1 00:00:00,120 --> 00:00:04,170 Next to that, we are going to see you that is built with. 2 00:00:07,990 --> 00:00:17,380 So Birdwood tells us that we need to enter a website address in this lookup, and this Web site tells 3 00:00:17,380 --> 00:00:21,250 us what technologies are used in that Web site. 4 00:00:21,450 --> 00:00:23,050 It's Google dot com. 5 00:00:31,610 --> 00:00:39,050 So as you can see, the language is also using the guru.com and they are using the PSP and the putter 6 00:00:40,370 --> 00:00:49,010 and you can see the JavaScript libraries and there is also a certificate and there is robots with good 7 00:00:49,190 --> 00:00:50,810 robots that do OK. 8 00:00:53,680 --> 00:00:56,470 And if you click on this detailed technology profile. 9 00:00:58,300 --> 00:00:58,940 OK. 10 00:01:00,300 --> 00:01:05,780 OK, Tascam for create a free account, so we don't want to do that. 11 00:01:05,990 --> 00:01:11,680 No, no, I'm going to take my college website address. 12 00:01:14,630 --> 00:01:23,870 So this gives lot more information, maybe the Google have been protected, some, uh, the the technology. 13 00:01:23,920 --> 00:01:28,190 So so my car has been using the font. 14 00:01:28,190 --> 00:01:28,510 Awesome. 15 00:01:28,520 --> 00:01:33,750 And also the washer mentioned this website mentions covid-19 use. 16 00:01:33,770 --> 00:01:41,330 So they have some banner like the college is closed for today because of covid-19 and out of Dreamweaver. 17 00:01:42,710 --> 00:01:51,200 And they are using the code for the control network, the Dallas libraries, that is in jeopardy, and 18 00:01:51,200 --> 00:01:55,130 they're using these servers for the e-mail hosting providers. 19 00:01:55,250 --> 00:01:58,400 So they have direct registered in care. 20 00:01:58,790 --> 00:02:00,080 They're using these servers. 21 00:02:00,710 --> 00:02:06,920 And there is also a certificate and the service they're using is the Apache and Ingenix. 22 00:02:08,370 --> 00:02:12,580 So this is like basic information if you click on this digital technology profile. 23 00:02:14,750 --> 00:02:17,290 Kuwait is OK, let's create a free account. 24 00:02:35,310 --> 00:02:36,630 So again. 25 00:02:40,580 --> 00:02:41,570 OK, there you go. 26 00:02:42,470 --> 00:02:48,580 So with the free account, you can already use the Philcox, that means you can only enter the five 27 00:02:48,590 --> 00:02:54,350 websites after it will ask for payment, or we can have to wait for 24 hours. 28 00:02:55,520 --> 00:02:57,580 So you can see the detailed information here. 29 00:02:58,880 --> 00:03:02,160 And if you come down, you can see the framework so well. 30 00:03:02,450 --> 00:03:03,620 So that is the page. 31 00:03:03,840 --> 00:03:10,520 So this gives some more attacks first, because in BHP there are so many vulnerable functions. 32 00:03:11,030 --> 00:03:19,940 If you can manage one function to take advantage and exploit that, then you can just, uh, almost 33 00:03:20,960 --> 00:03:22,880 get the shell from the observer. 34 00:03:23,870 --> 00:03:30,130 And you can see they're also using ADEX, uh, in the server and the security, also the current JavaScript 35 00:03:30,140 --> 00:03:30,610 framework. 36 00:03:32,940 --> 00:03:40,410 And so this with website users are telling the readers about my subdomains mail that I really you see 37 00:03:40,410 --> 00:03:41,850 an ATM to register. 38 00:03:44,580 --> 00:03:51,860 So in the course of that ROTC truck model system to maintain the content control management system model 39 00:03:53,820 --> 00:04:02,940 and it is also using BHB, so like this, you can check any website and look up about the technology 40 00:04:03,630 --> 00:04:04,800 used in that website. 41 00:04:05,340 --> 00:04:11,510 It is so much potential attack surface to understand what technology is being used and what are the 42 00:04:11,820 --> 00:04:15,060 potential vulnerabilities in those technologies. 43 00:04:15,240 --> 00:04:15,610 User. 44 00:04:16,500 --> 00:04:23,970 So in that way you can just, uh, uh, go to the website and check if there are any other functions 45 00:04:23,970 --> 00:04:27,720 like file upload or some other escalators like that. 46 00:04:28,710 --> 00:04:31,100 So this is the one we said built with the dot com. 47 00:04:32,190 --> 00:04:42,930 So, uh, the Friedgen this is enough because that file lookups, if you don't want to and you want 48 00:04:42,930 --> 00:04:45,950 more workups per day, you need to purchase the plan. 49 00:04:46,770 --> 00:04:48,360 So that's what this will do. 50 00:04:48,360 --> 00:04:48,960 The dot com.