1 00:00:00,720 --> 00:00:07,130 In this will, we're going to take a look at this sort of attack and we also see the demo and see serve 2 00:00:07,440 --> 00:00:12,990 as a sort of crossette request for the is also called green site called forgery. 3 00:00:13,440 --> 00:00:21,540 So what in this will do is in this attack, attacker forces used to execute unwanted requests which 4 00:00:21,540 --> 00:00:23,400 result in better us are posited. 5 00:00:23,700 --> 00:00:31,860 Suppose the website offers to delete the account and you only can build the account so the attacker 6 00:00:31,860 --> 00:00:37,540 forces you to submit that delete request. 7 00:00:38,010 --> 00:00:43,490 So he does not tell you to read the request, but he will stencilling. 8 00:00:43,530 --> 00:00:49,900 So if you open the link and immediately your, uh, the account will be digital because of the background 9 00:00:50,100 --> 00:00:50,700 request. 10 00:00:51,150 --> 00:00:57,150 So in this user open selling shelbie attacker and upon opening the request on behalf of user will be 11 00:00:57,150 --> 00:00:58,020 sent to the server. 12 00:00:58,380 --> 00:01:06,540 So that sends the link to the user and user thinks it's normally and will open the request and open 13 00:01:06,540 --> 00:01:09,090 the link and the request will be sent on behalf of user. 14 00:01:09,480 --> 00:01:14,640 So this is malicious actions like money transfer, password changing and a condition, etc.. 15 00:01:14,970 --> 00:01:25,420 So if the money transfer website has been using the request to get the data, then Atticus's available. 16 00:01:25,470 --> 00:01:25,690 Right. 17 00:01:25,980 --> 00:01:34,290 So he's the variables and creates a legitimate link and then will send to the user. 18 00:01:34,320 --> 00:01:37,970 So the user normally clicks things thinking that it's a different. 19 00:01:38,640 --> 00:01:44,150 So upon clicking, the request will be sent of money transfer, a conclusion, etc.. 20 00:01:44,760 --> 00:01:52,260 So this is the theory of what this user, FedEx, uh, generally this is not a but the attacker takes 21 00:01:52,260 --> 00:01:53,250 advantage of this. 22 00:01:53,730 --> 00:01:58,760 Uh, not so the same policy security mechanism. 23 00:01:59,330 --> 00:02:01,230 So so let's go ahead. 24 00:02:01,320 --> 00:02:05,310 And, uh, so not really transform our policy. 25 00:02:05,310 --> 00:02:13,320 The controversy can be you can create a token that is, uh, sort of random, unique generation of tokens. 26 00:02:13,560 --> 00:02:21,360 And then you can use that to identify whether it's coming from the ground or it's coming from a normal 27 00:02:21,360 --> 00:02:21,840 request. 28 00:02:22,020 --> 00:02:23,620 So let's go and see a demo. 29 00:02:24,990 --> 00:02:33,230 Now, I have this multiple running and it's like this is one zero two and two. 30 00:02:33,540 --> 00:02:36,720 We are going to perform on this digitally. 31 00:02:37,590 --> 00:02:41,160 So the admin and type in the password. 32 00:02:43,700 --> 00:02:49,910 So now what I want to do is we're going to see Caesar and here you can change the posture of the. 33 00:02:51,110 --> 00:02:54,540 So this he's vulnerable to ensuring that Caesar protects. 34 00:02:54,890 --> 00:03:03,350 So let's create a new password that is already set b, m, b. 35 00:03:04,190 --> 00:03:11,510 So we are going to change that to them so successfully, that rogo and segment. 36 00:03:13,570 --> 00:03:18,370 And so camp is working right now, minority. 37 00:03:18,400 --> 00:03:25,060 My brother has been said to proxy, as you guys can see here, post request of the campaign. 38 00:03:25,430 --> 00:03:30,260 And before that, let's see the request, as you guys can see here. 39 00:03:31,300 --> 00:03:32,340 Yes, there you go. 40 00:03:34,620 --> 00:03:41,560 So let's change again the buzzword that's nickel and. 41 00:03:42,960 --> 00:03:52,050 And this time we intercept the request, let's click on Change and now we can see there is a request 42 00:03:52,560 --> 00:03:55,410 and the you are a little bit vulnerable. 43 00:03:55,440 --> 00:03:57,750 This is, of course, a question mark. 44 00:03:57,750 --> 00:04:05,520 And the word was a possible new is question and password confirmation is was legal and just bullshitting. 45 00:04:07,050 --> 00:04:12,570 So these are the three variables you need to concentrate parser parser conventions. 46 00:04:16,440 --> 00:04:20,380 All right, now let's get this into a path to normal to process the request. 47 00:04:20,430 --> 00:04:25,410 So what we're going to do is we are going to right click on this quick on this engagement tools and 48 00:04:26,100 --> 00:04:31,980 to serve people see proof of concept to really this is only for promotionally. 