Ethical Hacking Institute Course in Pune-India
Extreme Hacking | Sadik Shaikh

First open up Sentry MBA(if you have AIO version, do a full reset first)

Take the login url and paste it under Sitie: in sentry mba like this:
[Image: 23026b17c82a7230ca8c8dee81d89b48.png]
Then move over to “HTTP Headers” under General:
[Image: de516d9af205aec5e61cc5e6df47d299.png]

Set the Request Method to “MW”(Magic Wand):
[Image: 739e0896add06e7adde40f6d6ab8e1b1.png]

Now press the orangeish Magic Wand:
[Image: f7b9973db26fcafc903f44caddc869a8.png]

Press “Analyze Login Page”:
[Image: e5dc7393e5cc51a13c5b707e8930f5dc.png]

If the config is very easy, sentry MBA will figure out the rest(I personally often use “Refresh Cookie”)
[Image: 424c88868fa5852345aef52724115a8e.png]
[Image: ba5b93b24db86cd90bc65f8c1f8b89ee.png]

Now press the “Use Data”:
[Image: c3afd0f4a339110f298394a281ecdb7c.png]

Go to “Proxy Settings” and set proxies on or off:
BOTTOM-OTHEROPTIONS
[Image: 44483ac862954228ffee1640b600fe91.png]


Move over to “Fake Settings” right below “Proxy Settings”:
These options is the most common in my world
[Image: 693d4f25250f63d2e58ec9a15157ffad.png]

head over to “Keywords”
Our first keyword is a source failure keyword(Sentry reads the source code and looks for incorrect login keyword)
In this case that could be(If User:pass is wrong):
[Image: c0febf268ba6644dddb673be9fe10670.png]
So our failure keyword is:
[Image: 0ed05bf827771fd380dc5ddd7e8cfb76.png]

Source Success keyword is something on the source code of the page when your logged in(Often Logout/Signout or similar)
[Image: 3acd3948b7c26293a36d0632d1eec38b.png]

Now when everything is done go to “General” and “Save settings to snapshot”
[Image: 019f8c88683ee0355bd45fb6b83a43ef.png]

This will save the snapshot(Config) in your snapshot folder.

To test if the config is working go to “Tools”
[Image: 7fe2e8f610b0f832ab2c8f4328111661.png]
and go to:
[Image: 19ab34ac91abc0e569744a61335f5d34.png]

Add this:
[Image: 3375a5a1b031b6a6113b53f312a879c5.png]

Input username and password:
[Image: e120f136be8c637f667f6f3d1f2a7f8a.png]

Click the lightning and afwards press the “Debug” tap:
[Image: 702b4a2b29baa8ee00676e9adb34e439.png]


[Image: f1d80001f0f0476f75286112950f3e44.png]

If it returns Source failure(If your username:pass is wrong) or Source Success keys(If your username/:pass is correct) you have configured it correctly

www.extremehacking.org
CEHv9 CHFI ECSAv9 CAST ENSA CCNA CCNA SECURITY MCITP RHCE CHECKPOINT ASA FIREWALL VMWARE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE,Certified Ethical Hacking, Center For Advanced Security Training in India, ceh v9 course in Pune-India,ceh certification in pune-India, ceh v9 training in Pune-India,Ethical Hacking Course in Pune-India