SlideShare a Scribd company logo
1 of 19
Download to read offline
metasploitHelper
Keith Lee & Michael Gianarakis
Blackhat Asia Arsenal 2015
#whoami
@keith55
Security Consultant at SpiderLabs
@mgianarakis
Managing Consultant at SpiderLabs
Application Security
What Is This Presentation
About?
• Problems metasploitHelper tries to resolves
• How metasploitHelper works
• Problems faced during development
• Some gotchas
Problems metasploitHelper
tries to resolves
Problems metasploitHelper
tries to resolves
• There are new Metasploit modules released every
now and then. It is difficult to keep up with every
Metasploit modules that have been released.
• We do not want to miss any easy to spot
vulnerabilites during a penetration test.
• Manual penetration testing is still recommended,
this tool is meant to assist penetration testers
during tests.
Metasploit Modules
• Modules can be categorize into auxiliary and
exploit modules.
• Modules can also be categorize into HTTP URI and
port based exploits.
How metasploitHelper
works
How metasploitHelper works
Crawls the metasploit modules folder
and extracts the port numbers /
targeturi and title of the module
port numbers targeturi
Writes the results to
default-path.csv
Writes the results to
port2Msf.csv
Parses the nmap xml file and
extracts the port numbers and
HTTP(s) services
port numbers targeturi
Perform a lookup based
on the port number and
find the matching
Metasploit module
Bruteforce the targeturi
against all the HTTP(s)
services listed in default-
path.csv
Writes the results to Metasploit
resource scripts and generate
report file "report.txt".
Problems faced
Problems faced
• There are websites that blocks scripts using invalid user agent. 

The script circumvent this by faking the user- agent.
• The target web server returns a status code of 200 for all URIs.

The script attempts to tests the web server for fictious URIs. The
script does not continue with the bruteforce unless the -detect
parameter is specified. 

The script performs a match for the keywords in the page title
against that of the title of the Metasploit module.
Some Gotchas
Some Gotchas
• Some Metasploit modules do not specify the
correct TARGETURI.
• Instead, they have specified the root / as the
TARGETURI.
Demo
metasploitHelper Help Menu
Running metasploitHelper
Generated 'data' files by crawling
Metasploit modules folder
Generated report.txt contain list of matching
modules (HTTP/Port based exploits)
Running the Generated Metasploit Resource
Scripts against Target (Metasploitable VM)
Conclusion
• The script can be downloaded from https://
github.com/milo2012/metasploitHelper/.

More Related Content

Similar to metasploitHelper - Spiderlabs

Similar to metasploitHelper - Spiderlabs (20)

Unit Tests with Microsoft Fakes
Unit Tests with Microsoft FakesUnit Tests with Microsoft Fakes
Unit Tests with Microsoft Fakes
 
The Evolution of Development Testing
The Evolution of Development TestingThe Evolution of Development Testing
The Evolution of Development Testing
 
Online Spanish meetup #1
Online Spanish meetup #1Online Spanish meetup #1
Online Spanish meetup #1
 
ASP.NET MVC Best Practices malisa ncube
ASP.NET MVC Best Practices   malisa ncubeASP.NET MVC Best Practices   malisa ncube
ASP.NET MVC Best Practices malisa ncube
 
Odinstar 2017 - Real World Automating to Support Testing
Odinstar 2017 - Real World Automating to Support TestingOdinstar 2017 - Real World Automating to Support Testing
Odinstar 2017 - Real World Automating to Support Testing
 
Magento 2 Best Practice Workfow // David Lambauer // Meet Magento 2017 // Lei...
Magento 2 Best Practice Workfow // David Lambauer // Meet Magento 2017 // Lei...Magento 2 Best Practice Workfow // David Lambauer // Meet Magento 2017 // Lei...
Magento 2 Best Practice Workfow // David Lambauer // Meet Magento 2017 // Lei...
 
walkmod - JUG talk
walkmod - JUG talkwalkmod - JUG talk
walkmod - JUG talk
 
How to ace your .NET technical interview :: .Net Technical Check Tuneup
How to ace your .NET technical interview :: .Net Technical Check TuneupHow to ace your .NET technical interview :: .Net Technical Check Tuneup
How to ace your .NET technical interview :: .Net Technical Check Tuneup
 
Virtual Meetup: Mule 4 Error Handling and Logging
Virtual Meetup: Mule 4 Error Handling and LoggingVirtual Meetup: Mule 4 Error Handling and Logging
Virtual Meetup: Mule 4 Error Handling and Logging
 
