Okay, so now on our Windows machine, we will
catch that done. Dr.
I don't know what I'm saying. That
now, I could drag this to the desktop.
So as I said before, the trick is to get this file to the victim.
I'm just demonstrating the concept of getting connected.
So the victim thinks they're gonna look at the slide show, then go ahead
and run the program.
If we go back to Cali,
we see that we have a connection.
So the handler was listening for this connection.
It sent the stage over to the remote host.
And I got connected on the port that I expected to.
So once I'm connected,
there's a lot of things I can do. For instance, I can
look at a process list.
shows me a lot of information about my
on then. What? You're connected. Of course, you can do other things too, Like my great
your process somewhere else. So let's say the program
the payload that we just generated was part of an application. You bundled it in.
If the person quits the application than the
the connection may die, so we can do is migrate the connection
So it looks like it spawned a note pad down the exit process.
And now it's moved to, uh,
process I d 13 88 when it was previously 992
So it's pretty obviously what we have we just done there. We can also try to escalate our privileges
already been loaded, okay?
And there's all kinds of things we can get into. But
the concept here is to see how the connection worked. The trick is to get the
the infected filed two to the pen testing object.
All right, that's all for this section. See you in the next one. Thank you.