17,320 Now you get the reversal, and one other matter is you can locate the shells, rocket shells and Grippo 54 00:05:17,330 --> 00:05:28,580 for a speech so you can see you can use this command E.S.P that speaks so I guess similar to content 55 00:05:29,510 --> 00:05:30,380 extremophile. 56 00:05:30,620 --> 00:05:34,610 So you get an option here to Central Command. 57 00:05:34,640 --> 00:05:39,770 So you need under the command and you do, uh, tenter to invoke that. 58 00:05:39,770 --> 00:05:42,250 Can't smoke anywhere. 59 00:05:43,320 --> 00:05:46,720 Uh, you can also do this via this GetUp brochure. 60 00:05:48,110 --> 00:05:57,000 So, no, I have uh, I'll tell you what I have done after getting the normal shirt and this is it. 61 00:05:57,110 --> 00:06:11,640 So we are white so we are the normal I is using, OK, we cannot access any of the, uh, home territory 62 00:06:11,660 --> 00:06:12,700 of the any user. 63 00:06:14,120 --> 00:06:16,080 So if you say the. 64 00:06:19,530 --> 00:06:20,640 Users. 65 00:06:25,250 --> 00:06:30,930 So there is an Army reserve and there is a barbecue, so you cannot access those contents. 66 00:06:31,520 --> 00:06:33,190 You need to have greater police. 67 00:06:33,500 --> 00:06:39,970 So first thing I did is checking my previous using are we are --. 68 00:06:40,220 --> 00:06:44,710 It will give you about all the information of this particular user. 69 00:06:44,720 --> 00:06:49,670 You can see a user and the user that is so secure that. 70 00:06:50,170 --> 00:06:54,470 This is the symbol and you can see the group information. 71 00:06:54,590 --> 00:06:57,400 And the important thing is privileged information. 72 00:06:59,190 --> 00:07:06,240 So I expanding this one so you can see here is seeing personal privilege and personal, the kind of 73 00:07:06,450 --> 00:07:07,940 dedication has been enabled. 74 00:07:08,250 --> 00:07:16,000 So if this privileges privilege has been enabled, then what you can do is you can do the duty to explain. 75 00:07:16,620 --> 00:07:25,080 So we have done already in the act of Starting Point so you can download the, uh, juicy juicy potato 76 00:07:25,470 --> 00:07:26,190 Yuxi. 77 00:07:29,420 --> 00:07:38,570 So here this is the juice, you can you can, uh, impersonate as an administrator and CMB process, 78 00:07:39,050 --> 00:07:44,630 so, OK, I have already approved this one and I have run that. 79 00:07:45,230 --> 00:07:52,910 But, uh, it has failed because it is saying that the system has not been this program has not been 80 00:07:52,910 --> 00:07:54,440 compatible with this version. 81 00:07:55,190 --> 00:07:59,290 So then what I did is I entered this system and focolare. 82 00:08:03,380 --> 00:08:08,520 So you can see here Microsoft Windows seven underpays Bill. 83 00:08:10,490 --> 00:08:17,140 So now what we can do is we can use this information and search Google for any other country exploits. 84 00:08:17,900 --> 00:08:19,610 So those. 85 00:08:25,910 --> 00:08:29,230 Nelson underpays cobblestones zero. 86 00:08:32,330 --> 00:08:33,360 Search for flight. 87 00:08:37,060 --> 00:08:39,760 So you can see there is a local preregistration. 88 00:09:07,990 --> 00:09:17,700 And the things that I have use this one dero weeks, so this is the one that successfully, uh, it 89 00:09:17,740 --> 00:09:18,560 worked for me. 90 00:09:20,380 --> 00:09:23,860 So this is similar to every previous condition. 91 00:09:24,610 --> 00:09:31,240 And no, what you can do is you can go to this energy beat up and there is it, uh, executable. 