Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,830 --> 00:00:01,490
Welcome back.
2
00:00:02,180 --> 00:00:10,190
Now we're going to discuss a tool called What What this tool is used to gather information and to scan
3
00:00:10,460 --> 00:00:12,200
any website on the Internet.
4
00:00:12,200 --> 00:00:18,080
So it is primarily used to scan websites, since this tool recognizes web technologies, including Web
5
00:00:18,080 --> 00:00:24,560
servers and better devices, JavaScript libraries and many more things, they explain it really well
6
00:00:24,800 --> 00:00:27,050
on the website page for this tool.
7
00:00:28,040 --> 00:00:32,300
So we can read right here about all of the details that this tool has.
8
00:00:33,060 --> 00:00:36,440
We cannot, as they have over seventeen hundred plug ins.
9
00:00:37,280 --> 00:00:40,670
Each one of them used to recognize something different.
10
00:00:41,420 --> 00:00:47,450
So they use these plug ins to perform the scan on the website and discover what technologies does that
11
00:00:47,450 --> 00:00:48,200
website run.
12
00:00:49,170 --> 00:00:55,890
What is important for us is the second paragraph since down here, it tells us that the level of aggression
13
00:00:55,890 --> 00:01:00,360
called stealthy is the fastest and requires only one HTP request of a website.
14
00:01:00,900 --> 00:01:07,710
Now, what this simply means is that this WHATFOR tool has different levels for scanning and the default
15
00:01:07,710 --> 00:01:15,200
level is the level of aggression that is called stealthy, which we can use on any website that we want.
16
00:01:16,020 --> 00:01:22,520
The other levels of scanning are more aggressive and should only be performed during penetration tests.
17
00:01:23,190 --> 00:01:28,900
So we should not use the more aggressive scans on the websites that we do not have permission to scan.
18
00:01:29,520 --> 00:01:34,220
We can, however, use the stealth can on any website that we want on the Internet.
19
00:01:35,210 --> 00:01:39,830
Then don't worry, we are going to see all of these options in just a second for now.
20
00:01:40,010 --> 00:01:42,370
It's good that we know what we can or cannot do.
21
00:01:42,770 --> 00:01:45,290
So let's test this tool out in our clinics.
22
00:01:46,700 --> 00:01:53,000
To do it, open up your terminal and to check out all of the options we can do with WhatsApp, you can
23
00:01:53,000 --> 00:01:56,750
simply just type what while in your terminal and press enter.
24
00:01:57,990 --> 00:02:04,140
This will give you a smaller health menu with some of the basic features that Fastweb has, as we can
25
00:02:04,140 --> 00:02:04,480
see.
26
00:02:04,500 --> 00:02:09,720
We can specify targets which can be anything from Earles Hostname or IP addresses.
27
00:02:10,510 --> 00:02:13,910
Here is that aggression level, which we specify like this.
28
00:02:14,610 --> 00:02:21,030
There is the aggression level one, which is stealthy and the aggression level three, which is aggressive.
29
00:02:22,340 --> 00:02:28,070
The default level is level one, which is good to notice, so we don't want to change this if we can
30
00:02:28,070 --> 00:02:33,440
a random website on the Internet, we can also list all of the plugins that it uses.
31
00:02:33,590 --> 00:02:39,290
But we are not currently interested in this and we can have also other both output.
32
00:02:40,650 --> 00:02:47,220
But these are just some of the options for the world to get even more available options with what web
33
00:02:47,460 --> 00:02:53,130
we can type the command, what web, dash, dash, help press, enter.
34
00:02:53,520 --> 00:02:59,670
And this will give us a much larger help manual with all of the possible options that we can use for
35
00:02:59,670 --> 00:03:00,150
what web.
36
00:03:00,840 --> 00:03:01,700
And down here.
37
00:03:01,800 --> 00:03:03,060
Here is the aggression level.
38
00:03:03,390 --> 00:03:08,970
We can see besides the stealthy, if we are going to use on random websites and besides the aggressive
39
00:03:08,970 --> 00:03:14,120
scan that you would use in a penetration test, there is even more aggressive scan called heavy.
40
00:03:14,490 --> 00:03:20,580
And it says right here makes a lot of HTP request, but target URLs from all plug ins are attempted.
41
00:03:21,530 --> 00:03:28,140
So this is basically the deepest scan that what Web tool can perform on a website up here are also the
42
00:03:28,140 --> 00:03:28,680
targets.
43
00:03:28,680 --> 00:03:30,360
So we specify a target first.
44
00:03:30,600 --> 00:03:32,340
And if I go all the way down.
45
00:03:34,300 --> 00:03:38,860
You will notice right here we got some of the examples of usage of what whip?
46
00:03:40,080 --> 00:03:45,870
So we can see right here that the most simple example is running water and then the domain name.
47
00:03:46,990 --> 00:03:52,030
So for the first run, let us go with this one, we're only going to specify website as an option,
48
00:03:52,240 --> 00:03:53,920
so just type down here what web?
49
00:03:54,670 --> 00:03:58,830
And since we are using the aggression level one, we can scan any Web site that we want.
50
00:03:58,840 --> 00:04:00,430
So I'm going to go with this one.
51
00:04:01,210 --> 00:04:04,350
And this is just another university Web site from my country.
52
00:04:04,750 --> 00:04:09,250
Feel free to scan any Web site that you want, or you can also go with this one if you would like.
