1 00:00:00,780 --> 00:00:06,630 So in this building, have the works grainy and they produce this 10, 10, 10, 15, and they have 2 00:00:06,630 --> 00:00:09,630 already done that and much can on art and sports. 3 00:00:10,380 --> 00:00:11,470 Uh, Russians can. 4 00:00:12,600 --> 00:00:17,280 So I found that only one participant that is of observer only training. 5 00:00:17,280 --> 00:00:21,000 I so obviously should be Windows. 6 00:00:22,380 --> 00:00:23,970 And you can see there is watching No. 7 00:00:23,970 --> 00:00:26,580 Six point zero and. 8 00:00:28,890 --> 00:00:35,680 So this is a big under-construction that I had and the goal was to scan, to find any directress I have 9 00:00:35,680 --> 00:00:39,530 found is what it is, but there is no juicy information. 10 00:00:40,350 --> 00:00:45,420 And then here I held under normal scan before the scan on the property. 11 00:00:45,960 --> 00:00:54,330 Now it has revealed some juicy information and you can see them at it's, uh, potentially schema that 12 00:00:54,690 --> 00:00:56,400 all these methods are present. 13 00:00:56,950 --> 00:00:59,660 OK, but what methods are we allowed? 14 00:00:59,880 --> 00:01:09,060 So you can see here are public options, options, TRESCOTT And so you can read some scripts and you 15 00:01:09,060 --> 00:01:15,540 can put so you can put some, uh, the washer and you can get this washed copy and Kirkwall, you can 16 00:01:15,540 --> 00:01:19,890 also get the photos, etc. now conduct search and other methods. 17 00:01:19,890 --> 00:01:24,450 So all these methods are not so OK. 18 00:01:24,810 --> 00:01:30,040 Uh, we have a bunch of information so there is nothing much out here. 19 00:01:30,720 --> 00:01:38,340 Now what we're going to do is we are going to run this test so it will try to upload all the possible, 20 00:01:40,230 --> 00:01:41,900 uh, extensions. 21 00:01:42,150 --> 00:01:53,040 I create a random folder and beautiful with the extensions, BHP, Jimar, etc. So then it will test 22 00:01:53,050 --> 00:01:54,070 with extensions. 23 00:01:55,090 --> 00:01:58,160 Uh, this I server can execute. 24 00:01:58,350 --> 00:02:02,790 Of course I use the default will be hsp speaks. 25 00:02:04,230 --> 00:02:15,160 So we need to make the I guess observer and yes, we know what action since the is accepting. 26 00:02:15,630 --> 00:02:18,340 Now you can see I'm cakehole succeeded. 27 00:02:18,390 --> 00:02:22,050 It has created it randomly if you're going to this. 28 00:02:24,290 --> 00:02:35,850 My bed, so you can see all of these folks have been uprooted to succeed so powerful, which imagine 29 00:02:35,870 --> 00:02:37,130 speech predictive. 30 00:02:40,490 --> 00:02:44,480 You can see more failures, you can see even confusion. 31 00:02:44,480 --> 00:02:45,950 Mark-Up has been uprooted. 32 00:02:46,430 --> 00:02:51,890 So you can try if there is a sea of confusion surrounding. 33 00:02:55,110 --> 00:03:04,710 OK, these are uproots and these have been succeeded in taking for execution, so it is going to open 34 00:03:04,710 --> 00:03:05,280 this one. 35 00:03:08,360 --> 00:03:14,730 But failed or succeeded before and actually succeeded. 36 00:03:14,760 --> 00:03:26,360 So it means we can only add that extra funds and hedge funds, you can open the HDMI here and it is 37 00:03:26,370 --> 00:03:34,410 sitting there and you can open the phone here and you can see why. 38 00:03:34,640 --> 00:03:43,700 But do the show, that means, uh, we can put that is being set up because it has been so there is 39 00:03:43,700 --> 00:03:44,810 some filter for that. 40 00:03:46,250 --> 00:03:54,470 So what we're going to do is let's, uh, first upload a A three. 