92 00:09:31,690 --> 00:09:32,800 So download this one. 93 00:09:36,320 --> 00:09:37,490 And so the file. 94 00:09:58,650 --> 00:10:00,340 So you can see this is the answer. 95 00:10:01,440 --> 00:10:01,800 It's. 96 00:10:18,700 --> 00:10:26,440 So, OK, now what we need to do is we need to upload to our Windows seven machine and we need to run 97 00:10:26,440 --> 00:10:27,040 this binary. 98 00:10:28,110 --> 00:10:39,400 OK, one thing we can do is we can, uh, push this folder in our assembly ship, Pscholka. 99 00:10:54,870 --> 00:11:04,620 So I don't know that this impacted some are not built, so you can Google for a Simbi server not be. 100 00:11:07,720 --> 00:11:13,750 So it's the same fight I heard an order from this veteran Wall Street saying from the Impeccable. 101 00:11:14,620 --> 00:11:27,790 So know what we can do is you can Surbiton Suda by 3:00 a.m., et cetera, and we need to name our share, 102 00:11:28,030 --> 00:11:31,120 Litsa, my share. 103 00:11:31,900 --> 00:11:40,110 And we just decided that you want to share and that is Donal's and you don't. 104 00:11:41,320 --> 00:11:49,360 I've been the password and you can see we know we are hosting our Internet downloads for the. 105 00:11:53,460 --> 00:11:55,530 So let me stop this one for what? 106 00:12:02,820 --> 00:12:06,000 So let us rename this binary to simple name. 107 00:12:19,500 --> 00:12:20,310 I'm sorry. 108 00:12:27,010 --> 00:12:38,120 OK, now let's push this Dunross, Florida, OK, now how then exercise, you know, you need to downloader 109 00:12:38,130 --> 00:12:39,700 the executive into this machine. 110 00:12:39,700 --> 00:12:49,510 You can run directly using this is some horrible disease, 60, not 180. 111 00:12:52,130 --> 00:12:58,450 So it's similary, you can run it like a run commensal in windows, you press windows, press out, 112 00:12:58,460 --> 00:13:00,080 then you get the run prompt. 113 00:13:00,320 --> 00:13:02,020 And similary, you can run this. 114 00:13:02,360 --> 00:13:03,260 So it's the same. 115 00:13:04,010 --> 00:13:13,770 And my ship in this Miescher, I have the rule to not be so rude, not Yuxi and hit enter. 116 00:13:15,110 --> 00:13:17,690 So no, wait for the executable to run. 117 00:13:27,940 --> 00:13:30,730 So now that's who we are. 118 00:13:32,380 --> 00:13:40,890 So we are a system, so we are there that is no closer to Michael so we can go to KDDI. 119 00:13:43,110 --> 00:13:43,650 S.. 120 00:13:51,200 --> 00:13:52,840 Seducers and. 121 00:14:00,170 --> 00:14:04,460 To desktop, and then we can view the contents of the room flat. 122 00:14:05,280 --> 00:14:06,750 So these are the contents of the roof. 123 00:14:07,170 --> 00:14:15,210 So you can see here first, what we have done is we have 400 FPP anonymous login and then we have operator 124 00:14:15,210 --> 00:14:16,410 is Pete Rose. 125 00:14:16,950 --> 00:14:22,260 So we whenever we to the system, we have a new monitor for the system information and we found that 126 00:14:22,260 --> 00:14:30,190 it's an older version and it is vulnerable to it if they put registration. 127 00:14:30,360 --> 00:14:35,810 So we have downloaded the exploit so executable and then we have run in the system. 128 00:14:36,210 --> 00:14:46,740 So if there is another box that you like, Windows eight are in and there is a C personal and then you 129 00:14:46,740 --> 00:14:48,720 can run the juicy potato there. 130 00:14:49,500 --> 00:14:54,110 So in our case, that is, uh, that did not possible. 131 00:14:54,120 --> 00:14:58,360 So that's why we have gone for this cannot exploit. 132 00:14:59,730 --> 00:15:00,990 So, OK, that's all for this. 133 00:15:00,990 --> 00:15:03,450 We are supposed to take this double box.