49 00:04:32,010 --> 00:04:37,760 So what I'm going to do is I'm just going to Google and I'm just Google for of. 50 00:04:41,750 --> 00:04:42,890 SESAR people see. 51 00:04:48,710 --> 00:04:55,330 So here I will this ring scores of people, 600 or know what I want to lose, I want to see the matter 52 00:04:55,850 --> 00:04:58,390 that is the Red Sea. 53 00:04:58,400 --> 00:05:01,000 This one can see this is a good matter, right? 54 00:05:01,310 --> 00:05:02,480 So that mattered. 55 00:05:02,780 --> 00:05:05,960 And then coding and coding is multipart plaintext. 56 00:05:07,100 --> 00:05:11,360 So it's a plain text format and see the brain actually. 57 00:05:13,100 --> 00:05:15,770 OK, so now we need to give the data. 58 00:05:15,920 --> 00:05:18,500 So what data we need to do the variables data. 59 00:05:20,690 --> 00:05:31,550 Let's call people here and push it in here so this will generate a normal page with a button on it. 60 00:05:31,710 --> 00:05:37,400 So whenever the user clicks with the suggestion now that you are. 61 00:05:39,820 --> 00:05:42,370 So you are using this one identifier. 62 00:05:44,800 --> 00:05:45,850 Sollozzo. 63 00:05:48,150 --> 00:05:50,610 Copy and paste it in here. 64 00:05:54,840 --> 00:06:05,160 I think in order to do this variables, we can distribute like this, so let's see what my options are. 65 00:06:05,790 --> 00:06:08,760 So let's do this because let's say you file. 66 00:06:11,290 --> 00:06:16,780 Go downloads and you will see us Caesar's Palace open with a notepad. 67 00:06:16,870 --> 00:06:18,820 So I want to just show you this. 68 00:06:19,230 --> 00:06:20,680 This is just a simple form. 69 00:06:27,190 --> 00:06:32,980 It's a simple form where there are this password. 70 00:06:35,110 --> 00:06:40,950 So here is the password and the first one is the new password. 71 00:06:40,960 --> 00:06:43,200 And second, the textbooks used for confirmation. 72 00:06:43,840 --> 00:06:48,870 And you can see here that that method is supposed to get action is close to this one. 73 00:06:49,510 --> 00:06:57,090 So it will go to this website and you can also submit a to simply subject. 74 00:06:58,840 --> 00:07:05,710 So now what is going to do is when our users put this button submit button, then this request will 75 00:07:05,710 --> 00:07:08,060 be posted on behalf of the user. 76 00:07:08,590 --> 00:07:11,710 So let's go ahead and open this in Firefox. 77 00:07:17,060 --> 00:07:22,190 So it has been open now we have set the password to get right on, let's go. 78 00:07:25,750 --> 00:07:32,200 So let's log in again at you know, we are OK with that. 79 00:07:33,610 --> 00:07:36,520 So let's open this. 80 00:07:39,790 --> 00:07:43,260 So as you can see, the person is Nicole, Nicole. 81 00:07:43,810 --> 00:07:46,000 OK, let's change this, Nicole to Nicole. 82 00:07:46,330 --> 00:07:46,750 Nicole. 83 00:07:50,130 --> 00:08:00,900 And now we need to submit this so we need we can also hide these text boxes, but it's just for simplicity. 84 00:08:00,930 --> 00:08:02,100 I'm just showing you this. 85 00:08:02,350 --> 00:08:10,170 And here we can keep their claim for hundred dollar reward or something like that, which makes the 86 00:08:10,170 --> 00:08:13,780 user to click this submit button whenever I click this. 87 00:08:13,800 --> 00:08:16,730 As you can see, the password has been changed. 88 00:08:17,100 --> 00:08:18,420 But here it's normal. 89 00:08:18,900 --> 00:08:26,370 As you guys can see the order it's been passed on Unical to and changes change has been executed successfully. 90 00:08:26,820 --> 00:08:35,730 Let's go out and say, I know I'm going to take Nicoleta now. 91 00:08:37,500 --> 00:08:39,600 Let me just trust this. 92 00:08:41,540 --> 00:08:51,930 And now you guys can see it, I'm sending the nuclear adviser for this, we got the success we are all 93 00:08:51,940 --> 00:08:52,700 doing successfully. 94 00:08:53,040 --> 00:09:00,880 So by this, uh, right this way, you can, uh, change the password or you can also delete the account. 95 00:09:03,030 --> 00:09:09,660 So one thing you can do is you can hide this using the, you know, uh, option. 96 00:09:14,390 --> 00:09:16,010 So you can say helan. 97 00:09:17,820 --> 00:09:20,190 So to make much sturdier. 98 00:09:23,010 --> 00:09:29,940 Now, you guys can see it's normal to remove this textile so we can just keep someone like you have 99 00:09:29,940 --> 00:09:36,560 won the lottery or get a chance to win in a giveaway or something. 100 00:09:36,930 --> 00:09:40,090 No, you can just submit and possibly be set. 101 00:09:41,310 --> 00:09:43,480 So that's all for this season. 102 00:09:44,250 --> 00:09:45,420 I hope we understood.