1 00:00:00,150 --> 00:00:01,520 All right, welcome back, everyone. 2 00:00:01,530 --> 00:00:09,390 This is the session on understanding one more cool feature about Sweet that's intruder and Intruder 3 00:00:09,440 --> 00:00:13,170 is is one of the widely used feature. 4 00:00:13,320 --> 00:00:19,670 I'll tell you, for many of the many of the purpose, the most popular one is the brute force. 5 00:00:19,780 --> 00:00:22,140 OK, it's not just that. 6 00:00:22,140 --> 00:00:27,720 It's even even API discoveries equaling equal and popular as well. 7 00:00:27,870 --> 00:00:29,370 So let's get started. 8 00:00:29,760 --> 00:00:33,270 So the first thing that we need to understand is the. 9 00:00:36,660 --> 00:00:41,350 This is how the dashboard would look like when you select the intruder feature. 10 00:00:41,910 --> 00:00:49,860 The first thing is, as I told you, why it is more popular because of it, because it was being used 11 00:00:49,860 --> 00:00:51,260 for brute force activity. 12 00:00:51,900 --> 00:00:53,520 So, you know. 13 00:00:53,520 --> 00:00:53,850 Right. 14 00:00:53,850 --> 00:01:02,370 I mean, brute force, you can try multiple username and password combination by making use of dictionary 15 00:01:02,370 --> 00:01:03,420 and Wallis's. 16 00:01:03,420 --> 00:01:11,700 But the next thing is that is more important is about, you know, the way we make use of it is when 17 00:01:11,700 --> 00:01:15,640 we send a list of B requests with payloads. 18 00:01:16,050 --> 00:01:23,940 So what happened is the way we when we send when we make use of any brute force tools, we create a 19 00:01:23,940 --> 00:01:24,510 dictionary. 20 00:01:24,510 --> 00:01:24,950 Right. 21 00:01:24,960 --> 00:01:25,920 Exactly the same. 22 00:01:26,580 --> 00:01:34,890 But so we create payloads and this payloads are sent but multiple requests to the servers or to the 23 00:01:34,890 --> 00:01:36,020 targets basically. 24 00:01:36,360 --> 00:01:39,780 And this is something which is highly customizable. 25 00:01:40,020 --> 00:01:44,890 So you can do a lot of activities as you need to get it into it. 26 00:01:44,910 --> 00:01:45,190 Right. 27 00:01:45,540 --> 00:01:49,560 So that's how we can get started with the into the future in a way. 28 00:01:50,130 --> 00:01:56,550 Now, the most important thing to understand is the way exactly we can make use of this, OK? 29 00:01:56,610 --> 00:02:02,580 The first thing and very important thing is the when you want out first for our movie, we want to do 30 00:02:02,580 --> 00:02:04,260 a fuzzing for any one of these. 31 00:02:04,860 --> 00:02:14,970 We can send multiple send a list of blind school blind school indications and making the payload as 32 00:02:14,970 --> 00:02:15,300 well. 33 00:02:16,140 --> 00:02:24,530 And understand if that works, we can also enumerate for four for multiple use and passwords and discovers 34 00:02:24,540 --> 00:02:25,890 new APIs as well. 35 00:02:26,190 --> 00:02:34,190 And there are there are situations when we even make use of bulb's to find specific vulnerabilities. 36 00:02:34,200 --> 00:02:41,700 It could be finding it for Trauma's Patros or Trailblazer books, in fact, and even the race conditions 37 00:02:41,700 --> 00:02:44,690 to so is not limited to that. 38 00:02:44,700 --> 00:02:51,540 But there are many other stuff that that's where Bopp's to the feature can be, can be useful. 39 00:02:51,900 --> 00:02:52,300 All right. 40 00:02:52,320 --> 00:02:59,070 So this is just an idea about a theory about how this would really works in the next session. 41 00:02:59,070 --> 00:03:01,230 Will you get started with the demonstration of it? 42 00:03:01,470 --> 00:03:08,700 And going further will even make use of multiple use cases where they'll be making use of intruder for 43 00:03:08,700 --> 00:03:10,270 doing multiple activities? 44 00:03:10,290 --> 00:03:10,640 All right. 45 00:03:10,950 --> 00:03:14,520 So they'll then keep learning and recapture in the next one. 46 00:03:14,670 --> 00:03:15,150 Thank you.