10.2 Web Server Lab Intro EH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

9 hours 47 minutes
Video Transcription
I welcome back to the course. So we just wrapped up our discussion on module 10 about web servers and applications.
So in this video, we're just gonna talk a little bit about some background knowledge, and then we're gonna go into our lab with birth. Sweet.
So we're going to start here with our pre assessment. So question number one, this is a tool that can be used for Web hacking. So which one of those would that be
so if he chose burp Sweet. You are correct. And obviously that was kind of easy, Thio. Guess since we're doing that in this lab
Snore Dozen Intrusion detection system application. John the Ripped her If you're John the Ripper. Excuse me. If you'll recall from module one. When we did that quick win video, John the Ripper was our dictionary attack Password cracker,
and then wire shark is for sniffing the traffic on your network.
So question number two
this or whatever it is can act as a gateway between the local network of a company and the Internet.
All right, so I guess proxy, you are correct. So, essentially proxies, That gateway I mean it. Get out. Help office Kate or I P address.
So Post is actually an http command Thio Transmit text to a Web service of process to excuse me for processing
and then PGP is pretty good privacy. So that's actually a cryptography type of thing. So that's a data encryption or decryption program that medicine off, often used for email or file storage. And then, of course, raid is stands for redundant array of independent disk. So this differ rate levels were not going to touch on that. This course it's more of a digital forensics thing. But
just so you know, that rate is essentially there to help increase
your storage capabilities
and red and the redundancy of your data.
The question Number three birth suite offers all the following benefits, except which one.
So if he gets to answer, see, you are correct. So P. P. T. P is actually stands for point to point tunneling protocol. So that's a VPN, or virtual private network tunneling protocol that has encryption.
All right, so it's clean moving on. So I've listed out the benefits of birth Sweet. Now you can purchase burp suite at this link or just download a free version at this link. It's a little pricey, depending on your budget, so it could get to like the pro version. But it's well worth it. So if you can, if you is, if it's in your budget, I definitely recommend you. Go ahead and do it
and play around with the tool.
So we've got http proxy, which we're gonna actually use in this lab.
And so basically, that operates as a Web proxy, and it's essentially a man in the middle between the browser and the destination service. So if we type in like google dot com, it's the man in the middle between our Web browser and google dot com.
So that's gonna allow us to interceptor, analyze and even modify a traffic that's passing passing through both directions.
We've got the scanner benefit, so the paid version actually offers that, but it's a vulnerability scanner. It's really good for checking out different Web applications and see what vulnerabilities there are.
We've also got intruder, so that's built in tool that can allow us to perform automated attack so things like sequel, injection or cross site scripting, et cetera on different Web applications and then spider just kind of like the name sounds. It allows us to crawl weather applications to help us map out the applications content.
So if you think of like the Google spider, for example, with websites that crawls around to your website and it checks out the different files and everything and then indexes those in Google search. So a similar thing here with Spider Option.
So Russell got repeaters, so this tool could be used to modify request to the server than it can resend them, and then it also monitor the results that we get back decoder. It's using preferred encoded data or convert raw data from into various encoded in hash forms.
The preparer is pretty self explanatory, lets you compare a couple different items of data extender and allows you to load some custom burp extensions.
And then sequencer is used to analyze the quality of randomness in the sample data items like session tokens.
All right, so no, uh, Web server Web anything. Conversation would be complete without mentioning a loss. So the open Web Application security project. They come out every every so often with a top 10 list of different Web vulnerability. So,
um, the 2017 1 is the latest one here, and we're just gonna glance at this list real quick. You could just do a go to their website or just do some Google searching on that. We're not gonna dive into this since the lab doesn't actually cover that component of it. But I just want to know that there is an organization called LA Spot there
and that if you want to know anything Web related as faras like attacks,
that's a good resource to use.
The last resource I have here is exploit pack, so this one's more of, ah, it's outside. The scope of this course is more of an intermediate type, of course, on penetration testing, but this is more an advanced type of tool. As for penetration, testers exploit pat essentially something like 30,000 or more exploits that gives you access to including zero days. So
when you're working as a penetration texture, it's a great way to just
create any type of exploit you want or use any exploits you want. It's all there in one particular tool, so definitely check it out. They do have some demo stuff on their on their website I mean, then, of course, you know they have the page version of stuff as well, like most companies do, but definitely check it out. Watching different videos on it. It's a good tool to use.
So in the next video, we're gonna jump right into using birth Sweet. And then we're gonna reconfigure some of the settings on our browser. We're gonna close the browser relaunch and see what kind of data we get back inside a burp sweet, and we'll talk about some of that process is, well.
Up Next
Penetration Testing and Ethical Hacking

If the idea of hacking as a career excites you, you will benefit greatly from completing this training here on Cybrary. You will learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Those interested in earning their Certified Ethical Hacker (CEH) will want to start by taking this course

Instructed By