Advanced Penetration Testing

Slides:



Advertisements
Similar presentations
Part 2 Penetration Testing. Review 2-minute exercise: RECON ONLY Find 3x IP addresses at the U.S. Merchant Marine Academy Google: “U.S. Merchant Marine.
Advertisements

A Complete Tool For System Penetration Testing Presented By:- Mahesh Kumar Sharma B.Tech IV Year Computer Science Roll No. :- CS09047.
System Security Scanning and Discovery Chapter 14.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
MIS Week 3 Site:
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Dennis  Application Security Specialist  WhiteHat Security  Full-Time Student  University of Houston – Main Campus ▪ Computer.
4/13/2010.  CSS Meeting  Stephen Crane on Programming Contests  1pm  Building 8 room /11/10.
MIS Week 2 Site:
Honeypot and Intrusion Detection System
MIS Week 6 Site:
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
MIS Week 1 Site:
Linux Networking and Security
Trinity Uses Nmap, shouldn’t you?. From “The Art of War” "... knowing your enemy 100% of the time, you will win your battle 100% of the time, knowing.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
MIS Week 6 Site:
Penetration Testing 101 (Boot-camp)
Intrusion Detection on a Shoestring Budget Shane Williams UT Austin Graduate School of Library and Information Science Oct. 18, 2000 SANS Network Security.
MIS Week 1 Site:
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
Module 1A An Introduction to Metasploit – Based upon Chapter 2 of “Metasploit the Penetration testers guide” Based upon Chapter 2 of “Metasploit the Penetration.
MIS Week 5 Site:
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Hacking 101, Boot-camp Computer Security Group March 10, 2010 Mitchell Adair.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
CLINIC-LAB COMMUNICATION Configuring 3Shape Communicate™
Defining your requirements for a successful security (and compliance
Intro to Ethical Hacking
Metasploit Framework (MSF) Fundamentals
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Intro to Ethical Hacking
Penetration Testing: Concepts,Attacks and Defence Stratagies
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Intro to Ethical Hacking
Security Testing Methods
CITA 352 Chapter 5 Port Scanning.
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Network Exploitation Tool
Daniel Kouril, Ivo Nutar Masaryk University
Advanced Penetration testing
Metasploit a one-stop hack shop
Module 22 (Metasploit Introduction)
CIT 480: Securing Computer Systems
Metasploit assignment
Advanced Penetration testing
Intro to Ethical Hacking
Everything You Need To Know About Penetration Testing.
Nessus Vulnerability Scanning
Intro to Ethical Hacking
RECONNAISSANCE & ENUMERATION
Intro to Ethical Hacking
Advanced Penetration testing
CSCD 330 Network Programming Spring
Backtrack Metasploit and SET
Web Application Penetration Testing ‘17
Metasploit Analysis Report Overview
Lecture 2 - SQL Injection
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
Network hardening Chapter 14.
CSCD 330 Network Programming Spring
Ethical Hacker Pro IT Fundamentals Pro
Presentation transcript:

Advanced Penetration Testing MIS 5212.001 Week 1 Site: http://community.mis.temple.edu/mis5212sec001sp2017/

Tonight's Plan Introduction Reminder of the basics Metasploit Next Week MIS 5212.001

Introduction Wade T Mackey Wade.mackey@temple.com 717-682-2925 MIS 5212.001

About the Course Our focus will be to provide you with an understanding of the process involved in penetration testing focusing on Metasploit, WebGoat, and Wireless Security and the tool sets used Organized around the workflow of a professional tester Tips for avoiding common pitfalls MIS 5212.001

About the Course (Cont) Additional tools we will look at Ettercap – A tool for performing Man in the Middle attacks Wireshark – No a penetration tool, but important to have a basic knowledge Cain and Able – Password cracking tool MIS 5212.001

Course Plan MIS 5212.001 1 (1/18) 2.5 Hrs. Alter 231 and Online Course Introduction, Introduction to the Metasploit Framework including Basics, Intelligence Gathering, Vulnerability Scanning, and Exploitation   2 (1/25) Online Meterpreter, Avoiding Detection, Client Side Attacks, and Auxiliary Modules 3 (2/1) Social Engineering Toolkit, SQL Injection, Karmetasploit, Building Modules in Metasploit, and Creating Exploits 4 (2/8) 1 Hr. Porting Exploits, Scripting, and Simulating Penetration Testing 5 (2/15) Independent Study – Perform Metasploit Attack and Create Presentation 6 (2/22) Ettercap – Build out test network in class for those available to come in Analysis Report: Learnings from Metasploit run against a publically available VM the student chooses 7 (3/1) Introduction to OWASP’s WebGoat application Mid Semester Test Weekend following class MIS 5212.001

