Thick Client | Introduction and lab setup - Day 02

 Echo Mirage

Part 1:

How to Inject the application :

Step 1: Click the DVTA application to capture the requests.


Step 2: To capture the requests.

Step 3: Click the Inject.

Step 4: Click the Backup Data to FTP Server

Part 2



Step 1: Configure the FTP 21 and Enable Intercept 


Step 2: Choose wisely, Outbound and Inbound, or Any connections of rules.


Step 3: Select Process > DVTA.exe to capture the requests.


Step 4: We can note that the injection was successful to EchoMirage.

Step 5: Analyze the requests in the EchoMirage tool.
Step 6: Continuously click OK, intercept all requests, and verify the responses of the application for records or values that were previously captured







Comments

Popular posts from this blog

Burp Suite – Automated Vulnerabilities Findings

Havij - Advanced Automated SQL Injection

SQL Injection Attacks | Shahul Hameed