All language subtitles for 0010 Mobile App File Access.en--- [ FreeCourseWeb.com ] ---

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French Download
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:12,370 --> 00:00:15,350 Hey, guys, welcome back to another episode on How to Hack. 2 00:00:15,760 --> 00:00:18,310 So over here I have Devar application running. 3 00:00:18,460 --> 00:00:21,370 And of course, this is an insecure mobile application. 4 00:00:21,650 --> 00:00:27,310 And we're going to look at the item number eight, which is on input validation issues. 5 00:00:27,310 --> 00:00:30,690 So this is part of a mobile application penetration testing series. 6 00:00:31,360 --> 00:00:35,260 And of course, we also have a number of mobile applications that will be testing on. 7 00:00:35,290 --> 00:00:40,390 So in this case, of course, we can go ahead and click on input validation issues, part two. 8 00:00:41,260 --> 00:00:41,560 All right. 9 00:00:41,570 --> 00:00:46,270 So once you click on it, so I'm going to open up the magnifier so that it is easier for you to see. 10 00:00:49,090 --> 00:00:51,340 So we can look from the magnifier. 11 00:00:51,400 --> 00:00:58,960 OK, so the objective is try to access any sensitive information apart from a web, you or else so improper 12 00:00:58,960 --> 00:01:04,330 or no input validation issue arise when input is not filtered or validated before using it. 13 00:01:04,340 --> 00:01:10,660 So likewise, whether you're building a Web application or a mobile application or any to client a software, 14 00:01:11,110 --> 00:01:16,540 you want to validate what the user is going to input into your system. 15 00:01:16,960 --> 00:01:17,290 All right. 16 00:01:17,290 --> 00:01:22,380 So over here, we can see that there is an input form and there is a button for us to click view on. 17 00:01:22,390 --> 00:01:29,080 So in our case, that's go ahead and enter, for example, a website so I can enter, for example, 18 00:01:29,080 --> 00:01:31,590 Loy Yang, young dot com. 19 00:01:31,720 --> 00:01:38,500 So I go ahead and click on View and immediately that would begin loading the rest of the site so we 20 00:01:38,500 --> 00:01:39,550 can create Web site. 21 00:01:39,720 --> 00:01:39,940 All right. 22 00:01:39,940 --> 00:01:44,140 So do check out this website loyalism getting dot com to learn all about cyber security. 23 00:01:44,710 --> 00:01:48,330 OK, so we got a number of videos and so on. 24 00:01:48,340 --> 00:01:52,020 So right now we are doing a lot of focus on mobile application penetration testing. 25 00:01:52,030 --> 00:01:55,060 So in the future we could be learning a lot about a stuff. 26 00:01:55,090 --> 00:02:02,140 OK, could be on iPhone, could be on laptop Windows, 10 computers, Macintosh OS and many, many artists. 27 00:02:02,920 --> 00:02:09,910 So very quickly we can see that this is how it works so we can validate whether we are able to access 28 00:02:09,910 --> 00:02:15,220 other files inside the phone by changing the input. 29 00:02:15,250 --> 00:02:17,260 So again, we are setting different kind of payloads. 30 00:02:17,590 --> 00:02:22,270 So again, on a previous video, we'll look at sequel injection and in this case we can look at the 31 00:02:22,270 --> 00:02:24,290 ability to access other files. 32 00:02:24,610 --> 00:02:30,040 So one of those is issues with mobile application is that they have so much permissions into a mobile 33 00:02:30,040 --> 00:02:37,420 devices like the storage across the entire device that is on SD card or that it is on internal system 34 00:02:37,430 --> 00:02:37,970 storage. 35 00:02:38,680 --> 00:02:41,350 Many of these mobile application have full access into it. 36 00:02:41,500 --> 00:02:47,350 So a vulnerability in the input form will allow the hackers to be able to gain access to these different 37 00:02:47,350 --> 00:02:47,890 puff's. 38 00:02:48,670 --> 00:02:52,990 So moving forward, what we can do is, of course, I can open up command from. 39 00:02:54,790 --> 00:02:59,740 OK, so we got a command problem running over here, so I'm going to put it on to the right site and 40 00:02:59,740 --> 00:03:02,800 of course, we have the mobile device on the left site. 41 00:03:03,170 --> 00:03:09,850 OK, so I can go ahead and try to go into EDB Shell or my Android debark so that we can understand more 42 00:03:10,150 --> 00:03:16,990 about the system structure and what kind of force are accessible because of this particular vulnerability. 43 00:03:17,200 --> 00:03:17,470 All right. 44 00:03:17,470 --> 00:03:23,800 So I could go ahead and enter Adibi Shell and this would bring us to this shell of the mobile device. 45 00:03:23,850 --> 00:03:27,510 OK, so we do have a tutorial and on Droit Duboc Bridge. 46 00:03:27,520 --> 00:03:29,220 So do check that tutorial out. 47 00:03:30,220 --> 00:03:34,360 So moving forward, what we can do is we can come into data DADAR. 