Time
4 hours 20 minutes
Difficulty
Intermediate
CEU/CPE
5

Video Description

This lesson offers examples of sequel map script using the Python programming language: • -U • --Forms • --Batch • --Crawl • --Level • --Risk Using the Kali environment, participants receive step by step instructions in how to conduct pen testing.

Video Transcription

00:04
next, we're gonna show you a secret map. So here's some syntax for sequel map. Know if he
00:09
had the Secret Map script rather than having a brainstorm, you would have to type Python sequel map dot p y. However, we already have a pre installed, so you'll just need a type sequel map. Then you will type attack you
00:22
and
00:23
attack us for the Earl. After that, you would type the Earl
00:28
for us will be the I. P address of the
00:32
pen tester lab.
00:35
When we do tack tack forms
00:38
wait. That means it'll parts through and test all the forms.
00:42
Tak tak batch,
00:44
which is not interactive mode. So usually secret map will ask you a whole bunch of questions. This just accept all of the default answers for you.
00:53
Tec Tec crawl equals 10. So how deep do you want to cross site? Meaning,
00:58
you know, if it finds all the pages how far down the rabbit hole doesn't Do you want to go with all these other pages? You necessarily don't want it to follow every single page, especially if you have something like
01:10
Facebook.
01:11
Um,
01:12
if you own a website like Facebook or some other kind of site where users have user profiles, and now they're all linked to each other. You don't want your program to just be running and tell a ghost through every single user profile, because
01:29
the user profile pages are gonna have the same vulnerabilities if they do have a vulnerability
01:34
and then tack tack level.
01:37
Um, it's different from the level of tests like crawl
01:42
tactic level.
01:44
Uh,
01:46
this is how
01:49
how in depth do you want this test to go
01:51
and then tack tack risk is,
01:56
are you really worried about
01:59
causing a lot of noise and traffic? Are are you worried about
02:02
possibly crashing something? We're not worried about this sore wrist. He's gonna be three when we do it. All right, let's go check it out. All right, here we are in our Callie environment. We have sequel map. Tak you. We have our I p address forms batch crawl,
02:19
vehicles five, and risk
02:23
legal. Three crawl is gonna be level one, because we really don't need to crawl. This everything that we need is gonna be right there at face value right on that one page.
02:32
All right, let's hit. Enter here.
02:37
And it starts running through its tests of sequel vulnerabilities.
02:43
Now you could see it started on excess s example. One. Now it's going to go through a whole gamut of tests,
02:49
and we know there's a sequel. Vulnerabilities on
02:53
across that scripting example. One piece, So we're gonna dio has hit
02:57
control. See?
02:58
It's gonna ask. Guess if we want to get the current test
03:00
Good. An expert I'm gonna change for but rebels verbosity
03:06
or quit. So,
03:07
uh, we want to skip
03:09
the current test.
03:14
We see you jumped over that test.
03:15
So
03:16
that's good if there's a test of tanking,
03:20
But we wanted to skip over the entire page. We're gonna hit control C again. You gotta hit E
03:28
and it jumps over to the next patient. Always see here. That's going to example, too,
03:34
right here.
03:36
Hit control C again. And we're gonna keep doing this until
03:39
we
03:40
get over into our sequel. Injection pages were example Four
03:49
Temple five
03:53
Example. ***.
03:55
Example. Seven. We're getting close
04:00
on yet.
04:01
I believe we're in our first sequel Injection page here.
04:09
Now
04:11
we're gonna do a quick hop over here.
04:18
No.
04:23
Now
04:24
saw me accidentally exit it.
04:26
Be very careful with what command you type. Or else you will mess up your scan like that.
04:35
Let's quickly get back there all quick here.
04:50
All right. We're in our first sequel Injection page.
04:56
Now it's gonna run through a whole gamut of test here,
05:00
and
05:01
I ran this before, and sometimes you could take a little bit of time. Sometimes I could take a long time, but here we see it. It took relatively quick time,
05:11
and we have detected a sequel injection vulnerability here.
05:17
And it's telling us, Ah, whole gamut of information here
05:21
tells us the type of test it was used.
05:24
We got a blind sequel, injection and ah bullion and or blind a union query.
05:32
And ah,
05:33
hell came back as identifying that there was a vulnerability here.
05:39
Now it also tells us some additional database information here, which is extremely helpful if we want to further exploit this. So it tells us what's my sequel database? The Web application uses PHP and Apache, and the operating system is Lennox Tevye. And six, when it comes time to exploit,
05:59
this information will be very handy.

Up Next

Web Application Penetration Testing

In this web application penetration testing course, SME, Raymond Evans, takes you on a wild and fascinating journey into the cyber security discipline of web application pentesting. This is a very hands-on course that will require you to set up your own pentesting environment.

Instructed By

Instructor Profile Image
Raymond Evans
Instructor