Now Pwn at a pufff….
 
 
<ul><li>Metasploit Framework </li></ul><ul><li>metaPwn </li></ul><ul><li>FastTrack </li></ul><ul><li>Armitage – The new an...
<ul><li>Metasploit  -  The single most powerful tool available today for the Penetration testers. </li></ul><ul><li>Used f...
<ul><li>Lib :  the ‘meat’ of the framework code base. </li></ul><ul><li>Data :  editable files used by Metasploit </li></u...
 
 
 
 
<ul><li>The most popular and best way to use Metasploit Framework. </li></ul><ul><li>Efficient and wide access to all the ...
<ul><li>It is very importand that you analyze your target </li></ul><ul><li>The scan results (generally by nmap) are very ...
<ul><li>Search  </li></ul><ul><li>Tab Completion. </li></ul><ul><li>Check </li></ul><ul><li>load </li></ul><ul><li>Connect...
 
 
<ul><li>Know the target </li></ul><ul><li>Scan for the suspected vulnerabilities </li></ul><ul><li>Find the pertaining pay...
<ul><li>Scan and Create a database </li></ul><ul><li>Import them to metasploit </li></ul><ul><li>And “ autopwn. “       ...
 
 
<ul><li>Fast-Track is one more automated penetration suite. </li></ul><ul><li>Fast-Track has 3 modes of operation  </li></...
<ul><li>Fast-Track comes with a good interface and support </li></ul><ul><li>Tutorials available </li></ul><ul><li>Automat...
 
<ul><li>Social Engineering Tool kit </li></ul><ul><li>Comes with 10 major functions. </li></ul><ul><ul><li>Spear-phishing ...
<ul><li>All the above listed attacks make the major attacks on the contemporary sytems. </li></ul><ul><li>Lets have a deta...
<ul><li>A very well Mapped GUI for penetration testing </li></ul><ul><li>Provides a very good GUI and a map of the target ...
 
Source : http://icis2005.unlv.edu/
Source :http://telegraph.co.uk
Source :http://telegraph.co.uk
 
 
Upcoming SlideShare
Loading in …5
×

[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar

1,078 views

Published on

download metapwn at http://metapwn.sourceforge.net/

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,078
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
34
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar

  1. 1. Now Pwn at a pufff….
  2. 4. <ul><li>Metasploit Framework </li></ul><ul><li>metaPwn </li></ul><ul><li>FastTrack </li></ul><ul><li>Armitage – The new and easy convention. </li></ul><ul><li>SET </li></ul>
  3. 5. <ul><li>Metasploit - The single most powerful tool available today for the Penetration testers. </li></ul><ul><li>Used for Developing and executing exploit code against any target machine. </li></ul><ul><li>An open source ruby framework, moved from perl. </li></ul>
  4. 6. <ul><li>Lib : the ‘meat’ of the framework code base. </li></ul><ul><li>Data : editable files used by Metasploit </li></ul><ul><li>Tools : useful commandline utilities </li></ul><ul><li>Modules : the Framework modules. </li></ul><ul><li>Payloads </li></ul><ul><li>Scripts </li></ul><ul><li>External </li></ul>
  5. 11. <ul><li>The most popular and best way to use Metasploit Framework. </li></ul><ul><li>Efficient and wide access to all the options. </li></ul><ul><li>Execution of external commands is possible  </li></ul>
  6. 12. <ul><li>It is very importand that you analyze your target </li></ul><ul><li>The scan results (generally by nmap) are very useful. </li></ul><ul><li>Know the services running on the Target machine from the scan results. </li></ul><ul><li>Determine the vulnerabilities. </li></ul>
  7. 13. <ul><li>Search </li></ul><ul><li>Tab Completion. </li></ul><ul><li>Check </li></ul><ul><li>load </li></ul><ul><li>Connect </li></ul><ul><li>Irb </li></ul><ul><li>route </li></ul><ul><li>run/exploit and more …. Follow the demos >> </li></ul>
  8. 16. <ul><li>Know the target </li></ul><ul><li>Scan for the suspected vulnerabilities </li></ul><ul><li>Find the pertaining payloads. </li></ul><ul><li>Launch payloads to exploit (Attack) </li></ul><ul><li>Post Exploitation. </li></ul>
  9. 17. <ul><li>Scan and Create a database </li></ul><ul><li>Import them to metasploit </li></ul><ul><li>And “ autopwn. “   </li></ul>
  10. 20. <ul><li>Fast-Track is one more automated penetration suite. </li></ul><ul><li>Fast-Track has 3 modes of operation </li></ul><ul><ul><li>Interactive mode </li></ul></ul><ul><ul><li>GUI mode  </li></ul></ul><ul><ul><li>Console mode (obsolete) </li></ul></ul>
  11. 21. <ul><li>Fast-Track comes with a good interface and support </li></ul><ul><li>Tutorials available </li></ul><ul><li>Automates the exploitation </li></ul><ul><li>Dependent on Metasploit , so have it updated . </li></ul>
  12. 23. <ul><li>Social Engineering Tool kit </li></ul><ul><li>Comes with 10 major functions. </li></ul><ul><ul><li>Spear-phishing Attack Vectors </li></ul></ul><ul><ul><li>Website attack vectors </li></ul></ul><ul><ul><li>Infection media generator </li></ul></ul><ul><ul><li>Create a payload and listener </li></ul></ul><ul><ul><li>Mass mailer attack </li></ul></ul><ul><ul><li>Teensy USB HID attack vector </li></ul></ul><ul><ul><li>SMS spoofing attack vector </li></ul></ul>
  13. 24. <ul><li>All the above listed attacks make the major attacks on the contemporary sytems. </li></ul><ul><li>Lets have a detailed glimpse at all these services from SET…. </li></ul>
  14. 25. <ul><li>A very well Mapped GUI for penetration testing </li></ul><ul><li>Provides a very good GUI and a map of the target machines </li></ul><ul><li>Armitage also uses Metasploit framework to test on the target </li></ul><ul><li>“ Little is to be said and rest is the action”  </li></ul>
  15. 27. Source : http://icis2005.unlv.edu/
  16. 28. Source :http://telegraph.co.uk
  17. 29. Source :http://telegraph.co.uk

×