48 00:03:35,110 --> 00:03:40,420 So this is the part where all the mobile applications are storing their information on OK, so we can 49 00:03:40,420 --> 00:03:49,070 KDDI into Jaka, assume Devar, OK, so we can enter El's for example and we can see into shet preferences. 50 00:03:49,450 --> 00:03:49,860 All right. 51 00:03:50,230 --> 00:03:55,090 And again, we can see all these different files available for users to access into. 52 00:03:55,480 --> 00:04:00,730 And if I do a CD or DOT, I can enter Shell so we can see all these different files. 53 00:04:00,730 --> 00:04:02,930 So we have like a follow over here. 54 00:04:02,990 --> 00:04:09,310 So you infl around so and so forth and we have the app textures and all these different directories 55 00:04:09,310 --> 00:04:09,700 as well. 56 00:04:09,940 --> 00:04:15,430 OK, so what we can do is we can change for example, so we can try to move one of the files like you 57 00:04:15,430 --> 00:04:23,110 infl into a smaller way for us to type it out inside vulnerable input so we can change this. 58 00:04:23,110 --> 00:04:30,040 Let's say for example, five six zero that's changed this to you in full unfold test one. 59 00:04:30,570 --> 00:04:34,120 So it's easier for us to access and enter inside a system so we can enter. 60 00:04:35,980 --> 00:04:38,080 So we got a file here you infl test one. 61 00:04:38,560 --> 00:04:41,680 So what we can do is going back into the mobile application. 62 00:04:43,030 --> 00:04:46,420 All I got to do is change a little bit of the command so I can get a fall. 63 00:04:47,200 --> 00:04:47,530 All right. 64 00:04:47,530 --> 00:04:54,070 So we're trying to access into the system, OK, so we have to fall and we can specify specifically 65 00:04:54,070 --> 00:04:55,450 where is the absolute path. 66 00:04:55,480 --> 00:05:01,750 So the POV name into default that we are trying to access into so I can enter fall and I can enter, 67 00:05:01,750 --> 00:05:05,550 for example, data slash data. 68 00:05:05,890 --> 00:05:07,960 So and of course, by Jacare. 69 00:05:11,740 --> 00:05:21,580 Jack Ha, Aseem Devar, you in full one, let's see if that works, will we be able to get the details 70 00:05:21,580 --> 00:05:22,960 of that particular fall? 71 00:05:23,200 --> 00:05:24,760 OK, so go ahead and click on View. 72 00:05:27,850 --> 00:05:33,760 And immediately we can see the content in insanities fall around, we'll be able to see a lot of those 73 00:05:33,760 --> 00:05:38,830 content across the entire mobile application on a mobile device inside of storage. 74 00:05:39,310 --> 00:05:43,280 And what if we try to access and to say, for example, the SD card? 75 00:05:43,390 --> 00:05:45,020 So that is an external storage. 76 00:05:45,040 --> 00:05:49,240 So, for example, if I CD into SD card, I can enter URLs. 77 00:05:50,110 --> 00:05:55,120 And of course, over here at SD card, we do have quite a number of different files and I can enter 78 00:05:55,120 --> 00:05:55,430 a list. 79 00:05:56,860 --> 00:05:59,350 So this would also show hidden false. 80 00:05:59,390 --> 00:06:01,600 OK, so we got a dot unfold. 81 00:06:02,170 --> 00:06:03,690 So this is heat info. 82 00:06:03,940 --> 00:06:08,590 Are we also able to access heat and false because of this vulnerability? 83 00:06:09,190 --> 00:06:09,460 All right. 84 00:06:09,460 --> 00:06:11,440 So let's go ahead and try that out and see what we see. 85 00:06:11,510 --> 00:06:13,930 OK, let's see what we'll get. 86 00:06:13,960 --> 00:06:16,240 So if I go into SD card. 87 00:06:18,210 --> 00:06:26,880 Followed by slash dot, you in full dot text, click on View, and once again we're able to see the 88 00:06:26,880 --> 00:06:27,150 fall. 89 00:06:27,160 --> 00:06:36,090 So if I do a cat you infl not hit enter and it likewise we're getting the same information. 90 00:06:36,540 --> 00:06:40,290 OK, so very quickly we are able to view all these different data. 91 00:06:40,440 --> 00:06:45,840 We are able to view all this different sensitive critical information inside the mobile device. 92 00:06:46,080 --> 00:06:52,080 And of course this vulnerability means that hackers would be able to view into all this critical data. 93 00:06:52,080 --> 00:06:58,770 Critical information and input validation has an issue and which means that whether it is a client or 94 00:06:58,770 --> 00:07:03,840 the architecture, a client server architecture we have to secure, we have to sanitize a different 95 00:07:03,840 --> 00:07:09,030 kind of inputs coming in are coming in from the user into the mobile application. 96 00:07:09,420 --> 00:07:14,160 OK, so again, I hope you have learned something valuable in today's tutorial, sort of like share 97 00:07:14,160 --> 00:07:18,000 and subscribe to the channel so that you can be kept abreast of the latest cyber security story. 98 00:07:18,330 --> 00:07:19,710 Thank you so much once again for watching. 10518

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.