Metasploit The Elixir of Network Security



Similar documents
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Penetration Testing Report Client: Business Solutions June 15 th 2015

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Foundstone ERS remediation System

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Medical Device Security Health Group Digital Output

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Learn Ethical Hacking, Become a Pentester

Web App Security Audit Services

Reducing Application Vulnerabilities by Security Engineering

Information Security Services

Fighting Advanced Threats

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

ASL IT SECURITY XTREME XPLOIT DEVELOPMENT

Penetration Testing Workshop

Microsoft Baseline Security Analyzer (MBSA)

A Decision Maker s Guide to Securing an IT Infrastructure

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

INFORMATION SECURITY TRAINING CATALOG (2015)

FORBIDDEN - Ethical Hacking Workshop Duration

Network Security Audit. Vulnerability Assessment (VA)

Firewalls and Software Updates

NETWORK PENETRATION TESTS FOR EHR MANAGEMENT SOLUTIONS PROVIDER

CRYPTUS DIPLOMA IN IT SECURITY

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Effective Software Security Management

SAST, DAST and Vulnerability Assessments, = 4

Penetration Testing //Vulnerability Assessment //Remedy

About Effective Penetration Testing Methodology

PENETRATION TESTING GUIDE. 1

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Professional Penetration Testing Techniques and Vulnerability Assessment ...

The Top Web Application Attacks: Are you vulnerable?

CYBERTRON NETWORK SOLUTIONS

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Introduction to Penetration Testing Graham Weston

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security


EC-Council Certified Security Analyst (ECSA)

locuz.com Professional Services Security Audit Services

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Security Management. Keeping the IT Security Administrator Busy

Banking Security using Honeypot

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

Vulnerability Assessment and Penetration Testing

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Incident Response. Six Best Practices for Managing Cyber Breaches.

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

Data Breaches and Web Servers: The Giant Sucking Sound

NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy

Protecting Your Organisation from Targeted Cyber Intrusion

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Information Security. Training

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

A Study on the Security aspects of Network System Using Penetration Testing

Rational AppScan & Ounce Products

Penetration Test Report

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Computer Networks & Computer Security

Integrated Threat & Security Management.

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Penetration Testing Getting the Most out of Your Assessment. Chris Wilkinson Crowe Horwath LLP September 22, 2010

Windows Remote Access

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Technical Testing. Network Testing DATA SHEET

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Need for Database Security. Whitepaper

The Business Case for Security Information Management

Impact of Data Breaches

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

TIME TO LIVE ON THE NETWORK

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

A New Era. A New Edge. Phishing within your company

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Evaluation Report. Office of Inspector General

Transcription:

Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security

And Your Situation Would Be

Main Goal Learn why and how to test computer networks against the most common but really serious security attacks using METASPLOIT

What are we going to talk about Penetration Testing Why Bother? Testing Network with - METASPLOIT Proof of Concept (Demonstration) (Mitigation Strategies) Conclusion

Penetration Testing A penetration test is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source, known as a Black Hat Hacker, or Cracker. Wikipedia Environmental Attacks Input Attacks Logic and Data Attacks

Why Bother? Active pen-testing teaches you things that security planning will not Are your users and system administrators actually following their own policies? host that claims one thing in security plan but it totally different in reality Raises security awareness Helps identify weakness that may be leveraged by insider threat or accidental exposure. Provides Senior Management a realistic view of their security posture Great tool to advocate for more funding to mitigate flaws discovered If I can break into it, so could someone else!

How dangerous are Cyber attacks October 12, 2011 Sony has suffered a data breach involving the usernames and passwords of about 93,000 customers. Attackers were able to reuse to logon to people's PlayStation Network, or Sony Online Entertainment, or Sony Entertainment Network accounts. 6 June 2012 over six million passwords were stolen in a hack of the professional networking site linkedin.com. 10 June 2012 Anonymous attacked and brought down the website run by Computer Emergency Response Team India (CERT-In), the country's premier agency dealing with cyber security contingencies

How dangerous are Cyber attacks July 12, 2012 A Yahoo security breach exposed 450,000 usernames and passwords from a site on the huge web portal indicates that the company failed to take even basic precautions to protect the data. 2012: Latest SQL Injection Campaign Infects 1 Million Web Pages with the lilupophilupop.com During the period December 2011 to February 2012, a total number of 112 government websites were hacked, Minister of State for Communications and IT Sachin Pilot told the Lok Sabha. September 10, 2012 Network World Anonymous has claimed responsibility for knocking domain provider GoDaddy offline. Source : http://openspace.org.in

