All language subtitles for 3. HTTP Apache

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,000 --> 00:00:03,304 2 00:00:03,304 --> 00:00:06,608 [LOGO AUDIO] 3 00:00:06,608 --> 00:00:10,254 4 00:00:10,254 --> 00:00:15,800 We looked at Windows servers for hosting websites for HTTP. 5 00:00:15,800 --> 00:00:19,460 Now we're going to look at a Ubuntu, a Linux Unix 6 00:00:19,460 --> 00:00:23,653 distribution and see it running Apache. 7 00:00:23,653 --> 00:00:24,570 How is that different? 8 00:00:24,570 --> 00:00:26,015 What does is look like? 9 00:00:26,015 --> 00:00:29,160 You're going to find it's very much the same. 10 00:00:29,160 --> 00:00:32,890 Just once we get to the operating system, 11 00:00:32,890 --> 00:00:35,190 we're going to interact a little differently when 12 00:00:35,190 --> 00:00:37,680 we have a shell, when we're interacting 13 00:00:37,680 --> 00:00:39,730 with the actual machine. 14 00:00:39,730 --> 00:00:44,100 But most of it's going to look very similar 15 00:00:44,100 --> 00:00:45,450 up until that point. 16 00:00:45,450 --> 00:00:52,700 17 00:00:52,700 --> 00:00:54,500 We have just a terminal. 18 00:00:54,500 --> 00:00:56,305 So let's get our IP address. 19 00:00:56,305 --> 00:01:05,310 20 00:01:05,310 --> 00:01:06,980 So it's saying my IP address with a .3. 21 00:01:06,980 --> 00:01:15,630 22 00:01:15,630 --> 00:01:17,580 So we'll use that. 23 00:01:17,580 --> 00:01:20,526 And it comes back port 80 open. 24 00:01:20,526 --> 00:01:25,545 Once you could adjust port 80 per services scan. 25 00:01:25,545 --> 00:01:34,710 26 00:01:34,710 --> 00:01:40,930 And it comes back with Apache HTTPD 2.4.1.8. 27 00:01:40,930 --> 00:01:43,920 That's useful information. 28 00:01:43,920 --> 00:01:46,310 Now we'll take that and run Script Header. 29 00:01:46,310 --> 00:01:48,860 30 00:01:48,860 --> 00:01:49,835 Sorry, Script Banner. 31 00:01:49,835 --> 00:01:55,480 32 00:01:55,480 --> 00:01:58,315 And it should return banner information for us. 33 00:01:58,315 --> 00:02:03,950 34 00:02:03,950 --> 00:02:07,570 The banner being the information that your machine receives 35 00:02:07,570 --> 00:02:10,030 the first time it connects remotely to another machine. 36 00:02:10,030 --> 00:02:17,640 37 00:02:17,640 --> 00:02:21,450 In this situation, it says the server is an Apache 38 00:02:21,450 --> 00:02:30,020 2.4.18 running on Ubuntu. 39 00:02:30,020 --> 00:02:34,520 Let's jump into MSF Console, something we haven't done yet 40 00:02:34,520 --> 00:02:35,345 with this protocol. 41 00:02:35,345 --> 00:02:42,720 42 00:02:42,720 --> 00:02:46,770 The Metasploit framework comes with some very useful 43 00:02:46,770 --> 00:02:51,030 auxiliary modules, scanners, that 44 00:02:51,030 --> 00:02:56,430 will enumerate all sorts of useful stuff for you. 45 00:02:56,430 --> 00:03:03,670 46 00:03:03,670 --> 00:03:06,180 Yeah, so are our hosts to our IP address. 47 00:03:06,180 --> 00:03:08,910 48 00:03:08,910 --> 00:03:13,040 And you can look at the options real fast. 49 00:03:13,040 --> 00:03:14,900 It's going to connect to port 80. 