1 00:00:00,560 --> 00:00:06,090 So here's yet another lesson on known vulnerabilities, it's almost inexhaustible, really. 2 00:00:07,280 --> 00:00:13,820 So in this lesson, we're going to exploit and other rescue like manage your vulnerability, but this 3 00:00:13,820 --> 00:00:19,370 time you're going to memorize your access knowledge and I'm going to skip the detection of rescue. 4 00:00:19,380 --> 00:00:19,610 Right. 5 00:00:19,610 --> 00:00:20,600 Manager and version. 6 00:00:21,990 --> 00:00:24,330 So right now, go to exploit database. 7 00:00:25,510 --> 00:00:28,090 And we have already listed the vulnerabilities. 8 00:00:29,240 --> 00:00:31,370 And we've even exploited two of them. 9 00:00:32,600 --> 00:00:39,740 And there are a bunch of others that match our askew white manager version B box, so there are several 10 00:00:39,740 --> 00:00:41,100 excess has vulnerabilities. 11 00:00:41,130 --> 00:00:41,450 Yes. 12 00:00:42,540 --> 00:00:43,950 So I'm going to open all of them. 13 00:00:46,130 --> 00:00:51,680 And I think this one doesn't actually work with our version on our system, so I'm just going to eliminate 14 00:00:51,680 --> 00:00:51,830 it. 15 00:00:53,240 --> 00:00:54,170 And the second one. 16 00:00:55,060 --> 00:00:56,650 All right, so this version matches. 17 00:00:58,300 --> 00:01:05,020 Now it looks like there is an excel in the DB SPL parameter in the you are Al. 18 00:01:06,310 --> 00:01:07,450 And the other one. 19 00:01:08,610 --> 00:01:12,610 But this one is only for Internet Explorer, so I'm going to skip this one. 20 00:01:13,830 --> 00:01:16,490 OK, so I'm going to look for this, your URL. 21 00:01:17,250 --> 00:01:22,860 So go to the manager interface, enable Foxe proxy. 22 00:01:24,390 --> 00:01:25,980 Now click the database. 23 00:01:28,280 --> 00:01:29,420 And go to berp. 24 00:01:30,840 --> 00:01:32,770 So the request will look like that. 25 00:01:33,630 --> 00:01:35,970 So send it to the repeater and then forward. 26 00:01:37,320 --> 00:01:38,300 Forward again. 27 00:01:40,240 --> 00:01:48,190 Another DCL parameter is in the euro, send this to the repeater as well, and then forward. 28 00:01:49,530 --> 00:01:52,080 Another request with DCL. 29 00:01:54,250 --> 00:01:56,770 And send that to the repeater and forward. 30 00:01:58,180 --> 00:01:59,950 And then go ahead and forward the rest. 31 00:02:01,460 --> 00:02:02,060 OK. 32 00:02:03,450 --> 00:02:06,570 So the page loads now up in the repeater. 33 00:02:08,060 --> 00:02:14,780 So this is the first request we sent and I'm going to paste the payload here, then send. 34 00:02:16,030 --> 00:02:20,470 And the response turns back, so type here, alert. 35 00:02:21,790 --> 00:02:23,170 And we have the payload here. 36 00:02:25,190 --> 00:02:33,020 And they can cause excess has vulnerabilities, but the last double quotes after the payload can prevent 37 00:02:33,020 --> 00:02:33,830 execution. 38 00:02:35,460 --> 00:02:37,710 So open the second request. 39 00:02:39,820 --> 00:02:41,850 And paste the payload here as well. 40 00:02:43,470 --> 00:02:44,250 Then send. 41 00:02:48,130 --> 00:02:54,760 There's no alert code in response, so this means that the payload does not work here, so we'll go 42 00:02:54,760 --> 00:02:56,500 to the third request. 