1 00:00:00,900 --> 00:00:07,230 In this lecture I'd like to highlight a very important note when it comes to website penetration testing 2 00:00:08,400 --> 00:00:14,700 websites are installed on web servers on normal computers like we said before these normal computers 3 00:00:14,700 --> 00:00:20,570 have IP addresses and using the IP address we can access our target website. 4 00:00:20,640 --> 00:00:27,840 Now in many scenarios your target web site will or your target server will contain a large number of 5 00:00:27,840 --> 00:00:33,840 Web sites so it have the Web site that you're looking for that you're targeting but it'll also contain 6 00:00:34,110 --> 00:00:36,150 other websites on the same server. 7 00:00:36,150 --> 00:00:38,450 So on the same file system. 8 00:00:38,620 --> 00:00:45,070 What this means is if you for example could not find any vulnerabilities in your target web site you 9 00:00:45,070 --> 00:00:50,360 can try to hack into any other web site that is installed on the same server. 10 00:00:50,980 --> 00:00:56,270 If you could do that then you'll be able to gain access to the server getting access to the Sarovar 11 00:00:56,290 --> 00:01:01,870 basically means you have access to all the other Web sites because the server is just a computer and 12 00:01:01,870 --> 00:01:08,800 you can literally just navigate to the web that you want to hike and gain access to that Web site. 13 00:01:08,810 --> 00:01:13,820 So if you're trying to hack into a website and you couldn't find any exploits then the next step will 14 00:01:13,820 --> 00:01:19,070 be trying to hack any other web site that exist on the same server. 15 00:01:19,130 --> 00:01:25,420 So what I mean by exist on the same server is they have the same IP address. 16 00:01:25,430 --> 00:01:28,280 So let me show you here an example. 17 00:01:28,280 --> 00:01:35,420 I'm going to be shown an example of Zayde dot com so my blog because there is a lot of Web sites on 18 00:01:35,420 --> 00:01:36,160 the same server. 19 00:01:36,170 --> 00:01:42,840 And if we look here on Iraq optics dot com and I came down here two names pointing to the same IP address. 20 00:01:43,010 --> 00:01:50,630 You can see all of these Web sites exist on the same server as Zayde dot com. 21 00:01:50,630 --> 00:01:56,400 So if you could manage to hack into any of these websites you'll be able to navigate from the front 22 00:01:56,710 --> 00:02:04,300 of that Web site and then into a dot com and then gain full access to my Web site so let me just show 23 00:02:04,300 --> 00:02:09,700 you here if I copy any of these domain names for example we have this one really bothers me and I'm 24 00:02:09,700 --> 00:02:11,460 just going to go onto my terminal 25 00:02:15,550 --> 00:02:16,000 now. 26 00:02:16,070 --> 00:02:18,140 I've already if I do a ping 27 00:02:21,360 --> 00:02:30,750 Zayd does can you'll see that this is my IP address on my website and if I do a ping on one of the Web 28 00:02:30,750 --> 00:02:34,730 sites that exist and it's for now we're using really bothers me. 29 00:02:34,760 --> 00:02:43,660 So if I go Pinki Riva with me you'll see that both Web sites have the same IP address. 30 00:02:43,670 --> 00:02:47,390 This means that both Web sites are installed on the same computer. 31 00:02:47,440 --> 00:02:52,640 And if we could hack into one of them we can literally just navigate from that Web site into the other 32 00:02:52,640 --> 00:02:57,920 from our military tertio or from our ph Richelle or any type of shell that we're using. 33 00:02:59,490 --> 00:03:04,650 Another way of finding web sites on the same domain is using bank and it's a really simple way. 34 00:03:04,650 --> 00:03:06,300 So if if you just go on being 35 00:03:10,060 --> 00:03:17,680 and I'm just going to put IP and then I'll put the IP of my target website again you'll see all the 36 00:03:17,680 --> 00:03:22,290 other websites that exist on the same server as your target website. 37 00:03:22,450 --> 00:03:28,510 So you can literally hack into any of these Web sites and from there hack into my web site and gain 38 00:03:28,510 --> 00:03:29,960 access to it. 39 00:03:29,980 --> 00:03:36,040 This is very important because in many cases your target could be very well secured but the server itself 40 00:03:36,040 --> 00:03:40,960 is not secure so you can manage to hack one of the other websites and then navigate through the server 41 00:03:41,230 --> 00:03:41,920 to your target.