50 00:03:14,900 --> 00:03:18,760 It's not encrypted with SSL, so we don't 51 00:03:18,760 --> 00:03:21,980 need to negotiate SSL or TLS. 52 00:03:21,980 --> 00:03:25,730 If it was on port 443, it might be different, 53 00:03:25,730 --> 00:03:27,762 should be different, would be different. 54 00:03:27,762 --> 00:03:31,070 55 00:03:31,070 --> 00:03:33,980 Let's run this. 56 00:03:33,980 --> 00:03:34,700 That was fast. 57 00:03:34,700 --> 00:03:38,690 It came back with Apache 2.4.18, which is nothing new. 58 00:03:38,690 --> 00:03:40,415 It's what we kind of expected. 59 00:03:40,415 --> 00:03:45,460 60 00:03:45,460 --> 00:03:50,800 Another thing we could do is Curl Page. 61 00:03:50,800 --> 00:03:56,570 And I'm going to pipe it to More just because I 62 00:03:56,570 --> 00:03:59,520 know it's going to give us a lot of information. 63 00:03:59,520 --> 00:04:01,300 More gives you one page at a time. 64 00:04:01,300 --> 00:04:04,760 So DOC type is HTML. 65 00:04:04,760 --> 00:04:09,140 And here's that header information, 66 00:04:09,140 --> 00:04:11,250 which shows that it's about to 2. 67 00:04:11,250 --> 00:04:16,130 68 00:04:16,130 --> 00:04:17,590 Can be quite useful. 69 00:04:17,590 --> 00:04:26,640 70 00:04:26,640 --> 00:04:29,560 And another tool is going to be WGET. 71 00:04:29,560 --> 00:04:31,675 WGET will retrieve web files. 72 00:04:31,675 --> 00:04:36,110 73 00:04:36,110 --> 00:04:40,990 So if we ask it for the index file, which 74 00:04:40,990 --> 00:04:47,290 is usually the Home page for a website, it will download it. 75 00:04:47,290 --> 00:04:49,160 And we see we've got index there. 76 00:04:49,160 --> 00:04:53,200 So we could CAT index and pipe that to More. 77 00:04:53,200 --> 00:04:55,930 78 00:04:55,930 --> 00:04:57,130 And it's the same file. 79 00:04:57,130 --> 00:05:03,470 80 00:05:03,470 --> 00:05:05,230 Another tool we can look at is Browsh. 81 00:05:05,230 --> 00:05:08,050 82 00:05:08,050 --> 00:05:13,960 And we give it a Startup URL. 83 00:05:13,960 --> 00:05:16,515 84 00:05:16,515 --> 00:05:19,900 And it needs it as-- no, that's fine-- 85 00:05:19,900 --> 00:05:23,040 as night viewers. 86 00:05:23,040 --> 00:05:25,830 It's going to render in the command line what 87 00:05:25,830 --> 00:05:27,090 our website looks like. 88 00:05:27,090 --> 00:05:30,930 It looks like it's an Apache 2, Ubuntu default web page. 89 00:05:30,930 --> 00:05:33,560 90 00:05:33,560 --> 00:05:35,540 This is all useful information that we 91 00:05:35,540 --> 00:05:40,540 would want to write down in our notes for enumeration. 92 00:05:40,540 --> 00:05:45,960 93 00:05:45,960 --> 00:05:47,610 Get out of here. 94 00:05:47,610 --> 00:05:54,550 Control-W. 95 00:05:54,550 --> 00:05:58,390 Another great tool is Lynx. 96 00:05:58,390 --> 00:06:05,710 And you pass this one as the URL with an HTTP. 97 00:06:05,710 --> 00:06:10,710 98 00:06:10,710 --> 00:06:12,780 And it's very similar to what we just 99 00:06:12,780 --> 00:06:18,900 saw, less gooey, more just reading and parsing out 100 00:06:18,900 --> 00:06:22,110 the text for you in something that's a little easier 101 00:06:22,110 --> 00:06:29,680 on the eyes than the default. 