1 00:00:12,220 --> 00:00:17,980 Hey, guys, welcome back to another episode on how the heck so we're back to a Web application penetration 2 00:00:17,980 --> 00:00:23,770 testing series and here we have a running and we are looking into the fall of upload vulnerability. 3 00:00:24,370 --> 00:00:29,620 So as you can see here, based on a previous tutorial, we actually went through WiFi so swiftly. 4 00:00:29,620 --> 00:00:36,640 Give us a weaponized Web shell so you can download briefly over here Eidos of Zip Fall or using Bitcoin 5 00:00:36,640 --> 00:00:37,400 on your terminal. 6 00:00:37,990 --> 00:00:43,960 So once you have WiFi running, you can actually create a payload and then you upload a payload into 7 00:00:44,200 --> 00:00:44,830 the site. 8 00:00:44,860 --> 00:00:51,820 So once as you can see over here, we have hackable its payload that has been placed into the website 9 00:00:51,830 --> 00:00:54,190 that would then give us a weaponized web shell. 10 00:00:55,050 --> 00:00:57,140 So going back into terminal. 11 00:00:57,160 --> 00:00:57,430 All right. 12 00:00:57,430 --> 00:01:00,970 So here I have terminal and have navigated to the WiFi tree folder. 13 00:01:01,450 --> 00:01:08,410 So all we get to do is enter WiFi, followed by the URL of the payload that has been uploaded into the 14 00:01:08,410 --> 00:01:10,590 target machine, followed by the password. 15 00:01:10,690 --> 00:01:13,340 So go ahead and hit enter on debt and now we're in. 16 00:01:13,360 --> 00:01:15,560 So we have the weaponize web shell. 17 00:01:15,580 --> 00:01:15,850 All right. 18 00:01:15,850 --> 00:01:19,870 It gives us a more control into the Web application system. 19 00:01:20,240 --> 00:01:27,430 So what we will do now is to learn about creating back doors that would then give us an access to Shell 20 00:01:27,430 --> 00:01:29,020 inside the system. 21 00:01:29,050 --> 00:01:29,270 All right. 22 00:01:29,290 --> 00:01:34,290 So what we will do now is to enter, for example, back door, followed by reverse TCP. 23 00:01:34,810 --> 00:01:41,920 And what I can do is open up and not a terminal colonics I can enter in order to get the IP address 24 00:01:41,920 --> 00:01:42,880 or to call a Linux machine. 25 00:01:42,920 --> 00:01:48,630 So in this case, we have the IP address of one or two one six eight zero one zero six. 26 00:01:49,210 --> 00:01:55,150 And what I can do is to start up a net cat so that we have a connection and gain access to Shell so 27 00:01:55,150 --> 00:02:00,780 I can enter and see the shell that I've followed by two point number of say nine nine nine nine. 28 00:02:00,790 --> 00:02:02,020 Go ahead and hit enter on deck. 29 00:02:03,250 --> 00:02:06,100 So this will start the Netcare and on the right site. 30 00:02:06,790 --> 00:02:12,360 All I got to do is now enter discolor Linux IP address followed by the number. 31 00:02:12,640 --> 00:02:21,120 So in this case, one nine two one six eight zero one zero six Lullabye Port ninety nine. 32 00:02:21,120 --> 00:02:23,310 I go ahead and he'd enter entering that. 33 00:02:23,920 --> 00:02:24,310 All right. 34 00:02:31,930 --> 00:02:36,640 All right, so over here, sometimes it took a couple of tries for us to get a stable connection. 35 00:02:36,850 --> 00:02:37,120 All right. 36 00:02:37,130 --> 00:02:41,210 Because there could be error binding the socket, as you can see on the left side. 37 00:02:41,320 --> 00:02:41,620 All right. 38 00:02:41,740 --> 00:02:45,330 Now, we'll call Linux terminal, as you can see over here under Netcare. 39 00:02:45,700 --> 00:02:49,780 We actually have SRH dash free dot to running so I can enter. 40 00:02:49,790 --> 00:02:50,320 Who am I? 41 00:02:51,310 --> 00:02:59,020 And he says w w w dash data right in I can enter, for example, iPad D.R and you can see that we have 42 00:02:59,020 --> 00:03:04,840 gained access to zero and we can see all the network interfaces and we have the IP address of one or 43 00:03:04,840 --> 00:03:07,450 two one six eight zero two one two. 44 00:03:07,660 --> 00:03:12,820 So we pretty much a shell right now into the hacked it application system. 45 00:03:12,850 --> 00:03:13,090 All right. 46 00:03:13,090 --> 00:03:14,440 So we can do everything we want. 47 00:03:14,440 --> 00:03:20,470 We can upload falls, we can download files, we can further our tax using pulse exploitation methods 48 00:03:20,680 --> 00:03:24,190 as part of the cyber attack into the Web application system. 49 00:03:24,940 --> 00:03:29,140 So once again, I hope you have learned something valuable in today's tutorial and you have any questions 50 00:03:29,140 --> 00:03:30,430 before you leave a comment below. 51 00:03:30,670 --> 00:03:32,770 And I'll try my best to answer any of your questions. 52 00:03:32,800 --> 00:03:38,650 Aerolite, share and subscribe to the channel so that you can be kept abreast of the latest cybersecurity 53 00:03:38,650 --> 00:03:39,080 tutorial. 54 00:03:39,280 --> 00:03:40,720 Thank you so much once again for watching.