1 00:00:00,270 --> 00:00:08,640 Now, we've already discovered this you URL, so I'm passing those things and we will find an alibi 2 00:00:08,640 --> 00:00:15,530 for this version of Ask Your Manager, but doesn't mean there can't be any other vulnerabilities. 3 00:00:16,440 --> 00:00:19,590 So why don't we go ahead and open exploit DBI, dotcom. 4 00:00:20,910 --> 00:00:26,520 And there is a remote code injection for this version that we have in box. 5 00:00:27,890 --> 00:00:30,350 Now, the content of the export code is here. 6 00:00:31,550 --> 00:00:38,600 I'm sure that you don't need this file, you can accomplish it manually, so don't download it, just 7 00:00:38,810 --> 00:00:44,330 open as you like, manager interface, and then you can start by creating a new database. 8 00:00:45,430 --> 00:00:48,550 So I'm just going to name it Shell and I'm going to save it. 9 00:00:49,690 --> 00:00:51,190 Shell, that BHP. 10 00:00:52,480 --> 00:00:56,050 OK, so now quick ask you, Will, from the menu. 11 00:00:57,190 --> 00:01:02,410 And we will see this code pain, so this is where we're going to inject our payload. 12 00:01:03,930 --> 00:01:10,620 So I'm going to paste this school code and a code creates a table and adds a value. 13 00:01:11,620 --> 00:01:19,000 But the value is a bar code that executes operating system commands and it looks for net cat's directory, 14 00:01:19,930 --> 00:01:20,770 then execute. 15 00:01:21,960 --> 00:01:30,120 And the value was added, so if you click table one, then click display, you can view the entry. 16 00:01:31,820 --> 00:01:38,960 Now, you may wonder where this file is, so click Shell or your database name click options. 17 00:01:40,060 --> 00:01:43,580 And the location property will show the path. 18 00:01:44,870 --> 00:01:48,410 OK, then open this path from Firefox. 19 00:01:51,630 --> 00:01:52,890 And here's a result. 20 00:01:54,560 --> 00:01:55,700 Now view the source. 21 00:01:57,050 --> 00:02:00,440 So this is binary data and here is our result. 22 00:02:02,480 --> 00:02:05,030 OK, so now I go over to the manager interface. 23 00:02:06,020 --> 00:02:07,520 Display the table one again. 24 00:02:08,600 --> 00:02:10,250 And edit the entry. 25 00:02:11,740 --> 00:02:13,630 So instead of this input, use this one. 26 00:02:15,870 --> 00:02:19,110 The one line reverse net catch shell. 27 00:02:20,290 --> 00:02:21,040 Then save. 28 00:02:23,200 --> 00:02:23,920 Go to Sheldon. 29 00:02:25,510 --> 00:02:28,090 Oh, I forgot to open that listener. 30 00:02:32,360 --> 00:02:33,650 OK, so that's done. 31 00:02:34,740 --> 00:02:36,180 Now refresh the page. 32 00:02:38,500 --> 00:02:40,720 And Beatbox connects back to Kelly. 33 00:02:42,460 --> 00:02:45,940 So now you can type of Linux commands and. 34 00:02:46,860 --> 00:02:47,610 Hostname. 35 00:02:48,790 --> 00:02:53,680 Or quite convening a pace, this python code to get a bash style show.