﻿1
00:00:00,710 --> 00:00:05,420
‫Now, with a previous video, we started to look for known vulnerabilities and box.

2
00:00:07,510 --> 00:00:13,930
‫And the next few videos, we're going to cover these problems and so much more, so here's another one.

3
00:00:15,480 --> 00:00:20,430
‫Now, within your reconnaissance phase, let's say that we discover the rescue like directory.

4
00:00:21,870 --> 00:00:23,640
‫And when you follow.

5
00:00:26,430 --> 00:00:31,470
‫This page will open it is, and ask you like manager interface.

6
00:00:32,630 --> 00:00:36,800
‫And you can easily get the version information from the upper part of the page here.

7
00:00:37,480 --> 00:00:38,840
‫OK, so that's how it got.

8
00:00:40,060 --> 00:00:44,440
‫Now, after detecting a version, we'll look for public exploits.

9
00:00:45,480 --> 00:00:54,330
‫So go to exploit that divide, come check verified exploit and type in the search box as you light.

10
00:00:56,650 --> 00:00:58,690
‫OK, so the exploits here are listed.

11
00:00:59,890 --> 00:01:05,050
‫Now we need to find exploits that match our escalate version on our target.

12
00:01:06,740 --> 00:01:11,360
‫So I think this local fire conclusion correlates to our version.

13
00:01:13,140 --> 00:01:14,790
‫And this is the content.

14
00:01:16,540 --> 00:01:20,470
‫And the current theme, cookie is vulnerable to Elfy.

15
00:01:21,980 --> 00:01:24,740
‫And they viewed the magic file.

16
00:01:25,620 --> 00:01:26,520
‫That's just a pelo.

17
00:01:27,550 --> 00:01:29,980
‫There are no extra files or anything else.

18
00:01:31,050 --> 00:01:33,090
‫So let's go to the manager page.

19
00:01:34,130 --> 00:01:36,080
‫Then enable Foxe proxy.

20
00:01:39,320 --> 00:01:40,940
‫From the main menu, choose something.

21
00:01:43,190 --> 00:01:47,540
‫And it will automatically request so open burb.

22
00:01:48,810 --> 00:01:54,360
‫And the request is like that, but there's no cookie information that we look for.

23
00:01:55,290 --> 00:01:56,430
‫So we'll forward it.

24
00:01:57,540 --> 00:01:59,010
‫And the response comes.

25
00:02:00,420 --> 00:02:02,950
‫And look what we have here.

26
00:02:03,960 --> 00:02:08,370
‫The server set askew, right, manager, current theme cookie.

27
00:02:09,060 --> 00:02:10,770
‫So that's great.

28
00:02:10,950 --> 00:02:11,580
‫Forward it.

29
00:02:12,520 --> 00:02:15,430
‫And now the page will request other components.

30
00:02:16,610 --> 00:02:19,940
‫And that's where we the browser, will send the current theme cookie.

31
00:02:21,520 --> 00:02:25,120
‫OK, so let's delete this value and add this one.

32
00:02:26,540 --> 00:02:31,490
‫But now I want to point out an important thing here, the null character at the end of the payload,

33
00:02:32,030 --> 00:02:34,120
‫if you don't put it in, it's going to fail.

34
00:02:35,400 --> 00:02:37,800
‫So when we look at the code, you'll know why.

35
00:02:38,850 --> 00:02:39,870
‫OK, so forward it.

36
00:02:41,090 --> 00:02:44,540
‫OK, it was very nice, we get the content of our magic file.

37
00:02:46,120 --> 00:02:48,220
‫Now, we've already seen this file, so.

38
00:02:49,280 --> 00:02:50,630
‫It's really no big deal.

39
00:02:50,650 --> 00:02:51,900
‫You don't have to see it again.

40
00:02:53,920 --> 00:02:57,370
‫So we validate and then exploit the vulnerability.

41
00:02:58,640 --> 00:03:02,750
‫Now, go to terminal, go to rescue directory.

42
00:03:03,880 --> 00:03:06,370
‫And there are files and folders here.

43
00:03:07,730 --> 00:03:14,020
‫Now, to analyze it so quickly, you can run a grip command, so tight grip as you might manage your

44
00:03:14,030 --> 00:03:18,290
‫current theme are and I and run.

45
00:03:22,140 --> 00:03:25,650
‫So this text is used five times in two different files.

46
00:03:27,170 --> 00:03:28,970
‫Now view the first file.

47
00:03:33,220 --> 00:03:35,470
‫And have a look at this part of the code.

48
00:03:36,480 --> 00:03:46,710
‫If theme variable in post request is set, the application sets the current theme cookie if the current

49
00:03:46,710 --> 00:03:48,550
‫theme cookie is already set.

50
00:03:48,570 --> 00:03:52,320
‫The application sets its value to the local theme cookie.

51
00:03:52,930 --> 00:03:54,420
‫OK, go back.

52
00:03:55,720 --> 00:03:58,150
‫And now I'm going to look for local theme.

53
00:04:00,990 --> 00:04:06,990
‫And of course, it takes a little more to analyze manually, but, you know, I'm used to it and you'll

54
00:04:06,990 --> 00:04:07,710
‫get used to it.

55
00:04:09,540 --> 00:04:12,090
‫But I think look here, the last line is interesting.

56
00:04:12,970 --> 00:04:15,900
‫It has and include function as well.

57
00:04:17,190 --> 00:04:18,780
‫So go to this file.

58
00:04:22,280 --> 00:04:25,190
‫And this line, it is here.

59
00:04:26,290 --> 00:04:32,560
‫So the application includes the value and the local theme once and the known characters we put after

60
00:04:32,560 --> 00:04:34,690
‫the payload, eliminate the rest.

61
00:04:36,170 --> 00:04:42,710
‫OK, so now you know how to get a full shell over an Alphie vulnerability.

62
00:04:44,480 --> 00:04:50,780
‫We practiced in the 11th section, I know you remember it well, that's why I'm leaving the rest for

63
00:04:50,780 --> 00:04:51,110
‫you.