Course Plan 8 (3/8) Independent Study – Work Through WebGoat exercises   3/15 Spring Break 9 (3/22) 1 Hr. Online Introduction to Wireless Security 10 (3/29) 1Hr. Wireless Recon, WEP, and WPA2 11 (4/5) WPA2 Enterprise, Wireless beyond WiFi Analysis Report: Learnings from the WebGoat Challenge 12 (4/12) Jack the Ripper, Cain and Able, Delivery of Sample Operating Systems 13 (4/19) Independent Study – Analyze provided Operating System Samples and Create Assessment Report 14 (4/26) 2.5 Hrs. Alter 231 and Online Deliver Assessment to Operating System Class either in person or via teleconference End of Semester Test Weekend following class MIS 5212.001

Caution The tools and techniques discussed and used in this course should only be used on systems you personally own, or have written permission to use. Some of the tools used have the potential to disrupt or break computer systems. MIS 5212.001

Mindset Successful penetration testers look at the world through a different lens They think outside the box They do things differently They don’t look at the glass as half full or half empty, instead they look at the glass and think “If I hit the glass just right, I can crack it and drain out just what I want. MIS 5212.001

Mindset (Continued) Successful penetration tester also need to have the following work habits Methodical Thorough Careful Ethical habitual note taker and documentation fiend If you can’t duplicate a finding, you didn’t find it! MIS 5212.001

Free Cloud Training Amazon is offering a free 3 hour cloud security fundamentals course on line. With “Cloud” being hot right now, my be worth the three hours. https://aws.amazon.com/training/course-descriptions/security-fundamentals/ MIS 5212.001

Metasploit Metasploit is a penetration testing framework that integrates other tools we have seen with exploitation tools MIS 5212.001

Penetration Testing Execution Standard Developers of Metasploit used the Penetration Testing Execution Standard (PTES) as their guide in developing the tool http://www.pentest-standard.org/index.php/Main_Page Contains a great deal of information and worth looking over MIS 5212.001

Process Similar to what we covered in the first semester, Metasploit and PTES breaks activities down in to some basic categories Pre-Engagement (Getting Permission) Intelligence Gathering (Recon) Threat Modeling (Using Intel to determine vulnerabilities) Note: This is different then Threat Modeling in IT Security Space Vulnerability Analysis Exploitation Post Exploitation (Clean up after yourself) Reporting MIS 5212.001

Types of Penetration Tests Overt Penetration Testing Another term for “Crystal Box” testing Working with target staff and with access to target documentation to fine tune testing Quicker, but information may steer you away from things Covert Penetration Testing Another term for “Black Box” testing You have the same opportunity to gather information as a real attacker Time consuming and expensive, but you may find “nuggets” not obvious from the documentation if you had it MIS 5212.001

Vulnerability Scanners We looked at these in the first semester Remember Nmap and Nessus Metasploit can interface with these tools (and others) to use their output as an input to it’s tool set. MIS 5212.001

A few words about Metasploit Metasploit is included on Kali in several forms There is a Web Based interface that requires activation as well as the terminal version built in. Both forms are slow to launch. Your machine isn’t frozen, it just takes a while. There’s a lot going on and we’ll cover that as we go. We will mostly focus on the terminal version known as Metasploit Framework MIS 5212.001

Terminology Exploit – Means by which an attacker takes advantage of a flaw Payload – Code we want a system to execute Shellcode – Set of instructions used as a payload when exploitation occurs Module – Piece of software used by the Metasploit Framework Listener – Component within Metasploit that waits for an incoming connection MIS 5212.001

Metasploit Interfaces MSFconsole - The way we will normally interact with Metasploit Started by typing: msfconsole at terminal prompt Note: You may need to provide path MIS 5212.001

Metasploit Interfaces MSFcli – Bypasses msfconsole menu process and allows direct selection of attack Started by typing msfcli at terminal prompt MIS 5212.001

MSFcli Example MIS 5212.001

More Interfaces Armitage – Graphic Interface to MSFconsole Already Installed in Kali MIS 5212.001

Metasploit Utilities MSFpayload – Generates shellcode, executables, and more MSFencode – Encodes shellcode to eliminate problem characters and obfuscate code to evade IDS and IPS systems Nasm Shell – Utility that provides assembly language help during scripting MIS 5212.001

Metasploit Express and Pro Commercial versions of the Metasploit tool We will stick with the community version in this class Note: We ran through a lot of information and terms. We will cover details as the course continues. MIS 5212.001

Once More One more time – The techniques covered in this class can damage your systems and the target systems. Make sure you use a test environment. MIS 5212.001

