All language subtitles for 6. Discovering Sensitive Files

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:02,940 --> 00:00:09,300 So far we've learned how to find and use subdomains that exist within our target website and that have 2 00:00:09,300 --> 00:00:11,910 not been listed in today's lecture. 3 00:00:11,910 --> 00:00:18,060 We're going to see how we can find files and directories that are stored on our target computer or our 4 00:00:18,060 --> 00:00:19,310 target website. 5 00:00:19,320 --> 00:00:25,710 Again these could be useful because these files could contain passwords they could contain config information 6 00:00:26,010 --> 00:00:34,490 or they could contain information about the actual server which will help us further exploit our target. 7 00:00:34,490 --> 00:00:40,490 Let me just first show you what I mean by files and directories just to show you the structure of directories 8 00:00:40,520 --> 00:00:41,410 on a web server. 9 00:00:41,540 --> 00:00:43,850 So here I have my little machine. 10 00:00:44,060 --> 00:00:53,950 And as we know usually the web server stuff is stored in var W W W and if I do an ls you'll see or undo 11 00:00:54,070 --> 00:00:57,030 give us a just so that it's nicer. 12 00:00:58,350 --> 00:01:04,690 You'll see that we have a number of files and directories and we can see that we have a directory they're 13 00:01:04,790 --> 00:01:07,040 called Matilda. 14 00:01:07,260 --> 00:01:12,970 Matilda is a Web is a web application that is designed to be hacked just like to exploit a world. 15 00:01:13,080 --> 00:01:20,070 It is designed so that it has a number of exploits so that we can learn how to hack based on it so we 16 00:01:20,070 --> 00:01:23,500 can see that that's installed in a directory called Mithal day. 17 00:01:23,790 --> 00:01:29,510 Now if I go here to my IP address now this is the IP address of the floatable machine. 18 00:01:29,550 --> 00:01:36,470 So if I do any of configure you'll see that it's 10 20 3:46. 19 00:01:36,520 --> 00:01:42,830 So I mean they're And you can see that they have an easy access for me for the day. 20 00:01:43,100 --> 00:01:48,490 If I click it look at the URL here so it's forward slash Mythili day. 21 00:01:48,590 --> 00:01:51,520 That means I'm inside the middle of directory. 22 00:01:51,620 --> 00:01:56,760 So every time you see a forward slash that usually means you're inside a directory. 23 00:01:56,780 --> 00:02:05,780 So let's go back here and do an ls and if I do see the Matilda am I'm going to do of this and you'll 24 00:02:05,780 --> 00:02:10,310 see that I have a large number of files a large number of files here. 25 00:02:10,430 --> 00:02:17,160 So let's say for example I wanted to open one of these files and we have indexed that ph with if I do 26 00:02:17,160 --> 00:02:24,370 end up with then this is our current file it's called index APHC. 27 00:02:24,370 --> 00:02:30,610 So what we learn from this is Metulla there is just a directory inside my Webroot. 28 00:02:30,750 --> 00:02:38,240 So at the moment in the midst locatable device arm in that we just write it here for you some inviter 29 00:02:38,660 --> 00:02:42,220 w w Matile a day 30 00:02:45,610 --> 00:02:52,530 and then the file that I'm accessing is index BHB. 31 00:02:52,700 --> 00:02:54,910 OK so I hope this is clear now. 32 00:02:54,980 --> 00:03:03,110 So on in this directory and this directory and access in a file called index page. 33 00:03:03,500 --> 00:03:08,850 So if I just do a PWT here you'll see that I'm in var w w w until today. 34 00:03:10,430 --> 00:03:14,720 The IP address kind of hides where you are the readably that you wrote is. 35 00:03:14,750 --> 00:03:21,890 So it hides the Vardaman WW and then everything after that will be displayed here after the IP address. 36 00:03:21,920 --> 00:03:27,590 So we're looking to find today is all the directories on the files that we cannot see. 37 00:03:27,590 --> 00:03:32,650 So through out these links we will be able to access different types in different pages. 38 00:03:32,660 --> 00:03:38,000 This is the same with any other web site but there is always files and directories hidden that you just 39 00:03:38,000 --> 00:03:39,540 never see. 40 00:03:39,560 --> 00:03:45,030 So we'll see how we can get you or else for these files and access them and read the information in 41 00:03:45,040 --> 00:03:45,480 it. 42 00:03:46,800 --> 00:03:51,570 Do that we're going to use a tool called there and to see how to use that. 43 00:03:51,600 --> 00:03:57,580 We're going to do man there to see all the options associated with that too. 44 00:03:58,320 --> 00:04:02,870 So you can see that to use the tool you just type in Derb. 45 00:04:03,050 --> 00:04:06,520 You are out of your target and then you put a wordlist. 