41 00:03:54,810 --> 00:03:57,110 Youngcare called. 42 00:03:58,580 --> 00:04:05,450 And later, the foreign inspection, so I'm going to create a technician me and head into. 43 00:04:12,710 --> 00:04:19,670 OK, ladies, you know, what I'm going to do is I'm going to 44 00:04:22,400 --> 00:04:23,900 let you know. 45 00:04:27,680 --> 00:04:34,130 Sandblaster, so let's this sound protection for. 46 00:04:36,460 --> 00:04:44,200 Now I'm going properly to the Xitian in the book and its GDP. 47 00:04:52,110 --> 00:05:03,370 I mean, the sample that they are that there are three and you need to specify the data that is sample 48 00:05:04,630 --> 00:05:11,120 that I need and so you can go to this, you already can see this is a sample text. 49 00:05:11,140 --> 00:05:14,160 But now let's go to our notes. 50 00:05:14,650 --> 00:05:17,410 Now you can see a lot of method and public options. 51 00:05:17,440 --> 00:05:18,660 We can see the moment. 52 00:05:19,070 --> 00:05:19,570 All right. 53 00:05:19,960 --> 00:05:27,850 So, Mo, you seem to remember now, what if I can rename this extra to SBX? 54 00:05:36,720 --> 00:05:39,810 I need to say the header and then nation. 55 00:05:48,110 --> 00:05:58,250 Positioning, slash testing, not a --, and then we need to specify the source for that is our 56 00:05:58,250 --> 00:05:58,930 sample that the. 57 00:06:04,810 --> 00:06:05,400 Separately. 58 00:06:07,420 --> 00:06:15,070 So what we're doing is undermining this first number attached to testing, not SBX and no, he don't. 59 00:06:17,080 --> 00:06:18,910 So now you voted for this. 60 00:06:18,910 --> 00:06:20,810 You can see testing, not SBX. 61 00:06:23,970 --> 00:06:27,780 OK, so that's what we want you to know. 62 00:06:27,810 --> 00:06:29,640 We can render this. 63 00:06:30,060 --> 00:06:44,790 So let's go and create the inspiration windows on any place you can say SBX and Namik crucial to that 64 00:06:44,820 --> 00:06:45,600 SBX. 65 00:06:45,960 --> 00:06:51,620 So they should be they should join Russia in the FSB Firmat. 66 00:06:56,340 --> 00:06:58,980 Now, let's again put the sample that the. 67 00:07:03,880 --> 00:07:15,570 Or we can say is we can wait for the appeal to successful so that they shall do so, you can see it 68 00:07:15,570 --> 00:07:16,240 has created. 69 00:07:17,010 --> 00:07:18,720 Now, what we're going to do is. 70 00:07:22,320 --> 00:07:22,850 Mm. 71 00:07:26,840 --> 00:07:27,710 Copy this. 72 00:07:29,390 --> 00:07:32,330 We need to place this as. 73 00:07:34,700 --> 00:07:42,130 File Sembler text, but the search should be Sharlto, that SBX, so we are just uploading the contents 74 00:07:42,130 --> 00:07:44,120 of this case into the text file. 75 00:07:44,510 --> 00:07:45,280 And didn't. 76 00:07:47,410 --> 00:07:56,120 Now let's go to sample the text so you can see there are some spaces here and that's why our rasher 77 00:07:56,680 --> 00:07:57,700 don't get execute. 78 00:07:58,360 --> 00:08:02,620 What we need to do is we need to synthesize it in the binary format. 79 00:08:07,540 --> 00:08:16,030 Now, refresh this, now you can see it has the syntax correct, but no additional spaces extra. 80 00:08:19,570 --> 00:08:25,590 Now, what we're going to do is we are going to move that sample HD to. 81 00:08:27,570 --> 00:08:31,610 Uh, let's shelled that a spox. 82 00:08:36,300 --> 00:08:45,200 Let's start there is another we had the senator speaks and open the shirt, knocking at the connection. 83 00:08:45,630 --> 00:08:46,560 That's who I am. 84 00:08:46,570 --> 00:08:48,330 I think this should be a service account. 