43 00:02:57,970 --> 00:03:00,340 This payload here is well and send it. 44 00:03:04,160 --> 00:03:06,350 OK, so now we can see the color code here. 45 00:03:07,440 --> 00:03:12,270 And also, the exploit code shows this you, Earl, so let's try it. 46 00:03:14,530 --> 00:03:16,060 Delete this part of the URL. 47 00:03:17,230 --> 00:03:18,520 And right, the payload. 48 00:03:21,360 --> 00:03:24,660 And sure enough, the JavaScript code executes. 49 00:03:26,750 --> 00:03:31,440 But to exploit a user, this page is not very convincing. 50 00:03:31,460 --> 00:03:32,120 I don't think. 51 00:03:33,460 --> 00:03:36,400 So we are going to need to make a few changes. 52 00:03:37,610 --> 00:03:43,860 So let's copy this HTML code and we're going to prepare a payload step by step. 53 00:03:44,990 --> 00:03:47,120 So first, let's close this tag. 54 00:03:48,300 --> 00:03:50,280 Now, put in the alert code. 55 00:03:52,390 --> 00:03:57,460 And then add a script tag to put the rest between script gags. 56 00:04:01,870 --> 00:04:04,360 So paste it into the URL and go. 57 00:04:06,090 --> 00:04:06,810 This time. 58 00:04:07,820 --> 00:04:10,460 The page this way is much better. 59 00:04:12,460 --> 00:04:13,900 So will view the source. 60 00:04:17,330 --> 00:04:20,060 We can also complete the tag. 61 00:04:22,800 --> 00:04:24,090 So use this payload. 62 00:04:26,560 --> 00:04:27,340 That works well. 63 00:04:29,130 --> 00:04:29,940 View source. 64 00:04:32,950 --> 00:04:34,360 OK, this horse is better now. 65 00:04:35,690 --> 00:04:40,910 Now we can write more accurate and more powerful JavaScript payloads. 66 00:04:42,650 --> 00:04:51,500 Because the first part is complete and there's no error, so then our actual action payload comes. 67 00:04:52,630 --> 00:04:56,920 And the last script tag eliminates the remaining HTML code. 68 00:04:58,560 --> 00:05:06,060 OK, then open web developer, and now we can cookie the cookie stealer app. 69 00:05:07,180 --> 00:05:09,190 So paste this payload and go. 70 00:05:11,140 --> 00:05:13,270 But nothing sent to our server. 71 00:05:13,720 --> 00:05:15,760 OK, let me just check the payload real quick. 72 00:05:16,760 --> 00:05:18,260 OK, let's view the source code. 73 00:05:21,310 --> 00:05:22,420 Now it seems right. 74 00:05:23,850 --> 00:05:25,890 Ah, so here's our payload. 75 00:05:26,130 --> 00:05:32,790 I see what's wrong, so something happens to the plus sign at the back end. 76 00:05:33,730 --> 00:05:37,570 So we need to find a solution instead of this plus sign. 77 00:05:38,890 --> 00:05:45,100 Yeah, you probably guess what we're going to do, we can solve this problem with a JavaScript function, 78 00:05:46,090 --> 00:05:50,230 so I'll just change the plus sign to concat as our function. 79 00:05:51,940 --> 00:05:56,680 And paste our new payload into the You are Al. 80 00:05:58,500 --> 00:06:00,930 OK, so this time it sends the cookie value. 81 00:06:02,050 --> 00:06:05,470 Open up the STELARA application and refresh the page. 82 00:06:06,880 --> 00:06:07,960 There's one session. 83 00:06:09,520 --> 00:06:10,300 So log in. 84 00:06:13,300 --> 00:06:14,710 And here is a new session. 85 00:06:16,250 --> 00:06:18,080 So let's check to see if it's alive. 86 00:06:19,780 --> 00:06:20,710 And it is live. 87 00:06:23,360 --> 00:06:24,620 So go to session. 88 00:06:25,850 --> 00:06:27,860 And here is the user be. 89 00:06:29,410 --> 00:06:36,070 OK, so in this lesson, we exploited an excess of vulnerability on askew light manager. 90 00:06:37,590 --> 00:06:41,480 So we also get the BWB session ID as well.