Intelligence Gathering Whois – Unchanged from last semester MIS 5212.001

Netcraft Web based tool for finding IPs URL: searchdns.netcraft.com MIS 5212.001

NSLookup MIS 5212.001

Active Information Gathering Port Scanning with Nmap We covered this last semester One new twist, we want to utilize the –oX option to have nmap save it’s output in xml MIS 5212.001

Metasploit and it’s Database Metasploit has a built in database to support collecting data during a penetration test Uses PostgresSQL You can check status when MSFconsole is running by typing: db_status at the msf> prompt in Metasploit Should respond with “postgress connected to msf3 (or something close to this) Note: Before Kali 2.0, there were issues getting the database to work. Make sure you are on 2.0 or > MIS 5212.001

Database and Nmap Run Nmap with a command something like: nmap –Pn –sS –A –oX Subnet1.xml 192.168.1.0/24 This will sweep the subnet and leave the results in a xml file ready for import This may take a while, may want to narrow focus to a shorter list MIS 5212.001

Importing to Metasploit At Metasploit prompt Db_import Subnet1.xml Hosts –c address This will import the active hosts to Metasploit database MIS 5212.001

Nmap from Metasploit Run command Msf > db_nmap –sS –A [Target Address] In my case: MIS 5212.001

Built In Port Scanners Run command: In my case: Msf> use auxiliary/scanner/portscan/syn Msf auxiliary(syn) > set RHOSTS [Target IP] Msf auxiliary(syn) > set THREADS 50 In my case: MIS 5212.001

More Scanning Options Server Message Blocks MSSQL SSH FTP SNMP Use auxiliary/scanner/smb/smb_version MSSQL Use auxiliary/scanner/mssql/mssql_ping SSH Use auxiliary/scanner/ssh/ssh_version FTP Use auxiliary/scanner/ftp/anonymous SNMP Use auxiliary/scanner/snmp/snmp_login MIS 5212.001

Writing a Custom Scanner You can write your own Uses Ruby Example on following page MIS 5212.001

Simple Scanner MIS 5212.001

Vulnerability Scanning Rapid 7 (Owner of commercial instance of Metasploit) makes a “community” version of their scanner available. Called NeXpose Not included in Kali Available at: http://www.rapid7.com/products/nexpose/compare-downloads.jsp MIS 5212.001

NeXpose Similar to stand alone Nmap, NeXpose output can be saved as xml and imported into Metasploit via the db_import command Example Msf> db_import /tmp/hosts.xml MIS 5212.001

NeXpose Once installed in Kali, can be setup to run from within the MSF Framework See: http://www.offensive-security.com/metasploit-unleashed/NeXpose_Via_Msfconsole MIS 5212.001

Nessus See: http://www.offensive-security.com/metasploit-unleashed/Nessus_Via_Msfconsole MIS 5212.001

Other Scanning Options Open VNC Authentication Msf> use auxiliary/scanner/vnc/vnc_none_auth Open X11 Servers Msf> use auxiliary/scanner/x11/open_x11 MIS 5212.001

Exploits Basics Msf> show exploits Msf> show auxiliary Msf> show options MIS 5212.001

Search Can search for specific exploits Msf> search ms08_067 MIS 5212.001

Payloads Msf> show payloads MIS 5212.001

Selecting the Exploit Once you know the exploit you want: Show options MIS 5212.001

What Payload? Now, show payloads makes more sense MIS 5212.001

Setting the Payload MIS 5212.001

Selecting a Target MIS 5212.001

Final Options Set RHOST [Target IP] Set target [Target Number from Previous Slide] Show options will list your settings so you can verify MIS 5212.001

Looking at Ubuntu Same process, we find a machine via scanning Either select port found during scanning if it looks promising (Like open port with samba) Or, run vulnerability scanner to find more options Lets say we found samba MIS 5212.001

Looking for New Possibilities Recall the search function MIS 5212.001

Same Process MIS 5212.001

More of the Same Set LPORT 8080 Set RHOST 192.168.x.x And finally exploit MIS 5212.001

Reference The Metasploit portion of the course draws heavily on “Metasploit – The Penetration Tester’s Guide” from No Starch Press While not required for the class, it is worthwhile having, especially if you think you will continue to pursue penetration testing http://www.offensive-security.com/metasploit-unleashed/Main_Page Great online reference (Same people that wrote book above) MIS 5212.001

Before Next Week Make sure your VMWare implementation is working Start Kali and run msfconsole Then check db_status and see if you are connected to your database Check Nessus and/or install NeXpose, will be helpful for Exercise Check that you have Metasploitable available and working MIS 5212.001

Next Week Meterpreter Avoiding Detection Client Side Attacks Auxiliary Modules MIS 5212.001

Questions ? MIS 5212.001