1 00:00:01,720 --> 00:00:05,680 You, IMAP, does a great job with every single injection. 2 00:00:07,120 --> 00:00:12,850 So using its options, you can exploit many hard escarole injection vulnerabilities. 3 00:00:14,040 --> 00:00:17,460 So in this lesson, we're going to exploit such an injection. 4 00:00:18,930 --> 00:00:23,100 Now from the menu, open escarole injection, login form user. 5 00:00:24,150 --> 00:00:25,470 And this is a login form. 6 00:00:27,080 --> 00:00:30,380 And the developer wants to bypass this form. 7 00:00:31,410 --> 00:00:33,960 So it's the same with the login form hero. 8 00:00:35,270 --> 00:00:36,250 But the code is different. 9 00:00:37,620 --> 00:00:41,310 So when you write a wrong log in, it says invalid credentials. 10 00:00:42,190 --> 00:00:45,610 And if you type a single quote, you get a escarole error. 11 00:00:47,010 --> 00:00:50,610 And that's good because that means that we can break the syntax. 12 00:00:52,260 --> 00:00:55,050 So now we need to find the best syntax to exploit. 13 00:00:56,790 --> 00:00:58,220 But it's not that easy. 14 00:00:59,270 --> 00:01:00,410 The answers in the code. 15 00:01:01,540 --> 00:01:06,880 So it's open terminal and view askew, I underscore sticks that BHP. 16 00:01:09,160 --> 00:01:10,930 These are the regular checks. 17 00:01:12,280 --> 00:01:15,970 So scroll down to the actual part, and here it is. 18 00:01:16,880 --> 00:01:25,100 The developer makes a different thing here, so on the hero form, the developer checks the log in and 19 00:01:25,100 --> 00:01:27,650 the password in the same query. 20 00:01:29,040 --> 00:01:31,020 But on this form, it's not the same. 21 00:01:32,030 --> 00:01:37,370 The developer hashes a password provided then checks log in only. 22 00:01:38,940 --> 00:01:40,500 Now, if there is a suitable organ. 23 00:01:41,930 --> 00:01:43,730 Then they compare the hashas. 24 00:01:44,710 --> 00:01:52,210 And if the hashes match, the user is authenticated and the message is printed. 25 00:01:53,160 --> 00:01:57,000 Otherwise, an error message is sent to the page. 26 00:01:58,000 --> 00:01:58,480 So. 27 00:01:59,460 --> 00:02:06,780 We can even accomplish an injection over log in, but we cannot see the output on the page, you know, 28 00:02:06,780 --> 00:02:07,200 why write? 29 00:02:08,190 --> 00:02:13,260 Because the extra check happens outside the query of the password hashes. 30 00:02:13,710 --> 00:02:15,450 OK, so go back to Firefox. 31 00:02:16,930 --> 00:02:21,730 Refresh the page for a clean view, then enable Foxe proxy. 32 00:02:22,950 --> 00:02:26,610 Now tell you something along infield and go to burb. 33 00:02:28,420 --> 00:02:29,890 So the request is here. 34 00:02:31,520 --> 00:02:33,410 OK, covid the request to a file. 35 00:02:35,150 --> 00:02:36,110 And save it. 36 00:02:37,530 --> 00:02:38,880 You can then let it go. 37 00:02:40,280 --> 00:02:43,300 We are done with burb, so open terminal again. 38 00:02:44,780 --> 00:02:50,960 And then type escarole map dash are to point to the saved request file. 39 00:02:52,050 --> 00:02:55,620 Dash plug in to test the login parameter and request. 40 00:02:57,440 --> 00:03:01,900 Of course, you can add the age parameter for a special HTP headers. 41 00:03:04,880 --> 00:03:11,030 Escarole map will read the file and fudged the login parameter in the request. 42 00:03:12,260 --> 00:03:17,390 Now, it will send exactly the same request in the file by adding the special letters. 43 00:03:18,770 --> 00:03:20,210 OK, then hit enter. 44 00:03:21,480 --> 00:03:24,130 It detects an injection for Maisky. 45 00:03:24,150 --> 00:03:24,480 Well. 46 00:03:26,030 --> 00:03:32,720 And now, because we don't provide the DBMS parameter, it asks this question, you know the answer. 47 00:03:34,090 --> 00:03:37,540 There's no need to test for other DBMS his. 48 00:03:38,530 --> 00:03:41,980 A new question, of course, tests for other types. 49 00:03:44,970 --> 00:03:48,000 So it finds different types of escarole injections. 50 00:03:49,260 --> 00:03:58,470 So accept this, accept this as well, no, don't test for others, OK, it's finalized as Google Map 51 00:03:58,470 --> 00:04:01,290 detects three types of escarole injection. 52 00:04:02,420 --> 00:04:03,500 So we can go one of them. 53 00:04:04,790 --> 00:04:10,220 So just use the same query and add technique as a parameter. 54 00:04:11,690 --> 00:04:15,200 Type E, forever based escarole injection. 55 00:04:16,360 --> 00:04:17,680 And there's the result. 56 00:04:20,060 --> 00:04:22,640 So now we can use some other parameters. 57 00:04:23,710 --> 00:04:26,440 Fingerprint and banner information. 58 00:04:29,300 --> 00:04:30,770 Boy, it executes quickly. 59 00:04:32,380 --> 00:04:37,690 So the point here is escarole map uses air based techniques to get this data. 60 00:04:38,910 --> 00:04:47,910 But if we do it manually, I believe you me, it will be mind blowing, mind numbing, perhaps, anyway, 61 00:04:47,910 --> 00:04:53,220 the rest of the options you're going to want to use will be done with this technique. 62 00:04:53,220 --> 00:04:56,370 So get the current database and the user. 63 00:04:57,710 --> 00:04:59,300 And the result is here. 64 00:05:00,720 --> 00:05:07,470 So I hope you can see as well that Escorial map provides us a super usage experience.