All language subtitles for 2. Nikto basics

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali Download
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,090 --> 00:00:01,740 Hello everybody and welcome back. 2 00:00:01,740 --> 00:00:07,950 And now in this lecture we will cover our second tool for the foot printing which is called Nickel now 3 00:00:08,010 --> 00:00:15,630 nickel can also be used for evil penetration testing which basically scans for the Web site and it prints 4 00:00:15,630 --> 00:00:22,410 out if there is only any possible vulnerability on the Web site or if there is any outdated version. 5 00:00:22,590 --> 00:00:27,460 For example the Apache too could be outdated and the though will show us that. 6 00:00:27,510 --> 00:00:35,850 Now this can be put into the active interaction since we are scanning the Web site and you should not 7 00:00:35,850 --> 00:00:37,650 be doing that on a Web site. 8 00:00:37,650 --> 00:00:39,030 You do not own. 9 00:00:39,030 --> 00:00:40,330 So I'll just. 10 00:00:40,330 --> 00:00:43,860 Can the Web site that they put out on my laptop. 11 00:00:43,860 --> 00:00:45,090 A lot of upside web server. 12 00:00:45,090 --> 00:00:50,060 It is a better web server and it doesn't really have anything on it but it's running currently. 13 00:00:50,080 --> 00:00:56,940 So we should be able to see the IP address and the version of the Apache and also maybe some of the 14 00:00:56,940 --> 00:01:03,920 errors it could possibly have so let me just enlarge this a little bit. 15 00:01:03,920 --> 00:01:08,080 Now in order to run though you basically just type your nickel. 16 00:01:08,420 --> 00:01:11,200 It will show you the usage of the command. 17 00:01:11,210 --> 00:01:17,150 Now these are some of the basic options that you can see right here if we want to we could bring the 18 00:01:17,240 --> 00:01:23,720 Senate version this help as it says right here yeah this will be the extended version of the need to 19 00:01:23,750 --> 00:01:24,740 help. 20 00:01:25,040 --> 00:01:29,870 And we can see there are a bunch of the options right here for this program. 21 00:01:29,900 --> 00:01:36,260 Now we won't be covering all of these since that will take a lot of time but we will cover some basically 22 00:01:36,260 --> 00:01:38,160 the most important one would be the. 23 00:01:38,310 --> 00:01:40,430 Let me just find it DeCosta. 24 00:01:40,490 --> 00:01:41,360 Here it is. 25 00:01:41,420 --> 00:01:42,670 Target host. 26 00:01:42,890 --> 00:01:46,880 So in order for you to scan website you need to provide a target host. 27 00:01:47,630 --> 00:01:53,870 Now that target host can be either a domain name or basically are IP address. 28 00:01:53,870 --> 00:02:00,620 Now in my case I will use my IP address since my laptop is on my local network and its IP addresses 29 00:02:00,680 --> 00:02:02,310 one night to that 168. 30 00:02:02,330 --> 00:02:05,240 That one that 15. 31 00:02:05,390 --> 00:02:11,150 Now if you have any available Web site or any other virtual machine you can test it on that one and 32 00:02:11,150 --> 00:02:18,140 you can check out if your local Web site is memorable or something or possibly could be vulnerable to 33 00:02:18,140 --> 00:02:19,570 something. 34 00:02:19,580 --> 00:02:21,680 Now let me just show you this tape here. 35 00:02:21,680 --> 00:02:22,190 Nicole 36 00:02:25,490 --> 00:02:33,020 and basically will specify first of H for the coast and then 192 that 160 that the 15th. 37 00:02:33,130 --> 00:02:37,100 Now did you print out some of the errors it might find such as. 38 00:02:37,170 --> 00:02:41,540 Here we have the A.P. checking extreme options header is not present. 39 00:02:41,820 --> 00:02:44,580 The exercise protection header is not defined. 40 00:02:44,580 --> 00:02:47,390 Now this could be a problem. 41 00:02:47,460 --> 00:02:55,370 It is opening us to an across site scripting attack but it also could be just a false alarm. 42 00:02:55,380 --> 00:03:02,610 See here we can see these allowed HDP methods on the Apache Web site which is get head post and options 43 00:03:03,330 --> 00:03:11,920 and this will take a few seconds to finish basically if it takes a lot of time we will just close it 44 00:03:12,490 --> 00:03:20,230 so I can show you some of the other options that Nico has. 45 00:03:20,610 --> 00:03:29,010 Here we have log in that BHP admin log in page section found portions of this service headers are not 46 00:03:29,010 --> 00:03:33,800 in the database or our newer than the known string OK. 47 00:03:33,810 --> 00:03:35,730 Would you like to submit this information. 