85 00:08:48,720 --> 00:08:55,080 So the the network service around it that are in the Ovando. 86 00:08:56,460 --> 00:08:57,360 All right. 87 00:08:57,870 --> 00:09:02,530 Now, let's go to see the dump. 88 00:09:02,880 --> 00:09:14,360 I read for you the permissions, what our previous so see in person that privilege has been enabled. 89 00:09:14,900 --> 00:09:16,080 OK, that should be fine. 90 00:09:16,080 --> 00:09:19,950 You should in personal tokens, we can use the juicy potato. 91 00:09:22,910 --> 00:09:27,090 And it seems so in the summer 2008. 92 00:09:28,100 --> 00:09:36,500 So that means we can execute the Tarasco exploit, so you can Google for this are what you can you can 93 00:09:36,740 --> 00:09:42,630 copy all this system information and you can run the local less expensive stuff. 94 00:09:43,790 --> 00:09:52,600 So that should give you the exploits this bonks vulnerable to those winners. 95 00:09:53,180 --> 00:09:54,650 So this is the Tarasco. 96 00:09:54,650 --> 00:10:01,880 It will it is similar to the distributor to this just does not work on this word machines. 97 00:10:02,840 --> 00:10:03,930 It is not compatible. 98 00:10:04,400 --> 00:10:12,570 So for both of them, three of us actually testing on this Tarasco for 2008 and Windows seven, you 99 00:10:12,590 --> 00:10:13,840 can run this to maturity. 100 00:10:15,110 --> 00:10:18,020 So keep this in handy along with the. 101 00:10:24,790 --> 00:10:30,930 OK, I'm going to share this folder with the ambassador here for. 102 00:10:34,600 --> 00:10:38,120 Now, I don't know, I certainly can be. 103 00:10:39,100 --> 00:10:41,710 Let's go to temporality, we can try the. 104 00:10:52,040 --> 00:10:54,230 OK, that's B. 105 00:11:09,720 --> 00:11:16,710 The government should be correct, Tarasco, OK, that's fine, so let's copy it into the temporary. 106 00:11:22,000 --> 00:11:30,970 And by the way, we can also Transjordan it Carbonetti so you can grab these two copies from the Internet, 107 00:11:31,240 --> 00:11:32,110 you can search for the. 108 00:11:33,310 --> 00:11:36,420 So we have the trust that so you can use the trisko. 109 00:11:39,850 --> 00:11:45,580 So it will already impersonator Cogan's and the command will be run as a system. 110 00:11:49,360 --> 00:11:57,370 She does karate XY and we do spins further comment, we want to run to the board, one, two, three, 111 00:11:57,370 --> 00:11:57,880 six. 112 00:12:01,170 --> 00:12:06,510 And see that he cannot believe this IP. 113 00:12:09,730 --> 00:12:16,990 What number one, two, three, six, and then a good candidate and now can tell they should take the 114 00:12:16,990 --> 00:12:17,290 time. 115 00:12:17,500 --> 00:12:18,970 OK, we got this. 116 00:12:19,000 --> 00:12:22,180 That's where my SO and system. 117 00:12:24,960 --> 00:12:29,340 So you can see now we can go to the administrator. 118 00:12:40,070 --> 00:12:41,500 Oh, I'm sorry. 119 00:12:49,560 --> 00:12:59,310 Shipping documents and settings, because it's all in this box, so you need documents and settings. 120 00:13:07,090 --> 00:13:19,930 So now we can use the money, we can go into the territory and we can move the room flat so we can see 121 00:13:19,930 --> 00:13:22,340 here, this is similar to the grand permission. 122 00:13:23,710 --> 00:13:33,000 So what we have learned is we came to know that there are so many requests, so so, so many options. 123 00:13:33,520 --> 00:13:40,390 So we have created a normal text file and then changed to specs and then we operated the washer and 124 00:13:40,390 --> 00:13:41,020 godshall. 125 00:13:42,010 --> 00:13:43,780 So that's all about this video.