MuleSoft Meetup Charlotte 2 - 2019
MuleSoft Meetup Charlotte 2 - 2019MuleSoft Meetup Charlotte 2 - 2019
MuleSoft Meetup Charlotte 2 - 2019
 
Creating testing tools to support development
Creating testing tools to support developmentCreating testing tools to support development
Creating testing tools to support development
 
Devday2016 real unittestingwithmockframework-phatvu
Devday2016 real unittestingwithmockframework-phatvuDevday2016 real unittestingwithmockframework-phatvu
Devday2016 real unittestingwithmockframework-phatvu
 
JAVASCRIPT Test Driven Development & Jasmine
JAVASCRIPT Test Driven Development & JasmineJAVASCRIPT Test Driven Development & Jasmine
JAVASCRIPT Test Driven Development & Jasmine
 
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application
Nguyen Phuong Truong Anh  - Some new vulnerabilities in modern web applicationNguyen Phuong Truong Anh  - Some new vulnerabilities in modern web application
Nguyen Phuong Truong Anh - Some new vulnerabilities in modern web application
 
Test Driven Development with Sql Server
Test Driven Development with Sql ServerTest Driven Development with Sql Server
Test Driven Development with Sql Server
 
Hot sos em12c_metric_extensions
Hot sos em12c_metric_extensionsHot sos em12c_metric_extensions
Hot sos em12c_metric_extensions
 
MuleSoft Meetup 3 Charlotte Presentation Slides
MuleSoft Meetup 3 Charlotte Presentation SlidesMuleSoft Meetup 3 Charlotte Presentation Slides
MuleSoft Meetup 3 Charlotte Presentation Slides
 
So You Want to Write an Exporter
So You Want to Write an ExporterSo You Want to Write an Exporter
So You Want to Write an Exporter
 
CTS2 Development Framework
CTS2 Development FrameworkCTS2 Development Framework
CTS2 Development Framework
 
Best Practices for Magento Debugging
Best Practices for Magento Debugging Best Practices for Magento Debugging
Best Practices for Magento Debugging
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

metasploitHelper - Spiderlabs

  • 1. metasploitHelper Keith Lee & Michael Gianarakis Blackhat Asia Arsenal 2015
  • 2. #whoami @keith55 Security Consultant at SpiderLabs @mgianarakis Managing Consultant at SpiderLabs Application Security
  • 3. What Is This Presentation About? • Problems metasploitHelper tries to resolves • How metasploitHelper works • Problems faced during development • Some gotchas
  • 5. Problems metasploitHelper tries to resolves • There are new Metasploit modules released every now and then. It is difficult to keep up with every Metasploit modules that have been released. • We do not want to miss any easy to spot vulnerabilites during a penetration test. • Manual penetration testing is still recommended, this tool is meant to assist penetration testers during tests.
  • 6. Metasploit Modules • Modules can be categorize into auxiliary and exploit modules. • Modules can also be categorize into HTTP URI and port based exploits.
  • 8. How metasploitHelper works Crawls the metasploit modules folder and extracts the port numbers / targeturi and title of the module port numbers targeturi Writes the results to default-path.csv Writes the results to port2Msf.csv Parses the nmap xml file and extracts the port numbers and HTTP(s) services port numbers targeturi Perform a lookup based on the port number and find the matching Metasploit module Bruteforce the targeturi against all the HTTP(s) services listed in default- path.csv Writes the results to Metasploit resource scripts and generate report file "report.txt".
  • 10. Problems faced • There are websites that blocks scripts using invalid user agent. 
 The script circumvent this by faking the user- agent. • The target web server returns a status code of 200 for all URIs.
 The script attempts to tests the web server for fictious URIs. The script does not continue with the bruteforce unless the -detect parameter is specified. 
 The script performs a match for the keywords in the page title against that of the title of the Metasploit module.
  • 12. Some Gotchas • Some Metasploit modules do not specify the correct TARGETURI. • Instead, they have specified the root / as the TARGETURI.
  • 13. Demo
  • 16. Generated 'data' files by crawling Metasploit modules folder
  • 17. Generated report.txt contain list of matching modules (HTTP/Port based exploits)
  • 18. Running the Generated Metasploit Resource Scripts against Target (Metasploitable VM)
  • 19. Conclusion • The script can be downloaded from https:// github.com/milo2012/metasploitHelper/.