1 00:00:00,730 --> 00:00:02,020 Contact forms. 2 00:00:03,360 --> 00:00:12,240 Need I say more before Twitter and other social media applications and their widespread use, there 3 00:00:12,270 --> 00:00:13,860 were contact forms. 4 00:00:14,790 --> 00:00:21,030 And now people choose to tweet directly to the company or organization or whatever it is. 5 00:00:22,070 --> 00:00:29,960 So, yeah, I'm being a little glib, I realize that there are contact forms still in use, widespread 6 00:00:29,960 --> 00:00:32,060 actually in different Web applications. 7 00:00:33,530 --> 00:00:38,090 And it's possible to use the emailing system behind such a form. 8 00:00:39,430 --> 00:00:42,940 All right, so in this lesson, we are going to try such a scenario. 9 00:00:43,750 --> 00:00:46,780 So I want you to open Caleigh and it's always a law going to be web. 10 00:00:48,040 --> 00:00:49,750 Over the mail, heter injection. 11 00:00:51,950 --> 00:00:59,060 Now, due to an overused protocol, the name can change, so for this one, you can use the same TP 12 00:00:59,060 --> 00:01:01,300 mail header injection as well. 13 00:01:02,950 --> 00:01:06,700 Anyway, it is a simple contact form. 14 00:01:07,820 --> 00:01:09,200 At least you can think it is. 15 00:01:10,500 --> 00:01:14,670 All right, so let's view this source to control for anything suspicious. 16 00:01:16,160 --> 00:01:17,870 Well, there's nothing to see here. 17 00:01:19,280 --> 00:01:22,340 So first, I want to show you the configuration here. 18 00:01:23,870 --> 00:01:25,520 So view settings dot BHP. 19 00:01:26,750 --> 00:01:31,490 So here's my SMTP configuration, I'll just change it to these values. 20 00:01:32,640 --> 00:01:36,600 Because a few times I've gotten some errors, but this works fine. 21 00:01:37,660 --> 00:01:40,810 OK, so now let's give you the male injection page. 22 00:01:43,280 --> 00:01:49,850 And it validates the email address that you enter for medium level as well as high. 23 00:01:51,760 --> 00:01:53,040 Then set the e-mail server. 24 00:01:54,900 --> 00:02:00,690 So then if the level is set to high, it uses another function called mail check to. 25 00:02:01,970 --> 00:02:05,540 Then it creates the male body and sends it off. 26 00:02:06,690 --> 00:02:11,250 So male check two is in this file, and I'm going to find it. 27 00:02:13,210 --> 00:02:14,330 Well, that didn't take long. 28 00:02:14,350 --> 00:02:14,860 Here it is. 29 00:02:16,270 --> 00:02:21,130 So it decodes the date and then uses a built in function to validate the email. 30 00:02:22,110 --> 00:02:23,940 OK, so go back to Firefox's. 31 00:02:25,290 --> 00:02:26,940 Enable Foxe proxy. 32 00:02:29,750 --> 00:02:31,040 Fill in the form. 33 00:02:32,200 --> 00:02:33,930 I'm going to use this email address. 34 00:02:35,130 --> 00:02:35,910 And then send. 35 00:02:37,380 --> 00:02:39,870 So Berp will capture the request for us. 36 00:02:40,890 --> 00:02:42,390 And here is the data. 37 00:02:44,290 --> 00:02:49,780 And then at the back end, the server will use this email address as the sender, Zewail. 38 00:02:51,080 --> 00:02:56,840 And it will send the email to be Web recipient at mail later dot com. 39 00:02:58,450 --> 00:03:01,900 And we can send the request to the repeater for using later. 40 00:03:02,990 --> 00:03:04,000 And then let it go. 41 00:03:05,420 --> 00:03:09,800 So now go to the Web recipient's inbox and mail Nader dotcom. 42 00:03:10,940 --> 00:03:12,530 And here's the email. 43 00:03:13,820 --> 00:03:19,640 And this is all the email information subject and from headers are very important to us. 44 00:03:20,590 --> 00:03:22,890 Actually, we can modify. 