Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Pwning Intranet with HTML 5

LASCON via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for exploiting intranet vulnerabilities using HTML5 in this conference talk from LASCON 2012. Delve into attack vectors, the benefits of HTML5, and the Browser Exploitation Framework (BeEF). Learn about footprinting, toolkit modules, and network discovery methods including ping sweeps, intranet footprinting, and DNS enumeration. Examine port scanning techniques that bypass security measures, and investigate inter-protocol exploitation for IRC. Gain insights into exploiting internal network vulnerabilities to achieve control, and access valuable references and links for further study in web security and penetration testing.

Syllabus

Intro
Attack vector
Why would you use HTML5?
What is BeEF? • Ber: Browser Exploitation Framework
HTML5 + BeEF
Using a technique known as footprinting
Toolkit: Modules in BeEF
Toolkit: Add your own module
Discover Internal Network
Ping sweep
Intranet footprinting Discover web servers in porte 80 and 8080 Scans for Apache, IIS. and known
DNS enumeration
Port Scanning: Beating protections Blocking example for known ports: (Firefox, WebSockets and CORS)
Port Scanning module Scan can be performed using ranges, lists or single ports Uses a med method to workaround security measures ports blocked can be stil scanned!
Network Topology
Inter-protocol: IRC
Inter-protocol: exploitation Exploit vulnerabilities within the internal network to gain control
Conclusions
References and Links

Taught by

LASCON

Reviews

Start your review of Pwning Intranet with HTML 5

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.