Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:12,370 --> 00:00:15,350
Hey, guys, welcome back to another episode on How to Hack.
2
00:00:15,760 --> 00:00:18,310
So over here I have Devar application running.
3
00:00:18,460 --> 00:00:21,370
And of course, this is an insecure mobile application.
4
00:00:21,650 --> 00:00:27,310
And we're going to look at the item number eight, which is on input validation issues.
5
00:00:27,310 --> 00:00:30,690
So this is part of a mobile application penetration testing series.
6
00:00:31,360 --> 00:00:35,260
And of course, we also have a number of mobile applications that will be testing on.
7
00:00:35,290 --> 00:00:40,390
So in this case, of course, we can go ahead and click on input validation issues, part two.
8
00:00:41,260 --> 00:00:41,560
All right.
9
00:00:41,570 --> 00:00:46,270
So once you click on it, so I'm going to open up the magnifier so that it is easier for you to see.
10
00:00:49,090 --> 00:00:51,340
So we can look from the magnifier.
11
00:00:51,400 --> 00:00:58,960
OK, so the objective is try to access any sensitive information apart from a web, you or else so improper
12
00:00:58,960 --> 00:01:04,330
or no input validation issue arise when input is not filtered or validated before using it.
13
00:01:04,340 --> 00:01:10,660
So likewise, whether you're building a Web application or a mobile application or any to client a software,
14
00:01:11,110 --> 00:01:16,540
you want to validate what the user is going to input into your system.
15
00:01:16,960 --> 00:01:17,290
All right.
16
00:01:17,290 --> 00:01:22,380
So over here, we can see that there is an input form and there is a button for us to click view on.
17
00:01:22,390 --> 00:01:29,080
So in our case, that's go ahead and enter, for example, a website so I can enter, for example,
18
00:01:29,080 --> 00:01:31,590
Loy Yang, young dot com.
19
00:01:31,720 --> 00:01:38,500
So I go ahead and click on View and immediately that would begin loading the rest of the site so we
20
00:01:38,500 --> 00:01:39,550
can create Web site.
21
00:01:39,720 --> 00:01:39,940
All right.
22
00:01:39,940 --> 00:01:44,140
So do check out this website loyalism getting dot com to learn all about cyber security.
23
00:01:44,710 --> 00:01:48,330
OK, so we got a number of videos and so on.
24
00:01:48,340 --> 00:01:52,020
So right now we are doing a lot of focus on mobile application penetration testing.
25
00:01:52,030 --> 00:01:55,060
So in the future we could be learning a lot about a stuff.
26
00:01:55,090 --> 00:02:02,140
OK, could be on iPhone, could be on laptop Windows, 10 computers, Macintosh OS and many, many artists.
27
00:02:02,920 --> 00:02:09,910
So very quickly we can see that this is how it works so we can validate whether we are able to access
28
00:02:09,910 --> 00:02:15,220
other files inside the phone by changing the input.
29
00:02:15,250 --> 00:02:17,260
So again, we are setting different kind of payloads.
30
00:02:17,590 --> 00:02:22,270
So again, on a previous video, we'll look at sequel injection and in this case we can look at the
31
00:02:22,270 --> 00:02:24,290
ability to access other files.
32
00:02:24,610 --> 00:02:30,040
So one of those is issues with mobile application is that they have so much permissions into a mobile
33
00:02:30,040 --> 00:02:37,420
devices like the storage across the entire device that is on SD card or that it is on internal system
34
00:02:37,430 --> 00:02:37,970
storage.
35
00:02:38,680 --> 00:02:41,350
Many of these mobile application have full access into it.
36
00:02:41,500 --> 00:02:47,350
So a vulnerability in the input form will allow the hackers to be able to gain access to these different
37
00:02:47,350 --> 00:02:47,890
puff's.
38
00:02:48,670 --> 00:02:52,990
So moving forward, what we can do is, of course, I can open up command from.
39
00:02:54,790 --> 00:02:59,740
OK, so we got a command problem running over here, so I'm going to put it on to the right site and
40
00:02:59,740 --> 00:03:02,800
of course, we have the mobile device on the left site.
41
00:03:03,170 --> 00:03:09,850
OK, so I can go ahead and try to go into EDB Shell or my Android debark so that we can understand more
42
00:03:10,150 --> 00:03:16,990
about the system structure and what kind of force are accessible because of this particular vulnerability.
43
00:03:17,200 --> 00:03:17,470
All right.
44
00:03:17,470 --> 00:03:23,800
So I could go ahead and enter Adibi Shell and this would bring us to this shell of the mobile device.
45
00:03:23,850 --> 00:03:27,510
OK, so we do have a tutorial and on Droit Duboc Bridge.
46
00:03:27,520 --> 00:03:29,220
So do check that tutorial out.
47
00:03:30,220 --> 00:03:34,360
So moving forward, what we can do is we can come into data DADAR.
48
00:03:35,110 --> 00:03:40,420
So this is the part where all the mobile applications are storing their information on OK, so we can
49
00:03:40,420 --> 00:03:49,070
KDDI into Jaka, assume Devar, OK, so we can enter El's for example and we can see into shet preferences.
