1 00:00:00,280 --> 00:00:05,650 And Lou everybody when it comes to my advanced ethical hacking networking penetration testing goes 2 00:00:18,410 --> 00:00:25,430 a very good thing to know before attacking it would the kitchen is that you have to know if that Web 3 00:00:26,000 --> 00:00:33,320 is behind you firewall what I mean by that we know about the locations they have the firewall which 4 00:00:33,320 --> 00:00:43,880 is set up there so that when you try to send in mandatory spending load and then do firewalls fight 5 00:00:44,200 --> 00:00:49,300 resist against it so it doesn't let your payload into the system. 6 00:00:49,340 --> 00:00:52,860 So that's how the firewall works. 7 00:00:52,870 --> 00:00:53,740 All right. 8 00:00:53,750 --> 00:01:01,550 But in in in this machine there is a very high level tool to do think that. 9 00:01:01,550 --> 00:01:06,590 So what you have to do you have to open up your kind of UNIX machine OK you might use on your end but 10 00:01:06,590 --> 00:01:07,580 it's minimizes. 11 00:01:07,700 --> 00:01:12,700 Wouldn't you read a new worksheet now for this moment let's minimize it. 12 00:01:13,040 --> 00:01:18,920 Then what are you going to do you're going to try to open a new terminal by white clicking on this icon 13 00:01:18,950 --> 00:01:29,480 and new window then the tool is name is Love w o all f you have to really find if it is installed on 14 00:01:29,480 --> 00:01:29,980 your system. 15 00:01:29,990 --> 00:01:31,730 If not you got twin study. 16 00:01:31,760 --> 00:01:32,490 So that's. 17 00:01:32,690 --> 00:01:35,560 Let's see if it is going to start in as well. 18 00:01:35,910 --> 00:01:39,120 We knew it was a little f OK. 19 00:01:39,150 --> 00:01:39,940 It's there. 20 00:01:40,020 --> 00:01:44,240 So with application firewall detection tools tool kit that's good. 21 00:01:44,310 --> 00:01:45,360 You will we need to target set. 22 00:01:45,390 --> 00:01:45,870 Yes I know. 23 00:01:46,170 --> 00:01:54,630 So if your carry machine does it have it so you can either go to Google Google it and try to install 24 00:01:54,630 --> 00:02:03,400 it all you can of digital current UNIX machine or you can just type attitude get it install and love. 25 00:02:04,150 --> 00:02:04,470 Yeah. 26 00:02:04,480 --> 00:02:05,250 And anyway Senator. 27 00:02:05,580 --> 00:02:12,480 Well since we have these so we don't need to install it now we are going to show you how you can put 28 00:02:12,570 --> 00:02:17,770 a target website to find out if it is behind some firewalls. 29 00:02:17,850 --> 00:02:29,430 But first thing first to know oh to know the number of firewalls that you know or was tool can detect 30 00:02:29,640 --> 00:02:37,040 you can type while for the building or if and then minus error was an error. 31 00:02:37,080 --> 00:02:46,050 This is the number of your firewalls that your machine can add to your tools while you can attack it 32 00:02:46,050 --> 00:02:54,420 is oh we have perfect net net continue cloud fair code Freya which is highly known. 33 00:02:54,900 --> 00:02:55,300 Yeah. 34 00:02:55,350 --> 00:02:56,390 And many stuff. 35 00:02:56,400 --> 00:02:56,950 All right. 36 00:02:56,970 --> 00:03:03,590 So now let's try to put together target let's say that Facebook is for Target matching. 37 00:03:03,600 --> 00:03:06,390 So we take a while for that will you. 38 00:03:07,050 --> 00:03:10,810 And what we're going to type is the Facebook account. 