Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,930 --> 00:00:08,650
We saw on the previous video how to use a public exploit to gain access to the system.
2
00:00:09,030 --> 00:00:16,110
And we took Windows as a proof of concept can we do the same for any other platform like Android which
3
00:00:16,110 --> 00:00:18,670
is the main scope of our course.
4
00:00:19,470 --> 00:00:20,390
Let's see.
5
00:00:20,610 --> 00:00:27,090
So if we go to a Web site like this one you can use the same Even site same previous site which has
6
00:00:27,090 --> 00:00:28,750
security features that come.
7
00:00:29,160 --> 00:00:32,760
But I would suggest this one exploit.
8
00:00:34,660 --> 00:00:43,450
Desch haif NDB and if you go to this website site this is a library of all exploit and it keep getting
9
00:00:43,450 --> 00:00:53,290
updated and it can be used the same way we we use security tracker or it's even more actually organized
10
00:00:53,350 --> 00:00:55,220
and easier to search.
11
00:00:55,390 --> 00:01:02,980
And if you go there and click on search and search for Android vulnerability and exploit my point so
12
00:01:02,980 --> 00:01:10,380
far is to show you how complicated that was and then show you how you can use this ploy to simplify
13
00:01:10,380 --> 00:01:11,500
the process.
14
00:01:11,920 --> 00:01:19,750
So do not get upset because of the amount of effort you are using or we are doing what the finess exploit
15
00:01:19,750 --> 00:01:25,510
because next lecture you're going to see is that we still can do the same process but in a much easier
16
00:01:25,510 --> 00:01:26,030
way.
17
00:01:26,200 --> 00:01:28,640
So let's see let's search for Android
18
00:01:33,060 --> 00:01:37,560
to Android and you click here.
19
00:01:37,570 --> 00:01:46,570
I'm not a robot and search and let's see how many vulnerability we have in Android even Apple iOS.
20
00:01:46,570 --> 00:01:48,610
You'll find someone inabilities here.
21
00:01:49,020 --> 00:01:54,610
So as you can see this is all the exploits that can be used to hack Android.
22
00:01:55,200 --> 00:02:02,430
And I want to give an attention for a specific one which uses stage fright because this is one this
23
00:02:02,430 --> 00:02:09,640
is actually was a recent vulnerability very very effective stage fright.
24
00:02:09,720 --> 00:02:12,850
And on this one I'm sorry.
25
00:02:13,980 --> 00:02:18,360
And I'm going to show you a code for exploiting this one.
26
00:02:18,370 --> 00:02:20,940
What is it.
27
00:02:20,940 --> 00:02:24,410
And you can surf around and try different vulnerability.
28
00:02:24,600 --> 00:02:31,970
If you start getting the skills on how to use them what Sobran ability.
29
00:02:32,140 --> 00:02:38,970
Let's see.
30
00:02:38,980 --> 00:02:43,060
So this is when I was telling you about this and you are on stage right.
31
00:02:43,060 --> 00:02:52,520
Actually this is one and more than one that allows you to execute some code see what is going on.
32
00:02:52,540 --> 00:03:00,850
This is one code execution and if you check this exploit you'll see that you need to download this code
33
00:03:00,910 --> 00:03:03,090
and then you need to do some change inside.
34
00:03:03,310 --> 00:03:07,360
And then you need to test it and it was this so complicated process.
35
00:03:07,360 --> 00:03:11,140
I mean I will add the video on how to do that manually.
36
00:03:11,440 --> 00:03:17,350
And you can see you have to keep changing in zip code and then try it it will not work it again while
37
00:03:17,860 --> 00:03:24,380
on meter's plate which is Zimet the framework that we can explain starting from from the next lecture.
38
00:03:24,610 --> 00:03:28,850
I'm going to show you how to use such exploit in a very easy way.
39
00:03:28,900 --> 00:03:34,650
You just type the name of the exploit put some inputs the IP of the victim support and that's it.
40
00:03:34,960 --> 00:03:45,460
And during the hacking Android section I'm going to choose this specific exploit how we can use it for
41
00:03:45,500 --> 00:03:47,490
a real Android device.
42
00:03:47,500 --> 00:03:55,960
So my point here is to show you the previous way or the old way of utilizing the vulnerability and exploit
43
00:03:55,960 --> 00:04:04,840
which is considered some kind of advanced hacking and then I need to show you how we can automate it
44
00:04:04,960 --> 00:04:11,530
instead of doing that in a like a simplified way in a very hard way.
45
00:04:11,530 --> 00:04:15,580
I'm sorry we can use the ploy to simplify it.
46
00:04:15,790 --> 00:04:24,960
So let's see how to use the meta sprite for compromising a system using exploit.
4831
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.