46 00:04:06,690 --> 00:04:10,260 So the way this works is it works based on a brute force attack. 47 00:04:10,440 --> 00:04:16,610 And it just uses a word list of names and it sends requests with these names. 48 00:04:16,620 --> 00:04:22,650 And anytime we actually find something it tells us that oh I find I found a file with this name so it 49 00:04:22,650 --> 00:04:29,900 will only be able to find names and directories based on the wordlist that you provide. 50 00:04:29,910 --> 00:04:38,680 Now you can create a wordlist using crunch or you can use word lists that come in within their the options 51 00:04:38,680 --> 00:04:41,950 here allow you to configure how the tool is going to work. 52 00:04:42,190 --> 00:04:45,430 So you can change things around the way you it. 53 00:04:45,430 --> 00:04:51,220 For example you can disable the recursive ness of the tool so it just runs on one directory instead 54 00:04:51,220 --> 00:04:53,120 of trying a number of directories. 55 00:04:54,270 --> 00:04:58,870 You can get it to ask you if if you want to access a directory or not. 56 00:04:58,990 --> 00:05:04,290 Instead of automatically accessing directories and trying to find files within these directories because 57 00:05:04,290 --> 00:05:09,780 this could be exhaustive if your target is a big Web site there might be a lot of directories and then 58 00:05:09,780 --> 00:05:14,880 the two will be trying to access all of them and find files with all of them so they can see how big 59 00:05:14,880 --> 00:05:16,020 the tree could go. 60 00:05:18,600 --> 00:05:24,560 You can also set it to use a username and password if the target web sites uses some sort of authentication 61 00:05:26,300 --> 00:05:35,570 and you can use it for verbal output and you can also use OE to output the results to a file. 62 00:05:35,580 --> 00:05:37,970 So let me show you a very simple example of it. 63 00:05:37,980 --> 00:05:53,020 I'm just going to wander on our target which is 10 20 14 to 0 4 and thus should be Hastey because remember 64 00:05:53,020 --> 00:05:55,860 we're targeting a Web site not an IP address. 65 00:05:58,210 --> 00:06:04,580 Then I'm going to put the directory that I want to be that I want to find files and directories within. 66 00:06:04,850 --> 00:06:10,580 I don't want to be accessing anything with any other because you can see here there is a number of scripts 67 00:06:10,580 --> 00:06:17,790 installed on this web server so we have this script and we also have page p.m.-I admin and we have the 68 00:06:17,820 --> 00:06:18,680 weiqi. 69 00:06:18,890 --> 00:06:24,170 So we don't want it to be accessed and all of them we only wanted to be working on Matile a day. 70 00:06:24,170 --> 00:06:25,190 On this example. 71 00:06:25,190 --> 00:06:27,010 So that's why I want to use this year. 72 00:06:27,040 --> 00:06:32,840 And then it's going to start finding your allies and files within this current particular web application. 73 00:06:33,750 --> 00:06:37,080 So I'm going to enter and we're going to work. 74 00:06:37,080 --> 00:06:44,280 So this is going to use a wordless file and it's used in a default small wordless file that is stored 75 00:06:44,280 --> 00:06:47,060 in here so it's in use or share their word lists. 76 00:06:47,180 --> 00:06:48,350 Come on. 77 00:06:48,660 --> 00:06:53,620 You can have a look at this directory and see if there is any other one this that you'd like to use. 78 00:06:53,730 --> 00:06:59,490 And you can use them only by placing the full path to the word list after the command. 79 00:06:59,730 --> 00:07:04,980 So instead of the way I wrote the command you'd write it like this and then you'd state where your running 80 00:07:04,980 --> 00:07:05,370 list is. 81 00:07:05,370 --> 00:07:09,750 For example let's see if it's in route you stated as rude at least 82 00:07:13,940 --> 00:07:15,300 GST or whatever. 83 00:07:15,740 --> 00:07:21,770 But at the moment it's use of the default one which is stored in this directory in users shared their 84 00:07:21,830 --> 00:07:25,420 wordlist and it's used in the one that's called com and the GST. 9222

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.