39 00:03:10,840 --> 00:03:21,950 Now Facebook account is the Facebook Facebook Web site is Facebook com etc. and we have to wait till 40 00:03:22,010 --> 00:03:25,720 discussion is complete OK. 41 00:03:25,770 --> 00:03:26,580 Checking 42 00:03:29,690 --> 00:03:41,560 we will see if Facebook is behind you or this trial for June or for your strategy when this thing is 43 00:03:44,010 --> 00:03:57,760 come. 44 00:03:57,870 --> 00:04:00,060 It seems that something is wrong. 45 00:04:00,840 --> 00:04:12,770 It's going to be on Wi-Fi I a let's see. 46 00:04:13,200 --> 00:04:14,770 It's been 47 00:04:20,010 --> 00:04:30,940 and it's to go to or it should go continue you she would you did it to you is be that's way you have 48 00:04:30,940 --> 00:04:34,930 to change it. 49 00:04:35,200 --> 00:04:37,310 None of these I know if I can. 50 00:04:37,420 --> 00:04:41,180 So let's go here again I trying to 51 00:04:43,800 --> 00:04:47,400 try to find us if I want to be I need 52 00:04:57,540 --> 00:04:58,520 here we are. 53 00:04:59,680 --> 00:05:05,650 Jeanne Moos seems to be behind the award for US Homeland Security reason reasonability green. 54 00:05:05,690 --> 00:05:06,150 Okay. 55 00:05:06,180 --> 00:05:09,910 So we find your final result. 56 00:05:09,930 --> 00:05:13,930 So let's try to find one on our website. 57 00:05:13,960 --> 00:05:19,180 It's a it's a you know a 58 00:05:22,360 --> 00:05:34,430 it's trying to find some kind of firewall behind it. 59 00:05:34,470 --> 00:05:36,330 This is a very well known tool. 60 00:05:36,330 --> 00:05:45,210 Guys it is the most well known tool to detect the Web Application Firewall one w or f since the itch 61 00:05:45,250 --> 00:05:46,210 to be weakest. 62 00:05:46,600 --> 00:05:47,780 Which which indeed. 63 00:05:47,830 --> 00:05:56,840 Which identifies they will be given file was C O K banking is being done at connection. 64 00:05:56,890 --> 00:05:58,410 Good luck. 65 00:05:58,450 --> 00:05:59,240 Okay. 66 00:05:59,310 --> 00:06:00,570 It seems to be hey firewall. 67 00:06:01,140 --> 00:06:01,650 Yeah. 68 00:06:01,650 --> 00:06:12,450 So there's no choice to do but come on again sometimes. 69 00:06:12,600 --> 00:06:15,340 Why in sending you to be we kissed. 70 00:06:15,510 --> 00:06:18,040 Does it work then. 71 00:06:18,400 --> 00:06:19,400 Wow. 72 00:06:19,950 --> 00:06:22,990 Since the Miley shoes is GDP weakest. 73 00:06:23,010 --> 00:06:25,080 This is how it works. 74 00:06:25,080 --> 00:06:26,820 This is exactly how it works. 75 00:06:26,940 --> 00:06:35,250 If sending email issues each week gets failed then wow an ally is previews in the industry people would 76 00:06:35,250 --> 00:06:42,810 cast and use and use this simple I'm going to check in with you about the kitchen fire what is responding 77 00:06:42,960 --> 00:06:44,570 to the attack. 78 00:06:44,830 --> 00:06:48,100 If it does not compute instead including nukes. 79 00:06:48,180 --> 00:06:52,290 So you have to try first. 80 00:06:52,370 --> 00:06:56,320 As we have showed you earlier you think that they're okay. 81 00:06:56,390 --> 00:06:56,950 Rocky you are. 82 00:06:56,960 --> 00:07:01,130 If it's not there just type up to do and get it started and then you can start it. 83 00:07:02,010 --> 00:07:06,790 Okay so we're finding in this book it he's been doing that connection but get me that. 84 00:07:06,830 --> 00:07:07,200 Oh yeah. 85 00:07:07,220 --> 00:07:09,440 It has some firewood. 86 00:07:09,480 --> 00:07:10,840 Let's try this book. 87 00:07:10,850 --> 00:07:12,590 No mistake this book 88 00:07:16,180 --> 00:07:21,250 is not going off and we can try. 89 00:07:22,140 --> 00:07:25,630 No one can detect it by generic addiction. 