50
00:03:49,450 --> 00:03:49,860
All right.
51
00:03:50,230 --> 00:03:55,090
And again, we can see all these different files available for users to access into.
52
00:03:55,480 --> 00:04:00,730
And if I do a CD or DOT, I can enter Shell so we can see all these different files.
53
00:04:00,730 --> 00:04:02,930
So we have like a follow over here.
54
00:04:02,990 --> 00:04:09,310
So you infl around so and so forth and we have the app textures and all these different directories
55
00:04:09,310 --> 00:04:09,700
as well.
56
00:04:09,940 --> 00:04:15,430
OK, so what we can do is we can change for example, so we can try to move one of the files like you
57
00:04:15,430 --> 00:04:23,110
infl into a smaller way for us to type it out inside vulnerable input so we can change this.
58
00:04:23,110 --> 00:04:30,040
Let's say for example, five six zero that's changed this to you in full unfold test one.
59
00:04:30,570 --> 00:04:34,120
So it's easier for us to access and enter inside a system so we can enter.
60
00:04:35,980 --> 00:04:38,080
So we got a file here you infl test one.
61
00:04:38,560 --> 00:04:41,680
So what we can do is going back into the mobile application.
62
00:04:43,030 --> 00:04:46,420
All I got to do is change a little bit of the command so I can get a fall.
63
00:04:47,200 --> 00:04:47,530
All right.
64
00:04:47,530 --> 00:04:54,070
So we're trying to access into the system, OK, so we have to fall and we can specify specifically
65
00:04:54,070 --> 00:04:55,450
where is the absolute path.
66
00:04:55,480 --> 00:05:01,750
So the POV name into default that we are trying to access into so I can enter fall and I can enter,
67
00:05:01,750 --> 00:05:05,550
for example, data slash data.
68
00:05:05,890 --> 00:05:07,960
So and of course, by Jacare.
69
00:05:11,740 --> 00:05:21,580
Jack Ha, Aseem Devar, you in full one, let's see if that works, will we be able to get the details
70
00:05:21,580 --> 00:05:22,960
of that particular fall?
71
00:05:23,200 --> 00:05:24,760
OK, so go ahead and click on View.
72
00:05:27,850 --> 00:05:33,760
And immediately we can see the content in insanities fall around, we'll be able to see a lot of those
73
00:05:33,760 --> 00:05:38,830
content across the entire mobile application on a mobile device inside of storage.
74
00:05:39,310 --> 00:05:43,280
And what if we try to access and to say, for example, the SD card?
75
00:05:43,390 --> 00:05:45,020
So that is an external storage.
76
00:05:45,040 --> 00:05:49,240
So, for example, if I CD into SD card, I can enter URLs.
77
00:05:50,110 --> 00:05:55,120
And of course, over here at SD card, we do have quite a number of different files and I can enter
78
00:05:55,120 --> 00:05:55,430
a list.
79
00:05:56,860 --> 00:05:59,350
So this would also show hidden false.
80
00:05:59,390 --> 00:06:01,600
OK, so we got a dot unfold.
81
00:06:02,170 --> 00:06:03,690
So this is heat info.
82
00:06:03,940 --> 00:06:08,590
Are we also able to access heat and false because of this vulnerability?
83
00:06:09,190 --> 00:06:09,460
All right.
84
00:06:09,460 --> 00:06:11,440
So let's go ahead and try that out and see what we see.
85
00:06:11,510 --> 00:06:13,930
OK, let's see what we'll get.
86
00:06:13,960 --> 00:06:16,240
So if I go into SD card.
87
00:06:18,210 --> 00:06:26,880
Followed by slash dot, you in full dot text, click on View, and once again we're able to see the
88
00:06:26,880 --> 00:06:27,150
fall.
89
00:06:27,160 --> 00:06:36,090
So if I do a cat you infl not hit enter and it likewise we're getting the same information.
90
00:06:36,540 --> 00:06:40,290
OK, so very quickly we are able to view all these different data.
91
00:06:40,440 --> 00:06:45,840
We are able to view all this different sensitive critical information inside the mobile device.
92
00:06:46,080 --> 00:06:52,080
And of course this vulnerability means that hackers would be able to view into all this critical data.
93
00:06:52,080 --> 00:06:58,770
Critical information and input validation has an issue and which means that whether it is a client or
94
00:06:58,770 --> 00:07:03,840
the architecture, a client server architecture we have to secure, we have to sanitize a different
95
00:07:03,840 --> 00:07:09,030
kind of inputs coming in are coming in from the user into the mobile application.
96
00:07:09,420 --> 00:07:14,160
OK, so again, I hope you have learned something valuable in today's tutorial, sort of like share
97
00:07:14,160 --> 00:07:18,000
and subscribe to the channel so that you can be kept abreast of the latest cyber security story.
98
00:07:18,330 --> 00:07:19,710
Thank you so much once again for watching.
10518
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.