53
00:04:10,660 --> 00:04:17,380
If I press here, enter in just a few seconds, we should get response for this website.
54
00:04:18,800 --> 00:04:25,520
And here it is, we already got something, we got two responses is we can see by the links right here
55
00:04:26,000 --> 00:04:27,710
the command has finished executing.
56
00:04:27,710 --> 00:04:31,070
So let us just go through these results and see what we got.
57
00:04:31,970 --> 00:04:37,100
It tells us that it most likely performed the redirect as soon as we tried getting this link.
58
00:04:37,970 --> 00:04:41,620
We can also see that we got the Apache Web server.
59
00:04:41,930 --> 00:04:44,950
We even get the version, which is two point four point six.
60
00:04:45,920 --> 00:04:48,920
We got some cookies right here, which the website uses.
61
00:04:49,550 --> 00:04:54,200
We got from which country it is, which type of HTP server it uses.
62
00:04:54,900 --> 00:04:57,910
If I go down here, here is the IP address of this website.
63
00:04:58,190 --> 00:05:00,290
Here's the version that they use.
64
00:05:00,650 --> 00:05:02,240
And this redirects location.
65
00:05:02,240 --> 00:05:06,050
If you remember, I told you that it most likely redirected us to a different page.
66
00:05:06,500 --> 00:05:08,660
Here is to where it redirected us.
67
00:05:08,870 --> 00:05:12,500
And once we got redirected, we got the response of two hundred.
68
00:05:12,500 --> 00:05:18,230
OK, and this is just a response code which tells us that we successfully loaded a page.
69
00:05:19,580 --> 00:05:26,150
We got the same Apache version, the bootstrap version, which is it uses down here, we got the country
70
00:05:26,480 --> 00:05:29,810
and we also managed to extract some of the emails.
71
00:05:29,930 --> 00:05:37,010
As we can see down here, these are some of the emails from the page that belong to this domain down
72
00:05:37,010 --> 00:05:37,270
here.
73
00:05:37,280 --> 00:05:44,000
We also see that it uses HTML five, which HTP server it has, which Apache version it has, once again,
74
00:05:44,000 --> 00:05:46,760
which version the IP address.
75
00:05:47,320 --> 00:05:53,180
It also uses a very light box and a bunch of other things we can see right here.
76
00:05:53,600 --> 00:05:56,810
But I don't really like how this is outputted.
77
00:05:56,990 --> 00:06:00,500
It is hard to read to output this a little bit prettier.
78
00:06:00,660 --> 00:06:05,140
We can use this verbose option that I saw in the help menu.
79
00:06:05,360 --> 00:06:06,020
Here it is.
80
00:06:07,400 --> 00:06:12,070
And what this for option does is it also includes plug in descriptions.
81
00:06:12,550 --> 00:06:18,230
It will also tell us for each plugin that the what web tool managed to discover.
82
00:06:18,830 --> 00:06:21,320
It will tell us what exactly that plugin is.
83
00:06:21,740 --> 00:06:22,670
So let's try that.
84
00:06:23,000 --> 00:06:31,250
If I typed Waldwick and then the same website, but I add dash the option at the end and press enter.
85
00:06:33,660 --> 00:06:39,810
It will pretty much give us the same result, just it will be outputted a whole lot better and easier
86
00:06:39,810 --> 00:06:43,410
to read if I scroll all the way up to the beginning of the comment.
87
00:06:45,100 --> 00:06:46,830
Remember, we got two responses.
88
00:06:47,460 --> 00:06:53,520
Here is the IP address, and this is the first request or first response which tells us to move to the
89
00:06:53,520 --> 00:06:54,230
actual website.
90
00:06:54,240 --> 00:06:55,920
So the redirect response.
91
00:06:57,090 --> 00:07:02,520
We get all of this information that we got previously, but we also get this section right here which
92
00:07:02,520 --> 00:07:03,960
says detected plugins.
93
00:07:04,560 --> 00:07:10,350
And for example, if we didn't know about the patch was we could read right here what Apache is.
94
00:07:11,160 --> 00:07:15,960
And down here we get the version that this website has of the Apache.
95
00:07:17,040 --> 00:07:18,310
We also get for cookies.
96
00:07:18,600 --> 00:07:26,390
Same thing for HTP server, we can see which operating system, which celebrities, which virginities.
97
00:07:26,750 --> 00:07:28,800
It tells us right here what B is.
98
00:07:28,800 --> 00:07:35,580
For example, if we didn't know PCP's a widely used general-purpose scripting language, redirect location.
99
00:07:35,850 --> 00:07:39,570
So after this request, it redirects us to this location.
100
00:07:40,640 --> 00:07:45,260
And down here, we get the response, two hundred for the actual page.
101
00:07:46,340 --> 00:07:52,670
We get once again the country, the IP address and all of the detected plug ins, and we can read through
102
00:07:52,670 --> 00:07:55,910
this and discover what is this website running?
103
00:07:56,840 --> 00:08:01,580
And it is outputted a whole lot better and easier to read than the previous comment.
104
00:08:02,580 --> 00:08:03,220
OK, good.
105
00:08:03,240 --> 00:08:09,360
So we managed to get the information as to what a certain Web site is running, which technologies it
106
00:08:09,360 --> 00:08:15,600
has, and in the next video, we're going to deeply go into this tool and try to perform some of the
107
00:08:15,600 --> 00:08:20,850
more aggressive scans, as well as experiment with some of the different options of what web as well.
11315
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.