102 00:06:29,680 --> 00:06:31,563 HTML. 103 00:06:31,563 --> 00:06:32,480 Sure you want to quit? 104 00:06:32,480 --> 00:06:32,980 Yes. 105 00:06:32,980 --> 00:06:41,750 106 00:06:41,750 --> 00:06:47,240 We can use DIRB, but we're going to jump back into MSF Console 107 00:06:47,240 --> 00:06:48,683 since we've already done DIRB. 108 00:06:48,683 --> 00:06:58,840 109 00:06:58,840 --> 00:07:04,060 And again, we use an auxiliary scanner for HTTP. 110 00:07:04,060 --> 00:07:05,755 This one is going to be Brute Dirs. 111 00:07:05,755 --> 00:07:12,724 112 00:07:12,724 --> 00:07:18,650 Showing quite a few options. 113 00:07:18,650 --> 00:07:21,170 We'll set Rhosts to our IP. 114 00:07:21,170 --> 00:07:25,670 115 00:07:25,670 --> 00:07:29,560 Mostly all the yeses were filled. 116 00:07:29,560 --> 00:07:35,350 We will delete, or exploit rather than typing Run. 117 00:07:35,350 --> 00:07:45,580 118 00:07:45,580 --> 00:07:47,200 And what this will do is, it's going 119 00:07:47,200 --> 00:07:55,440 to use a word list, one that comes 120 00:07:55,440 --> 00:07:58,140 with Metasploit framework. 121 00:07:58,140 --> 00:08:02,130 Let's see if it can't find some directories for us. 122 00:08:02,130 --> 00:08:03,800 So it found DIR, it found Source. 123 00:08:03,800 --> 00:08:08,680 124 00:08:08,680 --> 00:08:14,160 And since it's the Ubuntu Apache default website, not expecting 125 00:08:14,160 --> 00:08:18,995 to find many directories. 126 00:08:18,995 --> 00:08:22,115 If we did find more directories, that might be telling. 127 00:08:22,115 --> 00:08:27,670 128 00:08:27,670 --> 00:08:31,540 We'll look at the non-Metasploit version of that. 129 00:08:31,540 --> 00:08:32,440 So DIRB. 130 00:08:32,440 --> 00:08:35,020 131 00:08:35,020 --> 00:08:37,675 Instead of an IP address you would URL. 132 00:08:37,675 --> 00:08:40,580 133 00:08:40,580 --> 00:08:42,890 And let's give it the same word list 134 00:08:42,890 --> 00:08:46,340 that we just used, the Metasploit 135 00:08:46,340 --> 00:08:56,270 framework for Directory.txt. 136 00:08:56,270 --> 00:09:08,710 137 00:09:08,710 --> 00:09:09,505 Data word lists. 138 00:09:09,505 --> 00:09:13,480 139 00:09:13,480 --> 00:09:15,240 That one went a lot faster. 140 00:09:15,240 --> 00:09:17,960 Came back with Data and DIR, same 141 00:09:17,960 --> 00:09:20,480 as we found with Metasploit. 142 00:09:20,480 --> 00:09:26,250 143 00:09:26,250 --> 00:09:29,340 The last thing we want to look at is the Robots.txt. 144 00:09:29,340 --> 00:09:33,850 145 00:09:33,850 --> 00:09:39,150 So Robots.txt is what a web browser, what a search engine, 146 00:09:39,150 --> 00:09:43,410 utilizes in order to understand which pages, which files, 147 00:09:43,410 --> 00:09:48,360 are within bounds to spider and read, 148 00:09:48,360 --> 00:09:52,590 and include in search results, and what 149 00:09:52,590 --> 00:09:54,360 files it doesn't want read. 150 00:09:54,360 --> 00:09:56,730 Or maybe what browsers it doesn't want 151 00:09:56,730 --> 00:09:58,090 to be reading these things. 152 00:09:58,090 --> 00:10:02,410 So that Robots.txt file can usually be very helpful. 