Metasploit Unleashed. Class 2: Information Gathering and Vulnerability Scanning. Georgia Weidman Director of Cyberwarface, Reverse Space



Similar documents
1. LAB SNIFFING LAB ID: 10

Author: Sumedt Jitpukdebodin. Organization: ACIS i-secure. ID: My Blog:

IDS and Penetration Testing Lab II

1 Scope of Assessment

NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy

Vulnerability analysis

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Cyber Essentials. Test Specification

Vulnerability Assessment and Penetration Testing

During your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) /24

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

EXTRA. Vulnerability scanners are indispensable both VULNERABILITY SCANNER

Penetration Testing with Kali Linux

Lab 10: Security Testing Linux Server

How to hack a website with Metasploit

Penetration Testing. What Is a Penetration Testing?

Installing and Configuring Nessus by Nitesh Dhanjani

Armitage. Part 1. Author : r45c4l Mail : infosecpirate@gmail.com.

Lab Objectives & Turn In

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Vulnerability Assessment Lab

by Penetration Testing

AUTHOR CONTACT DETAILS

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Metasploit Beginners

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

June 2014 WMLUG Meeting Kali Linux

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Tenable for CyberArk

Audience. Pre-Requisites

Lab 3: Recon and Firewalls

April 11, (Revision 2)

CRYPTUS DIPLOMA IN IT SECURITY

Nessus scanning on Windows Domain

Penetration Testing Report Client: Business Solutions June 15 th 2015

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

Automation of Post-Exploitation

Penetration Testing SIP Services

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie

Keywords Vulnerability Scanner, Vulnerability assessment, computer security, host security, network security, detecting security flaws, port scanning.

1.0 Introduction. 2.0 Data Gathering

Lab 9: Pen Testing (NESSUS)

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Metasploit Lab: Attacking Windows XP and Linux Targets

Cyber Essentials PLUS. Common Test Specification

Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.

Intelligence Gathering. n00bpentesting.com

CIT 380: Securing Computer Systems

IDS and Penetration Testing Lab ISA656 (Attacker)

Internal Penetration Test

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

NETWORK SECURITY WITH OPENSOURCE FIREWALL

!!!!!!!!!!!!!!!!!!!!!!

Internet Security [1] VU Engin Kirda

SECURITY TOOLS SOFTWARE IN AN OPEN SOURCE ENVIRONMENT. Napoleon Alexandru SIRETEANU *

Deciphering The Prominent Security Tools Ofkali Linux

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Penetration Testing LAB Setup Guide

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Client logo placeholder XXX REPORT. Page 1 of 37

Zen and the Art Of An Internal Penetration Testing Program

Zen and the Art Of An Internal Penetration Testing Program

Firewalls. Chapter 3

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Penetration Testing LAB Setup Guide

Parallels Plesk Panel

The Nexpose Expert System

Security of IPv6 and DNSSEC for penetration testers

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Creation of Pentesting Labs

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

EXPLORER. TFT Filter CONFIGURATION

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Medical Device Security Health Group Digital Output

White Paper. Low Hanging Fruits: The Top Five Easiest Ways to Hack or Get Hacked

EVALUATION OF TOOLS FOR CYBER SECURITY

Penetration Testing - a way for improving our cyber security

Securing Linux Servers Best Practice Document

Web Application Vulnerability Testing with Nessus

Trend Micro Worry- Free Business Security st time setup Tips & Tricks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Parallels Plesk Control Panel

Transcription:

Metasploit Unleashed Class 2: Information Gathering and Vulnerability Scanning Georgia Weidman Director of Cyberwarface, Reverse Space

Information Gathering Learning as much as possible about targets Ex: open ports, running services, installed software Identify points of interest for further exploration

Dradis Note taking application Import files from nmap, Nessus etc. In Backtrack: cd /pentest/misc/dradis/server ruby script/server (starts Dradis server) ruby dradis.rb (starts Dradis console) More information: http://dradisframework.org/

Databases Metasploit supports MySQL and PostgreSQL /etc/init.d/mysql start (starts MySQL) Msf > db_driver mysql (loads MySQL driver) Msf > db_connect root:toor@127.0.0.1/msf3 (connects to database server and creates msf3) msf > db_destroy root:toor@127.0.0.1/msf3 (connects to database server and deletes msf3)

Portscanning Queries a host to see if a program is listening Ex: Browsing to a website webserver listens on port 80 Listening ports are accessible by an attacker and if vulnerable may be used for exploitation Ex: ms08_067_netapi exploits smb on port 445

nmap Port scanning and just about everything else http://nmap.org/ man nmap Ex: nmap -sv 192.168.1.0/24 -oa subnet1 (TCP version scan, all hosts 192.168.1.X, outputs multiple formats beginning with subnet1) msf > db_import subnet1.xml

MSF Axillary Portscanners msf > search portscan (shows portscan modules) scanner/portscan/syn (runs a TCP syn scan) Use auxiliary modules like exploits (use, set, exploit, etc.)

Other MSF Scanners scanner/smb/version (scans port 445 for the smb version, good way to get OS version) scanner/ip/ipidseq (searches for hosts that can be used for spoofing in an nmap idle scan) scanner/ssh/ssh_version (queries the ssh version) scanner/ftp/anonymous (anonymous ftp login) scanner/snmp/community (queries for snmp info)

MSSQL Auxiliaries MSSQL TCP port can change, UDP port is 1434 Msf> search mssql (shows all mssql modules) scanner/mssql/mssql_ping (queries UDP 1434 for information including TCP port) scanner/mssql/mssql_login (tries passwords to log into mssql) admin/mssql/mssql_exec (logs into mssql and executes a command (ex: add a user))

Password Sniffing: Psnuffle auxiliary/sniffer/psnuffle Sniffs passwords similarly to Dsniff Supports pop3, imap, ftp, and HTTP GET Set Rhost to the host whose credentials you want

Vulnerability Scanning Query systems for potential vulnerabilities Identify potential methods of penetration Ex: SMB version scan in information gathering returned port 445 open and target Windows XP SP2, scan for ms08_067_netapi vulnerability

SMB Login Given a set of credentials what systems can they access? Very loud! Use with caution scanner/smb/smb_login Set SMBUser amd SMBPass to the credentials

Open VNC and X11 Remote GUI sessions should require credintials If misconfigured may be accessible without scanner/vnc/vnc_none_auth scanner/x11/open_x11

NeXpose and Metasploit Rapid7's vulnerability scanner http://www.rapid7.com/vulnerability-scanner.jsp Import results into MSF database or run with plugin msf>load nexpose msf>nexpose_connect root:toor@<ip> ok (ok says no ssl is ok) msf>nexpose_discover <ip> runs a scan against ip

Metasploit and Nessus Tenable's Vulnerability Scanner http://www.nessus.org msf>load nessus msf > nessus_connect root:toor@<ip> ok (ok says no ssl is ok) msf > nessus_policy_list msf > nessus_scan_new 1 pwnage <ip range> (scan using policy one, name it pwnage)

db_autopwn By default just runs all the exploits that match a given open port Not stealthy Using vulnerability data can be made smarter, matches vulnerabilities instead of ports db_autopwn -x -e

Exercises Run various nmap scans against your victim VMs inside msfconsole. Based on open ports, run MSF scanner and auxiliary modules to identify additional information and vulnerabilities. Extra mile: Install Nessus of NeXpose and do a vulnerability scan of your victim VMs inside msfconsole. Identify MSF exploits for the vulnerabilities found and try to gain a session as we learned last class.