1 00:00:00,970 --> 00:00:08,710 OK, we are aware of the intercept option inside of it, but we did also notice that there are other 2 00:00:08,710 --> 00:00:13,060 things here, such as intruder, repeater and others. 3 00:00:14,010 --> 00:00:15,540 What are those options? 4 00:00:16,200 --> 00:00:18,610 Well, they all have their own purpose. 5 00:00:19,140 --> 00:00:23,490 Let's first start by checking out this target's tab right here. 6 00:00:24,360 --> 00:00:31,920 So in this Target tab will be all the websites that we visited while having it as proxy in the current 7 00:00:31,920 --> 00:00:32,330 session. 8 00:00:32,790 --> 00:00:36,600 They will be listed in this left window right here. 9 00:00:37,860 --> 00:00:45,750 Let's give it a try, for example, if I go and visit Tesla Dotcom, let's first of all, make sure 10 00:00:45,750 --> 00:00:50,300 that intercept is turned off so we don't get stuck on a certain request. 11 00:00:50,310 --> 00:00:51,060 Turn it off. 12 00:00:51,570 --> 00:00:53,430 Go back to the target tab. 13 00:00:54,310 --> 00:01:01,210 And here are all the links that we visited once we tried to visit Tesla Dotcom in order for us to load 14 00:01:01,210 --> 00:01:07,480 Tesla dot com page, we had to send the request to all of these domains right here and somewhere in 15 00:01:07,480 --> 00:01:07,750 here. 16 00:01:07,750 --> 00:01:09,970 We should also see Tesla dot com. 17 00:01:10,360 --> 00:01:11,660 Let me check it out. 18 00:01:11,680 --> 00:01:12,540 Here it is. 19 00:01:12,550 --> 00:01:14,320 It's last in my case. 20 00:01:14,950 --> 00:01:21,700 And once you select it or once you select any of these links or domains in the window to the right, 21 00:01:22,090 --> 00:01:26,830 we will see all of the HTP requests that we performed with that website. 22 00:01:28,160 --> 00:01:33,670 Let's, for example, take a look at this first request, so this is the first request that we performed, 23 00:01:33,890 --> 00:01:43,580 it's us trying to get w w w teszler dot com and here the beheaders of our http get request for this 24 00:01:43,580 --> 00:01:44,030 page. 25 00:01:45,190 --> 00:01:51,270 If we wanted to check out the HTP response, we can take a look at this right window right here. 26 00:01:51,700 --> 00:01:54,430 This is the response to our HTP request. 27 00:01:55,240 --> 00:02:02,830 We can scroll all the way down and we will be able to see the HTML code of Teszler dot com page, which 28 00:02:02,830 --> 00:02:04,210 is this one right here. 29 00:02:05,460 --> 00:02:07,330 We can print it out like this. 30 00:02:08,070 --> 00:02:15,600 We can also take a look at the raw headers right here as well as the code, and we can also press the 31 00:02:15,600 --> 00:02:16,500 render option. 32 00:02:16,500 --> 00:02:19,890 And this will render the HTML code of that page. 33 00:02:19,890 --> 00:02:24,570 And we should be able to see the page right here in just a couple of seconds. 34 00:02:25,960 --> 00:02:33,280 And here it is now, it doesn't look quite that good as it does look right here, but nonetheless, 35 00:02:33,280 --> 00:02:34,690 it tried to render it. 36 00:02:35,780 --> 00:02:42,720 OK, now let's check out these actions right here, but let's check it out on our TV page. 37 00:02:42,830 --> 00:02:47,140 So let's visit our Alaskan BBWAA machine. 38 00:02:47,960 --> 00:02:51,290 Let's navigate once again to this Steve apage. 39 00:02:52,550 --> 00:02:59,780 And once it floats, let us first log out just in case, because we did log in last time we used this 40 00:02:59,780 --> 00:03:06,110 application, and if we go to our targets tab now, we should see somewhere our own virtual machine. 41 00:03:06,330 --> 00:03:08,270 And in my case, here it is. 42 00:03:08,540 --> 00:03:11,600 You should see just the IP address of your Auvers machine. 43 00:03:12,230 --> 00:03:16,520 And you can see once we have the render tab, it does render out the page for us. 44 00:03:17,240 --> 00:03:24,470 But let's go back to the printed response, which will give us the HTP response headers as well as the 45 00:03:24,470 --> 00:03:25,280 HTML code. 46 00:03:26,060 --> 00:03:29,570 Now let's try to find a request where we visit TV w a. 47 00:03:30,790 --> 00:03:33,050 And let's see it right here. 48 00:03:33,070 --> 00:03:35,380 I do believe it's this one. 49 00:03:35,650 --> 00:03:36,990 Let us check out. 50 00:03:37,930 --> 00:03:43,420 And if you don't want to scroll to all of these requests, what you can do is you can just turn on your 51 00:03:43,420 --> 00:03:47,290 intercept and specify once again, incorrect username and password. 52 00:03:47,530 --> 00:03:54,170 And once it intercept this request, you can click on action and let's go with repeater. 53 00:03:54,170 --> 00:03:56,260 Let's send to repeater. 