Time
2 hours 37 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:01
Hi, everyone. Welcome back to the course. So in the last video, we finished our configuration of our HT track tool. We also went ahead and ran our tool.
00:10
So now we're gonna take a look at their results. So what we're gonna do is click on this browse mirrored website button you that you'll see here than background.
00:18
The once we cook on that, we should see a pop up at the bottom of our browser window. That's going to say, Do you want to allow block content?
00:25
So once we see that, we're just gonna basically we want to allow a block. Contents will click that button.
00:30
So let's go ahead. Do that now. So we're gonna click on Browse Smeared Website. This button here,
00:35
it's gonna open up a page for us. You'll see this is a pop up. I'm talking about. Just click on that, allow blocked content button,
00:42
and you'll see here that we have something that looks just like our Internet page. Right? So let's go back to our lab document.
00:50
All right. So, yes, we do see that the website appears similar to the Internet page. Now, let's just double check that so we'll look back on our Internet page are actual one. I'll need to backtrack here since we were installing the tools. So I just need to backtrack to the home. Just click those two little period symbols. They're So now we're back at the main intranet page. So we see we have data files,
01:10
ftp hot fixed installation files and tools.
01:12
And if we go to our mirrored,
01:15
uh, Paige here we see that we have data files, FTP hot chicks, etcetera, etcetera. So it's the exact same stuff you'll notice. It's slightly different visually, and we've got some hyperlinks here. However,
01:27
to the average user, they may not notice a difference between these two pages. Right?
01:33
And of course, you know a few other items of interest you'll see here that this top right boxes missing on the mirrored one. So again, you know, depending on how deep we go and how much we want to hear this site, we may or may not be able to pick that up.
01:49
The other thing you'll see missing right in this area here is the my files.
01:53
You'll see here we have my files right here.
01:56
So overall, though visually like if I was a user and I didn't know any better, I would think that this was the Internet page, right?
02:02
And that's not really our intent with this foot printing aspect of this. We could certainly use this HT t track tool for doing like web attacks and that sort of stuff a sw, far as, like, you know, create a fake website. But for our purposes, we only care about the code that we're getting, you know? So we want to grab some of the code from the web page and see
02:21
how that might be beneficial to us.
02:23
All right, so we'll just we'll stay on our mirrored image there will go back to our lab documents. So what we're gonna do is we're gonna write, click on the page anywhere on the page, and we're just going to save you. Source will select. That is about 3/4 of the way down,
02:36
and that's gonna show us the code of the website.
02:38
So I want you to think through your head and you don't have to answer this to me. Obviously, since you're watching this on demand, but
02:46
you want, I want you to think through like, how could an attacker actually used the code from this website against the target? So how could you, as a penetration tester, actually uses code to your benefit?
02:54
So let's go ahead and take a look at this care that I'm talking about so anywhere in the in the white area here, just going right click.
03:00
And then, as I mentioned, the view source will be down a little bit and I'll probably click a little
03:06
higher up. So it's easier for you to see so you'll see. Here is 3/4 of the way down. Just click on the view source. It's gonna open up a popular backs for us with the code of the website.
03:15
Now you're gonna notice that some of its encoded so we can't actually see it, But we can get some generalized information, you know, of course, we see some HTML tags here.
03:27
We also see if we scroll down a little bit that they're using JavaScript in some capacity because they make mention to it.
03:32
Eso You'll see. We've got some Java script running, so you know all these things, you know, again, we can't get a whole lot from this lab environment based on security configurations. But what we can do is understand how an attacker could use this information to their benefit, Right? So let's say, for example, they noticed that Java script, you know, is running, which you know it.
03:52
I don't know any websites right now without job script running, But there I'm sure there's some out there,
03:55
but, you know, understanding that maybe we know vulnerabilities that a lot of websites or are, you know, culpable too. Or we figured out a zero day on. Alright, right, Maybe we have a zero day that works against javascript and we see Hey, they got their use in Java script or Jason or something. And
04:14
so what we can do is we can try to run that zero day against your sight and, you know, and see what kind information we might get back right? Because something might be amiss configuration where what we can get, like a database information or we can escalate privileges. So ah, lot of different things we could potentially do with this
04:30
menace, he scrolled on. He could take a look at some other items in there as well. Kind of the main things At least in this, these results that we're getting back are gonna be those. Now you'll see some other things. You know, as far as like I P addresses sometimes in there as well. So any of that any amount of that information could be potentially helpful. Could be all junk. You never know.
04:48
But it could also be helpful information
04:51
as you're working on a penetration test for an organization.
04:57
So in this video, we just wrapped up our discussion on H T track. So again, we actually looked at our results. We look att. The fact that the Internet pages, for the most part, looked at saying, There are some you know, noticed. Noticeable difference is simply because we have access to the original page. But if this was some user that had no clue what the original page looked like,
05:15
they may be fooled into thinking this is actually the page.
05:19
The other thing we were able to do is actually look at the source code of the website itself. So, you know, again, some of it's encoded we can't look at, but we can. We can gather some basic information about this particular web page
05:31
so again. All this is just another tool in your arsenal as you're doing foot printing and reconnaissance to gain more information about your potential target.
05:39
So this video, as I mentioned, we cover the tool H T track and the next video where to go over a tool called the Harvester.

Up Next

Footprinting and Reconnaissance

This course will cover common tools used during the footprinting and reconnaissance phase of the ethical hacking testing methodology.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor