OWASP

Course
Time
4 hours 32 minutes
Difficulty
Beginner
CEU/CPE
24

Video Transcription

00:01
Hey, everyone, welcome back to the course. So in the last video, we wrapped up our discussion on sensitive data exposure. So in this video, we're gonna start our lab on sensitive exposure. Now, this lab's gonna have three parts to it. So the first part here, we're gonna start with a tool called Nick. Do now, Nick does commonly used in actual penetration testing. And we use that in the information gathering or the
00:21
foot priming
00:21
top of stage
00:23
and then purchase. Gonna be using a tool called Dirt Buster. So we're gonna basically be looking for any files or directories on the on the particular website which again, is gonna be the material a day and then finally apart. Three. We're gonna just take a look at a quick air message and see if with that air message, if there's any sensitive data that's being exposed to an attacker,
00:41
So let's go ahead and get started now. You should be already loved into the cyber environment,
00:45
and I already got the lab launch here. Just look for a lost in the catalog and click on the broken authentication lab, and we'll go ahead and launch that
00:53
now. May take up the, you know, 30 40 seconds, sometimes up to a minute to launch the lab. So just be patient with it. Eventually, it should launch for you.
01:00
Once it opens up, you're gonna see a papa Boxing. No notice. We see that a lot throughout this entire course with labs. We'll see this little popular box here and especially just give me a little background on the particular scenario for this lab. Which again, I've kind of giving you the information that will be covering in the lab. But you're welcome to read through this information as well.
01:19
Now, all we have to do to close these pop ups is just click on next and then, Okay, that'll take us to the Cali linens, lug and screen.
01:26
Once we're there, you'll notice a couple of the pop ups that we may or may not see throughout this entire course weaken this ex out of those those again or just kind of telling us about this particular environment for the lab and giving us some good information.
01:38
What, at the log in screen here for Callie, we're actually gonna use the user name of student and a password of student as well. So differs. Then, if you have the Calley running on your own virtual machine, the difference here is we use a different log in for this particular stuff.
01:52
So just type in student all over case, and then either click next, more press, Internet keyboard and then student again for the password and again either Sign Energis Press Internet keyboard
02:01
and it gets logged into the Cali machine.
02:04
Now take it. Might take a moment or so to pull up the desktop for us here. Once it does, we're gonna go ahead and disable the screen lock feature on, and I'll show you how to do that in just a moment. And as I've mentioned before,
02:16
I show you that basically every single lap on this course, so that way, if you're not familiar with how to do it or at least buy after a couple of labs, you'll have a good a good amount of muscle memory built of just going in and disabling the screen lock feature again. The rationale behind that is we don't want the lab to lock out in case we take a pause, you know, and run, grab a sandwich or something like that.
02:37
We want the lab to stay locked in.
02:38
If it times out on you, you're generally speaking. You normally have to reboot the Cali machine, or you have to just cancel out the lab and give and go back into it. So I don't want either of the situations that happen to you. So let's just go ahead and disable the screen lock feature.
02:53
So the way we do that is we just click this arrow at the very top right of R. Kelly desktop.
02:59
And then we select this icon here, the settings icon down at the bottom left.
03:01
It's gonna take about 4 to 5 seconds or so, and then it's gonna open up a little window for us, and we'll see privacy as an option there
03:08
so you'll see privacy right here where it's gonna go and click on that. It's down near the bottom left.
03:13
Next we'll click on screen lock. It's gonna open up a pop up for us, and then we just want to make sure this little circle right here we want to make sure we bring that all the way to the left. Just like that.
03:23
So once we've done that. It's technically disabled. The screen lock.
03:27
So what is gonna x out of that
03:29
and then x out of this one as well? And now we're ready to actually begin our lap.
03:34
So let's go back to our lab document here. So with one head in law again, we disabled the screen lock feature. Now we're here at step six in the step by step guide here again, these guides are available for download on the supplemental resource is sections will be sure to do so. In addition to that, there's other items in the supplementary sources