54 00:03:57,260 --> 00:04:02,370 As soon as you click on that, you will see this repeater tab light up, it will become orange. 55 00:04:03,260 --> 00:04:10,220 So for now, we can turn off int., we can navigate to the repeater and there we should be able to see 56 00:04:10,490 --> 00:04:11,720 our request. 57 00:04:12,140 --> 00:04:12,890 Here it is. 58 00:04:13,640 --> 00:04:19,459 Now, what you can do with the repeater is you can send a certain request as many times as you want. 59 00:04:19,700 --> 00:04:26,480 For example, I can try to send this request and in the right we know we will get the response. 60 00:04:27,320 --> 00:04:29,840 Now, you might notice something weird right here. 61 00:04:29,870 --> 00:04:32,540 We're not getting the HTML code down here. 62 00:04:33,410 --> 00:04:34,830 So what does this mean? 63 00:04:35,150 --> 00:04:39,950 Well, if we take a look at this response a little bit better, we're going to see that we didn't get 64 00:04:39,950 --> 00:04:44,030 the code of two hundred, which means that the page loaded successfully. 65 00:04:44,450 --> 00:04:46,700 We got the code of three hundred and two. 66 00:04:47,360 --> 00:04:53,260 And once this happens, this usually means that you're about to get redirected to a certain page. 67 00:04:53,690 --> 00:05:00,680 In that case, we can click on this button, follow redirection and it will redirect us to the page. 68 00:05:01,220 --> 00:05:07,850 As we can see now, we have the HTML code and since we submitted the username and password of test, 69 00:05:08,150 --> 00:05:13,820 we get the log failed the message, which is the same message that we have right here, we specified 70 00:05:13,820 --> 00:05:15,380 incorrect username and password. 71 00:05:16,100 --> 00:05:19,670 So we can also do the same thing that we did with intercept. 72 00:05:19,700 --> 00:05:21,150 We can also do it in repeater. 73 00:05:21,170 --> 00:05:25,330 We can change the incorrect username and password to the correct username and password. 74 00:05:25,760 --> 00:05:30,560 For example, let's go to the intercept turned on. 75 00:05:31,990 --> 00:05:34,030 Let's forward these packets. 76 00:05:35,390 --> 00:05:41,510 Or let me just do it like this, I'm going to type test and then test, turn on the intercept. 77 00:05:42,570 --> 00:05:44,550 And click on login. 78 00:05:45,540 --> 00:05:54,810 Now, let me go and find this specific request for the TV page, and here it is now let's send it once 79 00:05:54,810 --> 00:05:55,890 again to the repeater. 80 00:05:56,820 --> 00:06:02,510 Turn off the intercept, go to the repeater, and here we will have once again this request. 81 00:06:02,700 --> 00:06:06,830 Now you can change any thing that you want in this request. 82 00:06:06,840 --> 00:06:14,460 For example, we can see the user agent tab right here that says Mozilla 5.0 and says the Linux version. 83 00:06:14,670 --> 00:06:16,890 It pretty much gives the information about us. 84 00:06:17,220 --> 00:06:24,090 And if you wanted to hide that information to the TV, a page and to our USB virtual machine, you can 85 00:06:24,090 --> 00:06:31,770 type, for example, that user agent is iPhone seven, for example, and leave it just like this. 86 00:06:31,980 --> 00:06:33,720 And this will get sent to the page. 87 00:06:34,560 --> 00:06:43,380 We can also change the correct details, I mean, correct usernames and passwords to admin and admin. 88 00:06:43,920 --> 00:06:48,150 And then we can send this request, remember that it will get redirected. 89 00:06:48,150 --> 00:06:54,470 So we must follow the redirection and now we shouldn't get that login failure. 90 00:06:54,960 --> 00:06:57,570 Instead, we should successfully log to the page. 91 00:06:57,570 --> 00:07:00,330 And if we go to render, it should render out. 92 00:07:00,360 --> 00:07:02,730 I logged in page, as we can see right here. 93 00:07:03,000 --> 00:07:04,770 Down here, it says user name is admin. 94 00:07:04,780 --> 00:07:08,220 So we successfully logged in, as it says, right here as well. 95 00:07:09,290 --> 00:07:15,610 You will also notice that the next request that we are about to send has the user agent of iPhone seven, 96 00:07:15,620 --> 00:07:17,810 so that is also something that we managed to change. 97 00:07:18,530 --> 00:07:19,730 How cool is that? 98 00:07:20,680 --> 00:07:28,540 OK, this is reporter, it is similar option as to intercept just here, it saves our HTP request. 99 00:07:28,840 --> 00:07:34,120 It allows us to modify it as we like and we send it as many times as we want. 100 00:07:34,870 --> 00:07:39,190 Then we can easily take a look at the response and render its HTML code. 101 00:07:39,190 --> 00:07:45,990 Right here in the next video, we will be checking out the intruder option, which is also really useful. 102 00:07:46,660 --> 00:07:47,710 See you in the next lecture.