90 00:07:25,760 --> 00:07:27,390 This means 91 00:07:29,970 --> 00:07:34,940 making this one of our minds when we try. 92 00:07:35,720 --> 00:07:41,750 If we do this they seem to be behind firewall lose and it's over we turn it into a sprint could good 93 00:07:41,810 --> 00:07:43,720 when it is trying to be good. 94 00:07:43,730 --> 00:07:45,930 The Blacklist not money we spend is too easy. 95 00:07:45,950 --> 00:07:46,590 All right. 96 00:07:46,590 --> 00:07:47,880 So good. 97 00:07:48,110 --> 00:07:56,690 So listen if you have some time before this is how we can try to find if your web application has a 98 00:07:56,690 --> 00:07:59,330 potential firewall behind it. 99 00:07:59,330 --> 00:08:00,250 Guys. 100 00:08:00,300 --> 00:08:01,860 Okay bye. 101 00:08:01,980 --> 00:08:05,300 By using a map we can try to find it as well. 102 00:08:05,630 --> 00:08:12,470 And what is in map as if we have very much elaborated on it on a previous course. 103 00:08:12,470 --> 00:08:19,670 If you didn't have it if you didn't buy it yet we encourage you to go back and try to buy the first 104 00:08:19,860 --> 00:08:31,430 course so and map is the security or DTM tool mostly used by textures by attackers or by by black hackers 105 00:08:32,060 --> 00:08:38,730 and network administrators and map is used in information gathering of the target. 106 00:08:39,500 --> 00:08:46,150 So let's try to use now to find if we can detect if your website contains. 107 00:08:46,220 --> 00:08:47,410 If I was behind it. 108 00:08:47,810 --> 00:08:49,170 So what are we gonna do. 109 00:08:49,200 --> 00:08:55,250 I'm gonna type in map map and script script equal. 110 00:08:55,490 --> 00:08:57,380 It be. 111 00:08:57,480 --> 00:08:58,970 It should be. 112 00:08:59,060 --> 00:09:04,940 Love your point and then we type the website let's say. 113 00:09:05,630 --> 00:09:08,490 Oh God do I do that. 114 00:09:08,540 --> 00:09:17,070 Come come in then senator so let's let the wheat 115 00:09:20,060 --> 00:09:28,560 kill kill we find something we find something or to kill gays and nothing suspicious. 116 00:09:28,560 --> 00:09:30,230 Let's try it on our website. 117 00:09:30,540 --> 00:09:40,190 Let's say that you try to put this this this site. 118 00:09:40,460 --> 00:09:48,720 Come see it has some fireworks with some fireworks behind it. 119 00:09:52,870 --> 00:09:53,620 No money issue. 120 00:09:53,620 --> 00:09:59,720 It takes so long so vociferous against claims. 121 00:10:00,800 --> 00:10:03,350 OK so. 122 00:10:03,530 --> 00:10:05,860 Well into his thing. 123 00:10:06,420 --> 00:10:07,740 Oh exactly. 124 00:10:07,740 --> 00:10:11,750 We missed one Dutch Scottish 125 00:10:17,430 --> 00:10:23,290 now wait a minute to see you find some. 126 00:10:26,010 --> 00:10:37,080 As you can see these parties depend on storybook its GDP as we do. 127 00:10:37,320 --> 00:10:42,010 So this tool is encouraging news. 128 00:10:42,020 --> 00:10:49,400 They are really useful but when using love without this describe it is faster much more faster. 129 00:10:49,420 --> 00:10:56,780 But it does it mean that this one does it will not give us some kind of information here we can try 130 00:10:56,780 --> 00:10:57,420 to. 131 00:10:57,440 --> 00:11:03,650 To us they did think and then we can type instead of data. 132 00:11:03,670 --> 00:11:12,940 We can type fingerprint as we showed you earlier but to detect it we sure show us some some some information. 