48 00:03:35,730 --> 00:03:38,370 We do not want to submit it now. 49 00:03:38,370 --> 00:03:46,560 Now you might be asking uh what kind of logging page or my posting on my laptop. 50 00:03:46,560 --> 00:03:50,420 Well basically I just have a fake Instagram page right there. 51 00:03:50,550 --> 00:03:51,210 I JUST MADE IT. 52 00:03:51,210 --> 00:03:56,030 SO IF WE TAPE My laptop's IP address we just open this up. 53 00:03:56,250 --> 00:04:01,050 It will lead us to a fake Instagram page. 54 00:04:01,050 --> 00:04:06,670 As you can see right here it is not a real Instagram it's basically just my IP address which I. 55 00:04:06,790 --> 00:04:14,670 Which we will use for some of the attacks later on but for now on well we'll just use the unique though 56 00:04:14,670 --> 00:04:20,370 in order to scan this page and as we can see it has finished it printed out a bunch of the options which 57 00:04:20,370 --> 00:04:22,050 could be useful or not for you. 58 00:04:22,050 --> 00:04:29,190 Depending on the website and depending on the errors but let's check out some of these other examples 59 00:04:29,400 --> 00:04:30,500 of this command. 60 00:04:30,510 --> 00:04:38,250 So you just type your H and you can see the shock command once again we can see our options 61 00:04:41,330 --> 00:04:51,020 decency display format hosts evasion encoding technique for example you can use the evasion. 62 00:04:51,210 --> 00:04:54,710 I believe it is tagged as a minus E in the command. 63 00:04:54,770 --> 00:05:01,980 We can use the minus E and specify any of these numbers if we want to for example pick barometer directory 64 00:05:01,980 --> 00:05:09,190 self reference or any other we can write here we will use number 1 random encoding on UTF 8. 65 00:05:09,260 --> 00:05:16,280 OK so we will basically run the same command for the ad that said before that. 66 00:05:19,510 --> 00:05:22,700 Now I believe that this will print out the same output. 67 00:05:22,710 --> 00:05:27,910 So we are not really interested right now in waiting for this finish. 68 00:05:27,960 --> 00:05:34,820 So one more thing I want to show you is that you can specify a port on which you want to scan. 69 00:05:35,010 --> 00:05:38,430 Now most likely that port will always be port 80. 70 00:05:38,430 --> 00:05:47,720 So it is not really needed but in case you want to for example scan import for 4 3 which is the CPS 71 00:05:47,790 --> 00:05:53,850 usual port you can change that with the minus B option as we can see. 72 00:05:53,850 --> 00:06:01,510 Default is 80 so you will just type here Nico and then the coast which in my case wanted to then about 73 00:06:01,510 --> 00:06:03,160 68 at one 15. 74 00:06:03,420 --> 00:06:10,080 And then you specify a port and type your 80 or 440 or any other port you want but most likely it will 75 00:06:10,080 --> 00:06:11,920 be one of those two. 76 00:06:11,940 --> 00:06:18,570 Now let's say for example we want to scan port 80 since my Apache web server is running on port 80 on 77 00:06:18,570 --> 00:06:23,150 my laptop and we want to save that into a file. 78 00:06:23,160 --> 00:06:30,980 Now how we do that with be minus 0 command but they just check here if it really is minus so I'm not 79 00:06:30,980 --> 00:06:32,450 seeing it right here. 80 00:06:32,450 --> 00:06:35,590 I believe it is yes it is output. 81 00:06:35,630 --> 00:06:39,710 So just type here minus 0 dash 0 and we will name a file. 82 00:06:39,710 --> 00:06:45,240 Basically we can name it anything you want you we will name it right here result. 83 00:06:45,520 --> 00:06:53,610 And you also need to specify the file type which I believe is the capital F which is format save file 84 00:06:53,880 --> 00:06:54,480 format. 85 00:06:54,480 --> 00:07:01,530 OK so format which just type your basic 60 we want to say it into a text file and we can run the same 86 00:07:01,530 --> 00:07:03,120 client once again. 87 00:07:03,120 --> 00:07:08,610 And basically right here once it finishes we will have a file with all this stuff written to it. 88 00:07:09,030 --> 00:07:11,700 So don't have to write it manually. 89 00:07:11,700 --> 00:07:17,830 The output to option can be used if you need to provide to someone scan results. 90 00:07:18,150 --> 00:07:21,860 So you can just put that into any file type. 91 00:07:22,050 --> 00:07:28,090 I just decided it to be too for this example and you can just send the file to someone. 