153 00:10:02,410 --> 00:10:06,000 It could tell us all of the subdirectories and directories 154 00:10:06,000 --> 00:10:12,710 because it's got to tell the search engine to read or not 155 00:10:12,710 --> 00:10:14,275 read them. 156 00:10:14,275 --> 00:10:15,900 Sometimes you get all that information, 157 00:10:15,900 --> 00:10:16,850 other times you don't. 158 00:10:16,850 --> 00:10:18,110 But let's give it a try. 159 00:10:18,110 --> 00:10:24,600 160 00:10:24,600 --> 00:10:28,661 In this case, we will hop back into Metasploit. 161 00:10:28,661 --> 00:10:40,450 162 00:10:40,450 --> 00:10:44,890 It's very useful if you start doing things in Metasploit 163 00:10:44,890 --> 00:10:46,615 to just keep it up. 164 00:10:46,615 --> 00:10:49,160 165 00:10:49,160 --> 00:10:52,590 If you only have one tab, you only have command line, 166 00:10:52,590 --> 00:10:54,330 then sometimes that's not an option. 167 00:10:54,330 --> 00:10:57,070 168 00:10:57,070 --> 00:11:01,870 We're going to use this HTTP Robots.txt scanner. 169 00:11:01,870 --> 00:11:04,440 170 00:11:04,440 --> 00:11:05,660 Set our Rhosts hosts. 171 00:11:05,660 --> 00:11:09,190 172 00:11:09,190 --> 00:11:11,770 It's always best to check your options with Metasploit. 173 00:11:11,770 --> 00:11:14,330 174 00:11:14,330 --> 00:11:15,800 Make sure that everything that says 175 00:11:15,800 --> 00:11:19,010 "Yes" in the required column, actually 176 00:11:19,010 --> 00:11:22,790 has a current setting that makes sense to us. 177 00:11:22,790 --> 00:11:24,650 .3 on 80. 178 00:11:24,650 --> 00:11:29,270 179 00:11:29,270 --> 00:11:29,990 More on that. 180 00:11:29,990 --> 00:11:32,816 181 00:11:32,816 --> 00:11:34,895 That went pretty fast. 182 00:11:34,895 --> 00:11:38,340 183 00:11:38,340 --> 00:11:42,240 So any user agents allowed, so any sort of browser works. 184 00:11:42,240 --> 00:11:48,825 Then we have these Disallows, CGI bin, and Junk. 185 00:11:48,825 --> 00:11:51,963 186 00:11:51,963 --> 00:11:54,005 Maybe if it was the Gibson, it would say garbage. 187 00:11:54,005 --> 00:11:58,870 188 00:11:58,870 --> 00:12:00,520 And we use the user agent of Badbot. 189 00:12:00,520 --> 00:12:03,220 190 00:12:03,220 --> 00:12:05,852 What was disallowed was No Badbot Dir. 191 00:12:05,852 --> 00:12:13,090 192 00:12:13,090 --> 00:12:22,030 That could be useful if we did a Curl of the website looking 193 00:12:22,030 --> 00:12:23,290 at CGI bin. 194 00:12:23,290 --> 00:12:27,362 195 00:12:27,362 --> 00:12:28,695 Pipe that to More, just in case. 196 00:12:28,695 --> 00:12:32,810 197 00:12:32,810 --> 00:12:37,760 We got a 404. 198 00:12:37,760 --> 00:12:41,770 Knowing that CGI bin exists might be helpful. 199 00:12:41,770 --> 00:12:45,460 This case, got a 403 forbidden. 200 00:12:45,460 --> 00:12:48,850 So that can be potentially useful later for exploitation 201 00:12:48,850 --> 00:12:50,155 or for auditing. 202 00:12:50,155 --> 00:12:57,220 203 00:12:57,220 --> 00:12:59,770 And with that, we've looked at now a Windows 204 00:12:59,770 --> 00:13:04,600 server running HTTP and a Linux server running HTTP. 205 00:13:04,600 --> 00:13:07,060 There's a lot more that you can get into with a website 206 00:13:07,060 --> 00:13:10,250 and with HTTP, specifically. 207 00:13:10,250 --> 00:13:13,470 And we will cover that in its own section. 208 00:13:13,470 --> 00:13:14,000 12915

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.