133 00:11:12,940 --> 00:11:18,280 And then when we try to finger pointed it will certainly give us the firewall a name. 134 00:11:18,280 --> 00:11:20,080 So let's try something. 135 00:11:20,080 --> 00:11:26,080 Let's say that we will let's try to detect in this Web site. 136 00:11:26,120 --> 00:11:35,260 No don't come come come and then the presenter does what kind of information we would get. 137 00:11:35,490 --> 00:11:36,840 It's weird for this guy in 138 00:11:42,960 --> 00:11:46,570 awfully to come with some wizard. 139 00:11:46,650 --> 00:11:47,280 All right. 140 00:11:47,320 --> 00:11:49,300 You see so we get a lot of information. 141 00:11:49,330 --> 00:11:52,800 Let's let's try to be worth it. 142 00:11:52,810 --> 00:11:57,500 It says that it used to be what they take home. 143 00:11:57,520 --> 00:12:04,620 We find a lot of firewall which is great in this one. 144 00:12:04,620 --> 00:12:06,030 It is behind it. 145 00:12:06,030 --> 00:12:08,310 So document cookie scoop. 146 00:12:08,340 --> 00:12:09,310 Okay. 147 00:12:09,530 --> 00:12:18,810 So and this put 440 actually to its GDP is again do the firewall is detected. 148 00:12:19,560 --> 00:12:21,750 So we see the payload. 149 00:12:21,750 --> 00:12:23,910 We see how it is. 150 00:12:23,940 --> 00:12:24,740 Okay. 151 00:12:25,050 --> 00:12:26,730 So interesting. 152 00:12:26,760 --> 00:12:33,860 So by the way this is then the information that we did think when we try to use when we try to use its 153 00:12:33,910 --> 00:12:36,290 GDP a friend. 154 00:12:36,440 --> 00:12:37,320 I did it. 155 00:12:37,630 --> 00:12:38,060 Okay. 156 00:12:38,070 --> 00:12:44,420 So now what's a bold new fingerprint your fingerprint will give us exactly the name of that firewall. 157 00:12:44,910 --> 00:12:50,180 So let's try to have some modifications. 158 00:12:50,190 --> 00:12:53,590 Now we tell you in your point no no. 159 00:12:55,290 --> 00:13:01,730 Let's see what kind of a firewall behind it excellent. 160 00:13:01,750 --> 00:13:03,170 This is it. 161 00:13:03,460 --> 00:13:07,450 The detection of the firewall is CloudFlare. 162 00:13:07,480 --> 00:13:08,770 This is exactly. 163 00:13:08,920 --> 00:13:09,750 So by the way. 164 00:13:09,770 --> 00:13:12,460 So this is when we use any map tool. 165 00:13:12,490 --> 00:13:14,470 But if you want it doesn't matter. 166 00:13:14,460 --> 00:13:21,610 You could use a different comment that we have showed earlier and is his wife that video and or I mean 167 00:13:21,670 --> 00:13:22,800 it was your f.. 168 00:13:23,470 --> 00:13:36,320 And then you type that comment was under you we go in legal the Noto is behind it CloudFlare. 169 00:13:36,420 --> 00:13:37,760 We see it. 170 00:13:37,770 --> 00:13:42,490 It gives you exactly what you want with no more info. 171 00:13:42,540 --> 00:13:47,590 I mean we'd know more stuff if you wanted to get it for a while. 172 00:13:47,590 --> 00:13:49,950 So it gives you the name of that firewall. 173 00:13:50,340 --> 00:13:50,620 OK. 174 00:13:50,630 --> 00:13:50,890 Got it. 175 00:13:50,940 --> 00:13:59,420 So so this is how you can detect if a website or application is behind a firewall so that you can start 176 00:13:59,430 --> 00:14:00,570 your attack. 177 00:14:00,570 --> 00:14:01,070 All right. 178 00:14:01,320 --> 00:14:03,960 We really think that this video was informative for you. 179 00:14:04,020 --> 00:14:08,100 Oh we are looking forward to seeing you in the next video. 180 00:14:08,100 --> 00:14:08,670 Thank you.