45 00:03:23,890 --> 00:03:27,200 Only from the header for metadata, that's OK. 46 00:03:27,580 --> 00:03:31,180 So go back to Berp and let's open the repeater tab. 47 00:03:32,270 --> 00:03:40,880 I'm going to inject some male headers into this request, so type percent sign zero, a, C, C, call 48 00:03:40,890 --> 00:03:44,280 in other inbox at WIRB mail dot com. 49 00:03:45,330 --> 00:03:47,460 And the percent zero A. 50 00:03:48,480 --> 00:03:51,630 And that's the carriage return character, by the way. 51 00:03:53,080 --> 00:03:53,770 And then send it. 52 00:03:56,090 --> 00:04:04,410 And we get a response, so as you can see, the mail is sent, so now it's go to chrome and open WIRB 53 00:04:04,430 --> 00:04:05,450 mail dotcom. 54 00:04:12,050 --> 00:04:14,120 And in another inbox. 55 00:04:17,130 --> 00:04:20,340 Here's the email, so look at the headers. 56 00:04:22,130 --> 00:04:26,180 So this inbox is present in the header. 57 00:04:27,350 --> 00:04:29,030 OK, so go back to burb. 58 00:04:31,030 --> 00:04:37,030 So these kinds of vulnerable forms can be used to spread fishing males and just all kinds of dreadful 59 00:04:37,030 --> 00:04:37,450 stuff. 60 00:04:39,670 --> 00:04:45,790 So now we can do a quick example, you can create a phishing email body by yourself. 61 00:04:47,180 --> 00:04:54,050 But for me, I'm going to use some templates that I happen to have found on GitHub, so when Firefox 62 00:04:54,050 --> 00:04:55,100 and go to this address. 63 00:04:56,370 --> 00:04:58,500 Now, if you scroll down, you're going to see the templates. 64 00:04:59,700 --> 00:05:01,920 There are different email templates here and. 65 00:05:03,150 --> 00:05:07,770 OK, so I'm going to choose basic full plan looks like this. 66 00:05:10,090 --> 00:05:13,620 Now, I think it's a simple and convincing template. 67 00:05:13,690 --> 00:05:14,800 Yeah, so download it. 68 00:05:16,360 --> 00:05:19,360 And it's in the downloads folder, so extract the files. 69 00:05:21,210 --> 00:05:29,130 Now go to the template code under this directory and open the HTML document with a text editor. 70 00:05:32,230 --> 00:05:34,660 Copy the source and go back to burb. 71 00:05:36,400 --> 00:05:37,780 Open the decoder tab. 72 00:05:39,130 --> 00:05:40,030 Pasted here. 73 00:05:41,030 --> 00:05:46,580 And from the menu on the right to choose your URL and code, then. 74 00:05:47,730 --> 00:05:50,100 Copy the encoded output. 75 00:05:51,040 --> 00:05:52,570 Go back to the repeater tab. 76 00:05:54,090 --> 00:05:55,110 Delete this part. 77 00:05:57,520 --> 00:05:59,440 And at another return, character. 78 00:06:01,060 --> 00:06:03,070 Then add the message header. 79 00:06:05,090 --> 00:06:06,290 Pace the output here. 80 00:06:07,710 --> 00:06:08,580 Then, Sam. 81 00:06:10,820 --> 00:06:14,960 So the response came back, so that means there's no problem. 82 00:06:15,950 --> 00:06:19,490 So now go to the recipient's address and click to have a look. 83 00:06:21,390 --> 00:06:27,630 Now, I didn't add access code and I didn't want to make something else, but I can always make it pretty 84 00:06:27,630 --> 00:06:29,180 and convincing if you want to use it. 85 00:06:31,010 --> 00:06:36,170 Also, you can copy the e-mail format your customer uses and use that. 86 00:06:37,680 --> 00:06:42,690 I know people who can even click the link in this email, so people still do. 87 00:06:43,970 --> 00:06:49,790 So with a little bit of effort, you will spread a really good fishing e-mail and you'll have lots of 88 00:06:49,790 --> 00:06:50,270 friends.