92 00:07:28,270 --> 00:07:35,040 Now let's just wait for this to finish so we can check out our file here to ask us again if we want 93 00:07:35,070 --> 00:07:39,640 to report something to the website that leave. 94 00:07:39,750 --> 00:07:43,530 Let me just read once again not to include that the base on your. 95 00:07:43,530 --> 00:07:48,780 Would you like to submit this information all into one do not want to snipe what I care less I should 96 00:07:48,780 --> 00:07:52,590 have a pretty good file as we can see right here. 97 00:07:52,770 --> 00:07:55,370 Now we now know there is a file on the research. 98 00:07:55,440 --> 00:07:57,750 Let's just get it resolved. 99 00:07:57,780 --> 00:08:02,310 We should see all of our output right there as we can see. 100 00:08:02,310 --> 00:08:03,300 Target hostname. 101 00:08:03,300 --> 00:08:10,810 Target port is right here and there are some of the we'll try truly sure why it didn't put all of them 102 00:08:10,960 --> 00:08:11,500 in here. 103 00:08:11,500 --> 00:08:12,520 Or maybe it did. 104 00:08:12,570 --> 00:08:14,020 I just can't see them. 105 00:08:14,650 --> 00:08:22,070 But that's the example of righty writing and output in a file. 106 00:08:22,170 --> 00:08:31,170 Now if you want to run nickel to produce the latest fire for now if you want to run nickel can see that 107 00:08:31,170 --> 00:08:37,160 there is an option to run it over a proxy as you can see. 108 00:08:37,170 --> 00:08:42,780 Use proxy use the proxy defined in the nick that corner of file. 109 00:08:43,020 --> 00:08:47,790 Now in order for you to do this you need to link in that file and the proxy one. 110 00:08:47,790 --> 00:08:52,500 Basically you have one I will show you how to put it there. 111 00:08:52,530 --> 00:08:59,760 I don't really have one at the moment to cover proxy and VPN later on but for now and let me just locate 112 00:08:59,820 --> 00:09:01,770 a nickel that compile. 113 00:09:01,800 --> 00:09:03,610 We covered this command so you step here. 114 00:09:03,750 --> 00:09:04,230 OK. 115 00:09:04,260 --> 00:09:08,940 And then the name of the file and will show us all of the files that are named like this. 116 00:09:08,940 --> 00:09:11,870 And where are they stored. 117 00:09:11,920 --> 00:09:19,580 Now we are interested in the first one which is which is in deep at sea and the Nano to the decoder 118 00:09:19,610 --> 00:09:20,360 compile. 119 00:09:20,820 --> 00:09:23,150 We can see a bunch of options right here. 120 00:09:23,280 --> 00:09:28,120 Let us navigate and find the proxy option. 121 00:09:29,710 --> 00:09:31,910 Let me just check where it is. 122 00:09:31,910 --> 00:09:32,530 Here we go. 123 00:09:32,530 --> 00:09:35,860 Proxy settings still must be enabled by use proxy. 124 00:09:35,890 --> 00:09:43,300 So basically if you wanted to use proxy in the nickel program you would specify use proxy in the command. 125 00:09:43,300 --> 00:09:48,540 And here you would specify the proxy and the proxy proxy coast and the proxy board. 126 00:09:49,030 --> 00:09:55,090 So if you had a proxy with specified proxy IP address right here which for me is just a local host at 127 00:09:55,090 --> 00:09:57,130 the moment in here you will specify the port. 128 00:09:57,760 --> 00:10:03,900 And also one more thing you will need to do is remove the hash in order for this to be configured. 129 00:10:03,970 --> 00:10:12,010 And after that you would just type control all save enter control X to exit and then you could use your 130 00:10:12,010 --> 00:10:13,670 proxy an anecdote. 131 00:10:14,020 --> 00:10:20,830 But since I don't really need it at the moment I will just put the hash back. 132 00:10:21,820 --> 00:10:23,270 So we don't use it. 133 00:10:23,790 --> 00:10:25,850 And I will say once again. 134 00:10:26,980 --> 00:10:31,030 So basically just remember that the file is located in the seat. 135 00:10:31,030 --> 00:10:33,850 You can also find it we do locate command. 136 00:10:35,020 --> 00:10:38,250 So that will be about it for the nickel program. 137 00:10:38,560 --> 00:10:41,500 If you want to you can check other options as well. 138 00:10:41,500 --> 00:10:49,160 I don't find them useful at the moment but if you want to could check out all the other options and 139 00:10:49,160 --> 00:10:55,270 we will continue in the next lecture we do whois program and I hope I see you there and take care. 13981

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.