Hacked out of Business

Severity Of Cyber Attacks

Current State : Network Security

Severity Of Cyber Attacks

Severity Of Cyber Attacks

Penetration Testing Application Security Application Security Review Application Security Assessment Network & System Security Secure Network Architecture & System Integration Network Security Managed Operations Security Governance & Compliance Security Management Reviews & Risk Assessment Security Policy & Process Development & Implementation ISO27001 Consulting Business Continuity / Disaster Recovery BCM & ITDR Consulting BCM Compliance Services Identity & Access Management Consulting & System Integration Support & Maintenance Managed Security Services Professional Services Remote Security Operation Centre

Diagrammatic Representation

Process of PenTest

Focusing Network PenTest

Network Security Testing

What is Metasploit According to the Metasploit Team; The Metasploit Framework is a platform for writing, testing, and using exploit code. The primary users of the Framework are professionals performing penetration testing, shellcode development, and vulnerability research. It is becoming the de facto standard for vulnerability assessment and PenTest. largest ruby project in existence Find vulnerability ->choose exploit -> check if exploit applies -> configure payload -> configure encoding to evade IDS and AV-> execute the exploit Includes an extensive shell code and opcode database with full source code.

What is Metasploit To understand the use of Metasploit we have to understand the some basic terminologies. Vulnerability The word vulnerability, refers to a weakness in a system allowing an attacker to violate the confidentiality, integrity, availability, access control, consistency or audit mechanisms of the system or the data and applications it hosts. Exploits An exploit is a security attack on a vulnerability Can exploits give access to a secured system? Ans: NO

What is Metasploit Exploits have more potential They are commonly used to install system malware or gain system access or recruit client machines into an existing botnet This is accomplished with the help of a Payload The payload is a sequence of code that is executed when the vulnerability is triggered Payloads are very useful because they provide an interactive shell that can be used to completely control the system remotely To make things clear, an Exploit is really broken up into two parts, EXPLOIT = Vulnerability + Payload

Hot Spots In a network, filtering and complex rules are generally applied on the basis of these basic factors TCP or UDP Source IP address Source Port Number Destination IP address Destination Port Number Now we have and Metasploit at our disposal and now we also have the HOT SPOTS to target the NETWORK. I

SAMPLE PENETRATION TEST *Note: Demonstration of the Penetration Test is only for the Research Purposes DON'T BE IRRESPONSIBLE...SERIOUSLY USE OF THESE TOOLS ON MACHINES NOT LEGALLY OWNED BY YOU COULD END UP PUTTING A NASTY MARK ON YOUR CRIMINAL RECORD This is not a live demo or real scenario of a Network Pentest. Network is emulated which is really close to the Real One

The Attack To conduct a Software Exploitation Attack using Metasploit Framework against a Victim machine in order to gain system access To make things interesting, the Victim s machine will also have AV in order to see how it reacts to the attack. We use MS08-067 exploit Critical - CVE-2008-4250 MS08-067 is Vulnerability in Server Service Could Allow Remote Code Execution (958644) On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code

Outline of Network Topology emulate the real time network we created network of three virtual machines on WIN 7 Host Machine. VICTIM -WinXP Machine with SP2 and SP3 Flavor Ip.addr = 192.168.242.132 VICTIM -WinXP Machine with SP3 and AV Ip.addr = 192.168.242.133 Attacker Back Track 5 r3 with Metasploit Ip.addr = 192.168.242.134

Tools: Used in the PenTest Automatic tools are required to detect and exploit the vulnerabilities quickly to save crucial amount of time. You can use the following Tools: Nmap 6.01 Hyperion for Exploit /Payload Encryption Havij can be used to detect SQL injection on the website hosted target using network SQL Inject Me (FireFox AddOn) Acunetix Web Vulnerability Scanner

DEMO

Evaluate Impact on the Network and Reporting It reveals the information about all the existing vulnerabilities in the network. How deep a hacker can go inside the Network. How much data can be lost or altered. Report them accurately

Recommended Countermeasures Discipline Code review QA Test Plans Test with an intruder s mindset Periodic Penetration Testing

Recommended Countermeasures(Contd.) Best Practices Use principle of least-privilege Use names should be harder to guess Use aliases to provide more layers of separation between the data and the intruder Keep up-to-date on patches Escaping all User Supplied Input Use third-party code and applications evaluation services for greater scrutiny

Conclusion

Thank You