Network	Exploitation
Mam	Koeun
Web Security at Trendsec Solution
I. About	me
II. Understanding	Basic	MSF	&	Terms
III. How	does	exploitation	work?
IV. How	does	exploitation	work?	
V. Common	Steps	of	a	compromise	
VI. Scan	For	ports	and	services	
VII.Metasploit	Framework	Basics
VIII.Meterpreter	Basics
Table	Of	Contents
ØMam	Koeun	
ØWeb	Security	@	Trendsec	Solution
ØCambodian	Mekong	University
About	Me
• Payload:	Actual	codes	that	transmit	data	or	
do	any	actions	automatically	as	its	purposes,	it	
runs	after	exploitation	
• Exploit:	Code	that	allows	attacker	to	take	
advantage	of	a	vulnerable	system
• Vulnerability:	Weaknesses	that	allows	
attacker	break	into/compromise	a	system’s	
security		
Understanding	Basic	MSF&TERMS
1- Vulnerability
2- Exploit
3- Payload
Robber
Vulnerable House
Understanding Basic MSF&TERMS
How	does	exploitation	work?
Exploit + Payload
Upload/Download Data, malware, rootkit,..
Exploit run first, if succeed payload runs next
How	does	exploitation	work?
- Scan ports and services running on that
target IP
- Identify a vulnerability service / known
exploit or private exploit
- Compromise, launch exploit, exploitation
plan
Common	Steps	Of	a	Compromise
- Scan a machine using tools like “nmap”
- Use port scanner to scan for ports and
services running on remote system
- Services scanning with version indentified
same time
Scan	For	Ports	and	Services
- Tool	for	development	and	testing	of	vulnerability	
- Can	be	used	for:
- Penetrating	testing
- Exploit	research
- Developing	IDS	signatures	
- Started	by	H.D	Moore,	2003	(Perl)
- Was	rewritten	in	Ruby,	2007	
- Acquired	by	Rapid7,	2009	
- Open	Source	and	free	for	use	
- Over	770+	tested	exploit	
- Over	228	payloads
Metasploit Basics
Commands	detail	in	
Demontration(Vulnerability	on	RPC	
DCOM(MS03_026))
- Scan a machine using tools like “nmap”
root@khnog#nmap –v –n [Target-IP]
root@khnog#nmap –sV –n [Target-IP]
- root@khnog#gcc dcom -0 dcom (compile
file)
- root@khnog#./dcom [target-ID] [target-IP]
THANK YOU

Network Exploitation