1 00:00:01,650 --> 00:00:07,800 Now I want to show you an example of this story because in my opinion this story is much more dangerous 2 00:00:07,830 --> 00:00:08,760 in this case. 3 00:00:08,940 --> 00:00:11,980 The reason being is you don't have to send anything. 4 00:00:12,060 --> 00:00:14,900 The code will actually be executed in the page. 5 00:00:14,910 --> 00:00:21,060 Now these are just old codes that have injected the code will be execute will be stored in this page 6 00:00:21,060 --> 00:00:26,730 so that every person that just visits this page you don't have to actually send anything to any person. 7 00:00:26,730 --> 00:00:31,320 Whenever someone visits this page the code will be executed. 8 00:00:31,320 --> 00:00:36,760 Another thing is that you won't have this suspicious code in the or out. 9 00:00:36,840 --> 00:00:41,300 So again you can you can just go ahead and send this year if you really want it to someone to visit 10 00:00:41,300 --> 00:00:41,610 it. 11 00:00:41,820 --> 00:00:44,940 But the or else is just going to look as normal you are. 12 00:00:45,090 --> 00:00:51,670 And keep in mind if you find this vulnerability and a famous website or a trusted website then people 13 00:00:51,660 --> 00:00:56,440 will visit it without even thinking twice about it so they'll just click on it no problem at all. 14 00:00:57,870 --> 00:01:02,610 So we're going to inject it again the same way that we were injecting in our video about the store. 15 00:01:02,730 --> 00:01:09,460 So I'm just going to set the name to be if and then we're going to put our code in here so we're going 16 00:01:09,460 --> 00:01:10,940 to put our exploits in here. 17 00:01:10,960 --> 00:01:12,920 I'm just going to copy it again from here. 18 00:01:15,350 --> 00:01:20,480 This field actually doesn't let you write more than 10 characters I think and or 100. 19 00:01:20,540 --> 00:01:30,700 So we're just going to right click and inspect element and we get to set the max length to 500 like 20 00:01:30,700 --> 00:01:31,330 so. 21 00:01:31,480 --> 00:01:33,960 And that will allow us to write more characters. 22 00:01:34,480 --> 00:01:36,850 So just go back and paste it in here. 23 00:01:38,430 --> 00:01:40,650 And we're ready to go I'm going to sign the guest book 24 00:01:45,360 --> 00:01:46,730 OK and that should be running. 25 00:01:46,730 --> 00:01:51,840 So now you can just go ahead and send this your L instead of the suspicious one that we were seeing 26 00:01:51,840 --> 00:01:53,280 in like this case. 27 00:01:53,280 --> 00:01:58,430 So you can literally just send us your e-mail to anybody that you want your code to run on their computer. 28 00:01:58,590 --> 00:02:03,800 And once they click it you'll get them hooked to beef or you can just wait for people to visit that 29 00:02:03,810 --> 00:02:08,040 you are normally as if there wasn't that Web site or whatever. 30 00:02:08,040 --> 00:02:14,240 Once they click on that to you or else they'll be hooked to your beef and again like I said before if 31 00:02:14,240 --> 00:02:19,330 the website is famous if the website has a lot of visitors they will be clicking on that. 32 00:02:19,340 --> 00:02:25,070 Another plus is the web admin probably going to be visiting his Web site's web pages every now and then. 33 00:02:25,100 --> 00:02:29,150 So again you'll get you'll get him hooked and you'll be able to hack him. 34 00:02:29,510 --> 00:02:35,030 And then maybe gain full access to the server or the Web site through this access. 35 00:02:35,080 --> 00:02:40,080 So I'm going to go to my Windows machine and go run my browser 36 00:02:50,240 --> 00:02:53,130 and I'm going to go to the DVD. 37 00:02:53,320 --> 00:03:01,010 And I'm just going to pretend I'm a normal user so and we're going to go to DPW. 38 00:03:02,240 --> 00:03:05,230 Logon. 39 00:03:05,330 --> 00:03:10,520 So I'm just going to go on the security and I'm going to set it too low because on high end nothing's 40 00:03:10,520 --> 00:03:11,270 going to work. 41 00:03:13,230 --> 00:03:18,930 And not this now I'm going to just click on the access start so I'm just pretending to be a normal person 42 00:03:19,350 --> 00:03:21,390 browsing through web pages. 43 00:03:21,570 --> 00:03:27,900 And I'm going to just come across a web page that is vulnerable to start says I could be the web admin 44 00:03:27,900 --> 00:03:34,090 as well just clicking on my own page and you can see these are just the all the exploits the all the. 45 00:03:34,380 --> 00:03:40,290 And now this browser should be hooked without even clicking on anything suspicious again you can see 46 00:03:40,290 --> 00:03:41,310 this is normal. 47 00:03:41,340 --> 00:03:45,240 They didn't really receive anything or anybody asking them to click on anything. 48 00:03:45,240 --> 00:03:50,490 But if we go to our beef here you'll see that we have a Windows machine. 49 00:03:50,490 --> 00:03:55,500 So this is my Linux machine and you can see that we have a Windows machine here not the Windows icon 50 00:03:55,980 --> 00:03:58,430 we can see the IP address of the Windows machine. 51 00:03:59,690 --> 00:04:05,900 And this machine is hooked now so if we click on it it's online and we can run all the commands that 52 00:04:06,380 --> 00:04:07,280 allows us to do.