All language subtitles for 1. HTTP IIS

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,000 --> 00:00:03,395 2 00:00:03,395 --> 00:00:06,790 [LOGO AUDIO] 3 00:00:06,790 --> 00:00:10,190 4 00:00:10,190 --> 00:00:14,090 One of the most common protocols we're going to see is HTTP. 5 00:00:14,090 --> 00:00:16,250 HTTP is for hosting websites. 6 00:00:16,250 --> 00:00:18,320 We would see this on an external scan. 7 00:00:18,320 --> 00:00:20,300 We could see it on an internal scan. 8 00:00:20,300 --> 00:00:23,660 Websites are a big part of the internet. 9 00:00:23,660 --> 00:00:29,410 So anything connecting to the internet, networks, websites 10 00:00:29,410 --> 00:00:31,280 are going to be a big part of it. 11 00:00:31,280 --> 00:00:35,520 There are so many programs, so many ways 12 00:00:35,520 --> 00:00:38,160 that you can build a site, so many languages 13 00:00:38,160 --> 00:00:43,410 that, there's just a plethora of possible vulnerabilities. 14 00:00:43,410 --> 00:00:48,510 As an attacker, if we see that there's a website being hosted, 15 00:00:48,510 --> 00:00:52,260 it's like knowing that there's an unguarded back door, 16 00:00:52,260 --> 00:00:55,270 that there's going to be some way of getting in there. 17 00:00:55,270 --> 00:00:58,200 So let's dive in and see what that actually looks like. 18 00:00:58,200 --> 00:01:01,490 19 00:01:01,490 --> 00:01:03,185 We've been given an IP address. 20 00:01:03,185 --> 00:01:08,010 21 00:01:08,010 --> 00:01:10,940 So we're on a civil Nmap scan against it. 22 00:01:10,940 --> 00:01:13,050 And we see port 80 is open. 23 00:01:13,050 --> 00:01:18,590 We also see 135, 139, and 445. 24 00:01:18,590 --> 00:01:25,500 Let's run a couple extras on this machine. 25 00:01:25,500 --> 00:01:29,810 But port 80 is open, port 80 for HTTP. 26 00:01:29,810 --> 00:01:34,040 When I see that, I want to open up a web browser. 27 00:01:34,040 --> 00:01:37,653 And a lot of people will say, there's 28 00:01:37,653 --> 00:01:39,695 a lot you can do before you get to a web browser. 29 00:01:39,695 --> 00:01:44,017 30 00:01:44,017 --> 00:01:45,850 But I think there's a lot you can learn just 31 00:01:45,850 --> 00:01:47,260 from going there. 32 00:01:47,260 --> 00:01:49,120 WebGoat.net. 33 00:01:49,120 --> 00:01:56,880 So WebGoat is a purposefully vulnerable application website, 34 00:01:56,880 --> 00:01:58,440 built by OWASP. 35 00:01:58,440 --> 00:02:01,383 See it over here? 36 00:02:01,383 --> 00:02:02,550 And it's great for teaching. 37 00:02:02,550 --> 00:02:03,760 It's great for training. 38 00:02:03,760 --> 00:02:06,580 It's great for learning. 39 00:02:06,580 --> 00:02:10,780 Let's see what we learned from our scan. 40 00:02:10,780 --> 00:02:17,720 Running Microsoft IIS HTTP D 10.0. 41 00:02:17,720 --> 00:02:19,280 We've got Microsoft running. 42 00:02:19,280 --> 00:02:21,228 There's a MySQL. 43 00:02:21,228 --> 00:02:22,020 That's interesting. 44 00:02:22,020 --> 00:02:25,250 We'll come back to that later. 45 00:02:25,250 --> 00:02:28,610 Fingerprint scan came back no exact matches. 46 00:02:28,610 --> 00:02:31,730 We had Windows. 47 00:02:31,730 --> 00:02:38,507 Going with Windows, it's IIS on port 80. 48 00:02:38,507 --> 00:02:39,465 That's a dead giveaway. 49 00:02:39,465 --> 00:02:42,610 50 00:02:42,610 --> 00:02:44,290 So it's neat. 51 00:02:44,290 --> 00:02:45,800 It's helpful. 52 00:02:45,800 --> 00:02:48,451 What else can we learn from this? 53 00:02:48,451 --> 00:02:50,750 There's a couple extra scans that we can do. 54 00:02:50,750 --> 00:02:53,690 55 00:02:53,690 --> 00:02:55,250 Search on a What Web. 56 00:02:55,250 --> 00:03:04,000 57 00:03:04,000 --> 00:03:08,070 And that's going to reach out and find some information 58 00:03:08,070 --> 00:03:08,940 about our server. 59 00:03:08,940 --> 00:03:13,740 Again, Microsoft IIS 10.0. 60 00:03:13,740 --> 00:03:14,850 No real change there. 61 00:03:14,850 --> 00:03:18,110 62 00:03:18,110 --> 00:03:21,080 Looks like there's no cross-site scripting protection. 63 00:03:21,080 --> 00:03:25,170 64 00:03:25,170 --> 00:03:27,660 When you run a program like What Web, 65 00:03:27,660 --> 00:03:29,730 it's running a bunch of scripts. 66 00:03:29,730 --> 00:03:35,940 And some of them are going to be to test and see 67 00:03:35,940 --> 00:03:38,460 if there's vulnerabilities. 