03:50
that will be helpful for you and understanding. Oh, hospice Wallace, in practice, quick questions
03:54
to help you retain your knowledge.
03:57
All right, so the first thing we're gonna do here is launched the terminal window. So we're just gonna click this little black icon here on the top of left? Going click on that is gonna launch the terminal window for us.
04:08
I might take a second or so to launch. It doesn't usually take too long.
04:13
All right, now we're gonna go ahead and run, Nick dough, So we're gonna run Nick toe
04:15
space dash host, and then we'll put this Eurail right in here again. We're gonna take this step by step, so we're gonna start off by just typing. And Nick does space dash hosts.
04:26
Let's go ahead and do that now. So this type of nick toe space dash host,
04:30
all right? And now we're gonna type in our u R l So the http colon, Ford's last Ford slash Mattila day four slash Mattila day forward slash So it's going type that in now. So, http
04:43
colon forward slash forward slash you till today
04:46
Forts last me till today again
04:48
and then we'll end with a Ford Slash once you type that and just go ahead and hit Internet keyboard
04:55
and it's gonna go ahead and run, Nick, no. Now, this might take some time, generally speaking, and may take up to, like, 30 seconds or so. So it's not a whole lot of time, but eventually it's going to stop and take you back to this DEA command prompt. And then we're gonna look through the nick toe results
05:08
so we'll let that kind of run in the background there.
05:12
So as I mentioned here in my taking you up to 30 seconds generally speaking. It's usually about like, 10 to 15 seconds. In most cases. Again, that varies on your connection speed and that sort of stuff.
05:23
So we see it's still running the background. There should be wrapping up pretty quickly just based off the output that is given.
05:28
So we should see it closing out in just a second here. And then once it finishes, we're gonna take a look through the output and just see if we noticed a robot stock t x t file. We want to see if that's in the results that also we want to see if Nick was able to fund find this particular file.
05:46
All right, so you see, as I was kind of digressing, they're a bit we see that it has stopped on my end. Now, if yours has not stopped yet, feel free to pause the video and then write yours, run all the way, and then go and start the video again. That way you could follow along and we don't go too fast and go beyond where you're
06:00
all right. So we went ahead and ran that command. If you remember, we're gonna go ahead and look for the robots. Don t x t five I want to see if that's been found.
06:08
I know from experience that I want to scroll all the way up to the top here.
06:13
However, if you want to look through everything near the bottom and scroll your way up, you certainly can do so. Um
06:17
but you'll see her in a second. The rationale of why I'm just going to the very top.
06:23
All right? So as we look through our output here, so we've up here is where we ran our command.
06:29
We looked through output here. What you're gonna notice is right here we see robots. That t x t. Right?
06:35
So that was a pretty easy question to answer. Right, So we see. Do you see robots? That t x t file of the results? Of course we do. Right
06:43
now. If you're not familiar with robots, don't teach defile when we kind of talked about it in some other labs in the course. But if you're not familiar with it, this is basically a file. Let's say I had a website and I didn't want Google to crawl certain directories of my website because I wanted, you know, of course, to be secure or whatever.
06:59
So I would put in the Ross that text file like, Hey, don't don't crawl. These particular directories Google and then Google would know not to crawl it. Now, the downside of that is an attacker could get that Robots that t x C file, take a look at it and say, Oh, I wonder what these directories are, right? Like they don't want him shown in search results. So they must be something important. So then they can go target that. So
07:17
this kind of the whole rationale why we
07:19
would wanna look for that particular file as an attacker and see what we can do with it.
07:27
I'm gonna go ahead. And Paul's a video there were gonna pick back up in the next video with the last few steps of this particular lab.

Up Next

OWASP

Established in 2001, the Open Web Application Security Project (OWASP) offers free security tools and resources to help organizations protect critical apps. Cybrary’s OWASP training course covers the organization’s popular “Top 10” risk assessment.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor