Penetration Testing & Network Defense

Slides:



Advertisements
Similar presentations
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Advertisements

Part 2 Penetration Testing. Review 2-minute exercise: RECON ONLY Find 3x IP addresses at the U.S. Merchant Marine Academy Google: “U.S. Merchant Marine.
Hacking Techniques & Intrusion Detection Ali Al-Shemery arabnix [at] gmail.
Armitage and Metasploit Penetration Testing Lab
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Metasploit Payloads and Antivirus Mark Baggett December 2008 GIAC GSEC GCIH.
Offensive Security Part 1 Basics of Penetration Testing
A Complete Tool For System Penetration Testing Presented By:- Mahesh Kumar Sharma B.Tech IV Year Computer Science Roll No. :- CS09047.
© 2010 – MAD Security, LLC All rights reserved ArmitageArmitage A Power User’s Interface for Metasploit.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Browser Exploitation Framework (BeEF) Lab
What are computers? Computers are machines that perform tasks or calculations according to a set of instructions, or programs. The first fully electronic.
Performing a Penetration Test.  Penetration Tester  Attempts to reveal potential consequences of a real attack  Security Audit / Vulnerability Assessment.
Dennis  Application Security Specialist  WhiteHat Security  Full-Time Student  University of Houston – Main Campus ▪ Computer.
Telnet/SSH: Connecting to Hosts Internet Technology1.
MIS Week 2 Site:
EECS 354 Network Security Metasploit Features. Hacking on the Internet Vulnerabilities are always being discovered 0day vulnerabilities Every server or.
Penetration Testing Training Day Penetration Testing Tools and Techniques – pt 1 Mike Westmacott, IRM plc Supported by.
Reinsel Kuntz Lesher, LLP.  Outline Overview  netstat -an (-ano will give the PID)  ftp  bin  mget  mput  telnet  telnet bobm.us 25  helo  mail.
Hands on with BackTrack Information gathering, scanning, simple exploits By Edison Carrick.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Penetration Testing 101 (Boot-camp)
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
You Need an Interpreter!. Closing the GAP Thus far, we’ve been struggling to speak to computers in “their” language, maybe its time we spoke to them in.
Buffer Overflows Taught by Scott Coté.-. _ _.-. / \.-. ((___)).-. / \ /.ooM \ / \.-. [ x x ].-. / \ /.ooM \ -/ \ /-----\-----/---\--\ /--/---\-----/-----\ / \-
Getting your STK license for METC 106 Go to the website and download STK 9.2.3http://
Module 1A An Introduction to Metasploit – Based upon Chapter 2 of “Metasploit the Penetration testers guide” Based upon Chapter 2 of “Metasploit the Penetration.
JMU GenCyber Boot Camp Summer, “Canned” Exploits For many known vulnerabilities attackers do not have to write their own exploit code Many repositories.
Alison Buben Jay Pataky COSC 316.  Main purpose: Penetration Testing ◦ Evaluating the security of a computer by simulating an attack ◦ Showing where.
PostExploitation CIS 5930/4930 Offensive Computer Security Spring 2014.
If we don’t subnet and use as our subnet mask then we use all of our IP addresses on one network. This is not an efficient use of our Class.
Hacking 101, Boot-camp Computer Security Group March 10, 2010 Mitchell Adair.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Penetration Testing Exploiting 2: Compromising Target by Metasploit tool CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
Metasploit Framework (MSF) Fundamentals
Penetration Testing: Concepts,Attacks and Defence Stratagies
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
Introduction to Network Scanning
PART 1 – FILE UPLOAD BACKDOORS: METASPLOIT
MySQL Exploit with Metasploit
Footprinting and Scanning
CITA 352 Chapter 5 Port Scanning.
Employee clicks on fake
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Network Exploitation Tool
Metasploit a one-stop hack shop
Module 22 (Metasploit Introduction)
Laura Jaideny Pérez Gómez - A
CIT 480: Securing Computer Systems
Module 36 (Expanding Your Control of Windows Victims)
Metasploit Project For this exploit I will be using the following strategy Create backdoor exe file Upload file to website Have victim computer download.
Footprinting and Scanning
Metasploit assignment
Exploiting Metasploitable
Week 5.
Metasploit Assignment
Web Application Penetration Testing ‘17
Metasploit Analysis Report Overview
Analyzing OS Sample Windows 7 image provided by different class
How to Improve Releasing Efficiency via i18N/L10n Test Automation.
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
Malicious Software Slide Set #5 Textbook Chapter 6 Clicker Questions
Software Security Slide Set #10 Textbook Chapter 11 Clicker Questions
Buffer Overflow Slide Set #7 Textbook Chapter 10 Clicker Questions
Metasploit assignment – Arkadiy Kantor – Mis-5212
Access Control Slide Set #4 Textbook Chapter 4 Clicker Questions
Network Penetration Testing & Defense
Penetration Testing & Network Defense
Presentation transcript:

Penetration Testing & Network Defense Exploitation                     Peer Instruction Questions for Cybersecurity: Pentesting by William E. Johnson, Allison Luzader, Irfan Ahmed is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Upon gaining access to a machine, you find a network interface running on a 192.168.0.0/24 network. How would you map it? Run nmap on your machine with a 192.168.0.0/24 masking based on that address Use Metasploit’s autoroute and run a port scan on 192.168.0.0/24 Use Metasploit’s migration feature to gain direct access to 192.168.0.0/24 Run a broadcast scan on all interfaces Answer: B Category: port scanning

You’ve exploited Notepad (gaining Meterpreter access) and expect that the user may close the application. What should you do to prevent losing your Meterpreter? Background the Meterpreter Re-exploit the machine Migrate to a different process Upload a new Meterpreter payload Replace the Meterpreter with a reverse Meterpreter Answer: C Category: metasploit, meterpreter

Using Metasploit, you’re able to fully access a Windows XP SP2 machine Using Metasploit, you’re able to fully access a Windows XP SP2 machine. What would be the most efficient way to upload and execute a file from your attacking host? Use the windows/upexec/bind_tcp payload to upload and execute the file in Metasploit Use Metasploit to get a Meterpreter, then use the upload and execute commands to upload and execute the file Exploit the machine with MS08-067, get a shell with windows/shell/bind_tcp payload, download the file from your machine, and execute it. Use Netcat to transfer the file and execute it in a Meterpreter session Answer: A Category: metasploit No reason to spend unnecessary time for remote execution using Meterpreter, etc. when you can just use a quick payload The goal here is to leave the smallest footprint possible

You’ve exploited a set of machines, and need to run an identical set of Meterpreter commands on each one. How would you do this? Use Meterpreter’s execute command to execute a Meterpreter script Use Meterpreter’s resource command to execute a local script Use Meterpreter’s resource command to execute a script placed on the remote machines Use Meterpreter’s shell command to run a shell script with Meterpreter commands Answer: B Category: metasploit, meterpreter

You’ve exploited a machine, gained Meterpreter access, and run autoroute to access a new network from that machine. How do you run exploits against machines on the new network without losing your Meterpreter? Run the Meterpreter migrate command to migrate to a new Metasploit session Run the Meterpreter background command to return to the Msfconsole Run the Meterpreter clearenv command to clean Meterpreter’s environment for new exploits Run the Meterpreter resource command to save access to that machine Run the Meterpreter interact command to interact with the new machines Answer: B Category: metasploit, meterpreter