68 00:03:38,460 --> 00:03:41,310 It's kind of nice. 69 00:03:41,310 --> 00:03:49,710 Another tool that we've got is HTTP or HTT pi. 70 00:03:49,710 --> 00:03:52,260 They can manage as HTTP. 71 00:03:52,260 --> 00:03:54,060 And it'll reach out. 72 00:03:54,060 --> 00:04:00,570 You can see here, it just sends an HTTP request. 73 00:04:00,570 --> 00:04:03,030 You got a 302 found. 74 00:04:03,030 --> 00:04:05,400 And this is where we find out what our server. 75 00:04:05,400 --> 00:04:09,810 That it's a Microsoft IIS 10.0. 76 00:04:09,810 --> 00:04:13,050 This is all the header information that came back. 77 00:04:13,050 --> 00:04:18,720 And then it just says that, the object was moved to-- 78 00:04:18,720 --> 00:04:24,750 and then an anchor with an href of default.aspx. 79 00:04:24,750 --> 00:04:27,120 That's another dead giveaway. 80 00:04:27,120 --> 00:04:32,070 Microsoft IIS utilizes the aspx file type. 81 00:04:32,070 --> 00:04:36,220 82 00:04:36,220 --> 00:04:42,510 So it's just good confirmation of what we are working against. 83 00:04:42,510 --> 00:04:47,850 Another tool, DIRB, will enumerate for us quite a bit. 84 00:04:47,850 --> 00:04:50,610 85 00:04:50,610 --> 00:04:52,950 You got to give it an URL, not just an IP address. 86 00:04:52,950 --> 00:04:55,750 87 00:04:55,750 --> 00:04:58,830 So it's going to run against this default word 88 00:04:58,830 --> 00:05:02,070 list, the DIRB word list with common.txt. 89 00:05:02,070 --> 00:05:09,630 And what it's looking for is directories. 90 00:05:09,630 --> 00:05:15,120 So we saw the default.aspx is where we were getting sent to. 91 00:05:15,120 --> 00:05:19,095 And we connect to just the IP address. 92 00:05:19,095 --> 00:05:24,060 93 00:05:24,060 --> 00:05:25,785 And in here, there is content. 94 00:05:25,785 --> 00:05:28,920 95 00:05:28,920 --> 00:05:29,880 That's one it tried. 96 00:05:29,880 --> 00:05:34,530 97 00:05:34,530 --> 00:05:36,900 We are forbidden. 98 00:05:36,900 --> 00:05:37,990 Try Downloads. 99 00:05:37,990 --> 00:05:42,390 We'll see some of these things that DIRB is popping out. 100 00:05:42,390 --> 00:05:45,000 101 00:05:45,000 --> 00:05:49,860 We'll wait until it finishes the scan, truthfully, 102 00:05:49,860 --> 00:06:00,030 because it's going to go through 4,600 words. 103 00:06:00,030 --> 00:06:06,690 But what it's doing is, it's sending a GET request 104 00:06:06,690 --> 00:06:09,570 to the full URL to see if it gets back anything. 105 00:06:09,570 --> 00:06:15,200 106 00:06:15,200 --> 00:06:19,520 Since it found these top-level folders, 107 00:06:19,520 --> 00:06:22,280 now it's looking for subdirectories. 108 00:06:22,280 --> 00:06:33,610 109 00:06:33,610 --> 00:06:36,250 We'll probably continue to get 403s. 110 00:06:36,250 --> 00:06:38,800 But a 403 means it might actually be there. 111 00:06:38,800 --> 00:06:52,460 112 00:06:52,460 --> 00:06:58,570 So this is basic enumeration. 113 00:06:58,570 --> 00:07:00,550 One other tool that we have is Browsh. 114 00:07:00,550 --> 00:07:05,830 115 00:07:05,830 --> 00:07:12,430 And it will do website and enumeration based 116 00:07:12,430 --> 00:07:24,970 on an URL in your command line. 117 00:07:24,970 --> 00:07:28,500 So it looks a lot like what you would see in the browser. 118 00:07:28,500 --> 00:07:33,150 And it can be quite useful if you have Browsh on the machine 119 00:07:33,150 --> 00:07:38,970 if you don't have anything more than command line 120 00:07:38,970 --> 00:07:44,835 because you could see, its best guess at rendering the website. 121 00:07:44,835 --> 00:07:48,317 122 00:07:48,317 --> 00:07:49,275 Oh, that made it worse. 123 00:07:49,275 --> 00:07:55,190 124 00:07:55,190 --> 00:07:57,785 And you see DIRB will run for quite a while. 125 00:07:57,785 --> 00:08:05,390 126 00:08:05,390 --> 00:08:06,710 But we would let it run. 127 00:08:06,710 --> 00:08:09,290 We would mark down all of the directories 128 00:08:09,290 --> 00:08:12,740 and see if we have access to anything. 129 00:08:12,740 --> 00:08:14,930 And that is our basic enumeration. 130 00:08:14,930 --> 00:08:22,280 Again, this is a website running on a Microsoft server 131 00:08:22,280 --> 00:08:26,150 because it's running Microsoft IIS server. 132 00:08:26,150 --> 00:08:36,120 133 00:08:36,120 --> 00:08:38,970 You can feel free to let your scan continue, see 134 00:08:38,970 --> 00:08:41,940 what directory, subdirectories you find. 135 00:08:41,940 --> 00:08:46,070 But we're going to move on to the next lesson. 8896

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.