Pentesting with Metasploit

2,686 views

Published on

Pentesting? What is Pentesting? Why Pentesting?
Millions of dollars have been invested in security programs to protect critical infrastructure to prevent data breaches

Published in: Education, Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,686
On SlideShare
0
From Embeds
0
Number of Embeds
113
Actions
Shares
0
Downloads
197
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Pentesting with Metasploit

  1. 1. Information Security is our Forte… Phone: Email: Web: Address: +91-20-24333311 beaconedutech@gmail.com http://beaconedutech.com 303, Renata Chambers, 2145, Sadashiv Peth, Pune, Maharashtra, India – 411030 PenTesting with Metasploit Framework Presented by – Sudarshan Pawar Prakashchandra Suthar
  2. 2. Information Security is our Forte… “From 2008 Backtrack started giving machine guns to monkeys “
  3. 3. Beacon Edutech • What is PenTesting? • Why PenTesting? • Traditional Methodologies • Metasploit • Metasploit Terminologies • Demo • Is Metasploit the ans.? 12/7/2013 Agenda 2
  4. 4. Beacon Edutech • What is PenTesting? • Art or approach in an attempt to break-in into authorised digital environment. • Why PenTesting? • Explore your security & trying to patch them • Find vulnerabilities before others(bad guys) do •… 12/7/2013 Getting Started 3
  5. 5. Beacon Edutech • Millions of dollars have been invested in security programs to protect critical infrastructure to prevent data breaches. • Penetration Test is one of the most effective ways to identify weaknesses and deficiencies in these programs. 12/7/2013 Need of Pentesting -Metasploit –The Penetration Tester’s Guide by HD Moore 4
  6. 6. 12/7/2013 Pentesting Phases Beacon Edutech Reconnaissance Vulnerability Assessment & Analysis Exploitation Post Exploitation 5 Reporting
  7. 7. Beacon Edutech 12/7/2013 Traditional Pentesting 6
  8. 8. 12/7/2013 Traditional Pentesting Beacon Edutech Public Exploit Gathering Change Offset Replace Shellcode 7
  9. 9. Beacon Edutech • Not just a tool, but an entire framework • An Open source platform for writing security tools and exploits • Easily build attack vectors to add its exploits, payloads, encoders, • Create and execute more advanced attack • Built in RUBY 12/7/2013 What is Metasploit? 8
  10. 10. Beacon Edutech 12/7/2013 Architecture 9
  11. 11. Beacon Edutech • Easy to Use • 600+ Exploits • 200+ payloads • 25+ encoders • 300+ auxiliary 12/7/2013 Why use Metasploit? 10
  12. 12. Beacon Edutech 12/7/2013 Traditional Pentest Vs Metasploit 11
  13. 13. Load Metasploit Choose the target OS Change Offset Use exploit Beacon Edutech Public Exploit Gathering 12/7/2013 Traditional Pentest Vs Metasploit SET Payload Replace Shellcode Execute 12
  14. 14. Beacon Edutech • MSFconsole • MSFcli • Msfweb, msfgui ( discontinued) • Metasploit Pro • Armitage 12/7/2013 Metasploit Interface 13
  15. 15. Beacon Edutech • Exploit : The means by which a Pentester takes an advantages of a flaw within system, application, or service • Payload : Code that we want the target system to execute on our command • Shellcode : Set of instructions used as payload when exploitation occurs • Module : Support software that can be used by Metasploit • Listener : A component for waiting an incoming connection 12/7/2013 Metasploit Terminologies 14
  16. 16. 12/7/2013 Beacon Edutech Netapi exploit Vulnerability : NetAPI32.dll file that allows remote code execution Process name: Microsoft LAN Manager DLL Application using this process: Microsoft network 15
  17. 17. Beacon Edutech • A.k.a Meta Interpreter • Post exploitation payload(tool) • Uses in-memory DLL injection • Can be extended over the run time • Encrypted communication 12/7/2013 Meterpreter 16
  18. 18. Command execution File Upload/Download Process migration Log Deletion Privilege escalation Registry modification Deleting logs and killing antivirus Backdoors and Rootkits Pivoting …..etc. Beacon Edutech • • • • • • • • • • 12/7/2013 What can be done 17
  19. 19. Beacon Edutech Demo Meterpreter 18 12/7/2013
  20. 20. Beacon Edutech • BackTrack and Kali Linux • Metasploit Team (HD Moore & Rapid7) • Offensive Security 12/7/2013 Thanks To… 19
  21. 21. http://docs.kali.org/ http://www.metasploit.com http://www.offensive-security.com/metasploit-unleashed/ http://www.processlibrary.com/en/directory/files/netapi32/2 1334/ • http://support.microsoft.com/kb/958644 Beacon Edutech • • • • 12/7/2013 References 20
  22. 22. Beacon Edutech 12/7/2013 Discussion … 21
  23. 23. Beacon Edutech • Group Discussion about “Pentesting with Metasploit –Yes/No ” • Rules • Don’t Hesitate to raise a point (We all are learners) • No Rocket Science required. • Its not a debate, so chill. 12/7/2013 RULES… 22

×