4.3 XML External Entities Lab Instructions Part 2

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

12 hours 9 minutes
Video Transcription
everyone Welcome back to the core. So in the last video we started out, typing are actually mel Command that we're gonna be using for validation
in this video over to finish out typing that commander will actually execute it and see what kind of results we get back.
So we left off here on the second line. We have just talked in the opening bracket. Exclamation point doc type all in capital letters. And now we're gonna type in lower case example and then our left bracket.
So let's go ahead and do that now. So we're gonna put a space here, We'll type an example.
And then I left bracket,
and now we're just gonna hit, enter and go down to our next line. So again, you just want to take your time, all these command, and make sure you're entering everything correctly. So that way, the command is successful when we go ahead and running.
So on the third line down, we're gonna type in the opening bracket exclamation point and then the word element, all in capital letters. So let's go ahead and do that now.
So we'll type in our opening bracket exclamation point in an element.
All in capital letters.
We'll go back to our lab document.
Next, we're gonna put a space, will put attack all over case, and then we're gonna put another space and then the word any all capital letters, and then we'll put a closing bracket.
So let's go ahead and do that. Now. We'll put a space attack
space any,
and then we'll close it out with her bracket.
Let's go to the next line down.
So now we're gonna type in
our opening bracket exclamation point and then the word entity. So let's go ahead and take that in now.
So opening bracket, exclamation point and the word entity
There were two type in X, x e and then system. So we're gonna type in XXII all over case,
and then we're gonna type in system in all capital letters.
All right, so now we're gonna finish this out by putting the path to the etcetera password file. So we're gonna put quotation marks around that path there, so we'll type in fort slash e TC for its last P a s s w d. But we're gonna encapsulate that with question quotation marks.
So let's go and do that now.
So put our quotation mark or ford slash E T c four slash p a s s w d. And then we'll end that with quotation marks.
All right, so our last step on this line is we're just gonna put unending tag right there, so we'll go ahead and put a space, and then we'll close that out,
and we're gonna move on to our next line.
So on the next line, we're just gonna put our right bracket, and then we'll close this out as well.
So let's go ahead. Do that now.
And now we're gonna move on to our final line here, so we're gonna put this attack XXI attack. So we're gonna start out with just putting the brackets around attack.
So let's go ahead and do that now.
So we'll start here with this tag, and we'll come back here,
all right? Next, we're gonna type in the and symbol or the ampersand, as it's more commonly called, and then *** e semi colon will type this one right here.
So ampersand
*** e. And the semi colon.
All right, so next we're gonna type in our bracket, So we're gonna be closing the bracket here with our closing tag for the attack.
So we're just gonna put attack again? What we're gonna add in there is a Ford Slash than to come in. And that's you know, if you're not familiar with Web programming, that's that's a way we can close tags, for example, like a, uh, header tag or something like that.
All right, So we went ahead and entered our command here, and we're just gonna double check our sales, make sure everything looks okay. We didn't fat finger anything. Everything looks all right. We're gonna validate this and just see what kind of information we get back.
All right, So let's move back to our lab document. We have just one question in this particular lap. So question number one here, Do you see the contents of the file we're trying to access after running the command
are so the answer is yes. Right. So all of this stuff here is the output of what's in that particular file.
All right, so you'll see that was the last step in this video again. We were just trying to do this type of attack and see if we could potentially use this to get information about this e TC password file. If we get information and what kind of content is in that particular flower
now? We could potentially use the same exploit to get information about different files. For example, if we knew knew the path of certain files on this particular Web server, we could use this command to do so. However, it's pretty specific
s so we were not able to pass like information like XML, h E mail or even binary data
without a throwing an air message. So just keep that in mind as well. It is an attack that that can be exploited. However, it may not be something that that many Attackers used just because it might make. It might be more practical for them to use a different type of attack, so it is on the almost stopped, and it is something relevant.
It's not something necessarily
to the level of, like a sequel injection attack, for example, where that's more commonly used. So just keep that in mind as well.
Now, this video again, we talked about XML external entities, so we wrapped up our lab on it in the next module. We're gonna go ahead and talk about broken access control. We'll talk about what it is as we commonly doing. All these modules will talk about what it is, why you should care and what kind of impact it may have on the organization.
Up Next