MIS 5212.001 Week 4 Site:

Slides:



Advertisements
Similar presentations
Tips for Training (module 6.2).
Advertisements

Education 2012 Presented by Marina Ward. Online Catalogue: Searching the Catalogue PIN Reading History How to find journal articles (2 nd Term)
Using Commtap Communication Targets and Activities Project.
The Systems Analysis Toolkit
Unlocking the mind to critical thinking. “Thinking about Thinking”
James Tam Introduction To CPSC 233 James Tam Java Object-Orientation Event driven software.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
Damian Gordon.  This module is concerned with program design skills, with particular reference to using flowcharts, pseudocode and programming language.
Intro to CIT 594
James Tam Introduction To CPSC 219 James Tam Administrative (James Tam) Contact Information -Office: ICT 707 -
MIS Week 3 Site:
Making A Career Decision Competency Category: Career Development Competency Number: A.5 Competency: Select an immediate job goal. Objective: Upon completion.
SE 350 – Programming Games Lecture 1: Introduction Lecturer: Gazihan Alankuş Please look at the last two slides for assignments (marked with TODO) 2/10/20121.
ITP © Ron Poet Lecture 1 1 IT Programming Introduction.
Welcome to seminar 2. We will begin our discussion in just a few minutes.
Grade 10 MCAS OPEN RESPONSE QUESTION SPRING 2001 Exam, #40
MIS Week 5 Site:
MIS Week 2 Site:
Miss Lofing’s Kindergarten English Handbook. Best method of contact:
PHP Basics Course Introduction SoftUni Team Technical Trainers Software University
MIS Week 6 Site:
Advanced JavaScript Course Introduction SoftUni Team Technical Trainers Software University
Lance Pedersen Bio: I am a relatively new teacher who has had to rapidly adjust to teaching in the CTS area. I started my career three years ago at Ross.
Using Commtap Communication Targets and Activities Project.
MIS 482 SPRING 2012 Management of Information Technology.
Week seven CIT 354 Internet II. 2 Objectives Database_Driven User Authentication Using Cookies Session Basics Summary Homework and Project 2.
MIS Week 1 Site:
CSE1GDT Game Design Theory About me: Paul Taylor I’m a lecturer in Games Design and Development Currently Studying my PhD in Artificial Intelligence.
Yukon Education Literature Circle (Part of the Cypher IV Math Leadership Project) September 25, 2013.
1 CS6320 – SW Engineering of Web- Based Systems L. Grewe.
Welcome to HS 310 Understanding Diversity, Self Awareness and Change.
Matter and Interactions 1 Fall 2006 Matter & Interactions I Physics Professor & Lecturer: Dr. Reinhard Schumacher Teaching Assistants: Ms. Elisa.
If you did the extra credit assignment, please turn in your worksheets now. No late submissions will be accepted.
MIS Week 6 Site:
Gradual Release of Responsibility
Trainers Team Ivan Yonkov Rated in the top 7% at Stack Overflow
Welcome To MOODLE Getting Started. Introductions Christa McLaughlin – High School math teacher and high school lead teacher of technology Jason Grubbs.
Using Technology to Engage Students Mac A. Lewis, BMS 7 January am – 11:30 am.
New Pathways to Teaching 24 Hour Introduction to teaching Drew Krumholz Building a resume & cover letter.
MAD2053 – WEB DESIGN WEEK 1 - INTRODUCTION. CLASS DAY TUESDAY 4pm to 6pm – Lecture/In Class Discussions/ Consultations at AR0002 WEDNESDAY (Mr. Imran)
Form Processing Week Four. Form Processing Concepts The principal tool used to process Web forms stored on UNIX servers is a CGI (Common Gateway Interface)
Introduction to the Course TED 367 Methods in Sec. Ed.
MIS Week 1 Site:
Introduction to Financial Management. Overview of Financial Management Introduction Keys to Success Recitations Class Structure - Syllabus Text – Financial.
JavaScript Applications Course Introduction SoftUni Team Technical Trainers Software University
Course Information CSE 2031 Fall Instructor U. T. Nguyen /new-yen/ Office: CSEB Office hours:  Tuesday,
The Front Range’s Largest AppSec Conference is BACK February 18, 2016 Details & registration at Keynote by Jeremiah Grossman.
Introduction to JavaScript MIS 3502, Spring 2016 Jeremy Shafer Department of MIS Fox School of Business Temple University 2/2/2016.
MIS Week 4 Site:
MIS Week 5 Site:
JavaScript Applications Course Introduction SoftUni Team Technical Trainers Software University
Comp1202: Conclusions Revision Session. Coming up Key Concepts - The Pillars HashMaps Exceptions The Exam Some Last Words.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Composition Class Before and After QM Peer Review
Introduction to Mathematica
Company Meeting Title Presenter.
Intro to Ethical Hacking
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Intro to Ethical Hacking
Advanced Penetration Testing
Teaching a Workshop Kent Schroeder SIL AFA.
Module 22 (Metasploit Introduction)
Intro to Ethical Hacking
Introduction to the Conversational Framework
Research funding options for university
Intro to CIT 594
English: Monday, November 5, 2018
KS5 Marking policy Students will receive, as a minimum either a detailed formative feedback or one summative assessment feedback each half-term, covering.
Introduction To CPSC 233 James Tam Event driven software
Presentation transcript:

MIS Week 4 Site:

 Introduction  In the news  Live Demonstration of Exploits  Live Demonstration of SET  Building Modules in Metasploit  Creating Exploits  Porting Exploits  Scripting  Simulating Penetration Testing  Next Week 2MIS

 Submitted  er-security/the-end-for-1024bit-ssl-certificates-is- near-mozilla-kills-a-few-more.html er-security/the-end-for-1024bit-ssl-certificates-is- near-mozilla-kills-a-few-more.html  magazine.com/news/china-tech-companies-source- code/ magazine.com/news/china-tech-companies-source- code/  intelligence/trend-micro-discovers-new-adobe- flash-zero-day-exploit-used-in-malvertisements/ intelligence/trend-micro-discovers-new-adobe- flash-zero-day-exploit-used-in-malvertisements/  mccarthy/five-colleges-with-data-b_b_ html mccarthy/five-colleges-with-data-b_b_ html MIS

 Submitted  breaches/security-budgets-going-up-thanks-to- mega-breaches/d/d-id/ breaches/security-budgets-going-up-thanks-to- mega-breaches/d/d-id/  data/2015/02/apple-building-solar-powered-data- command-center/104400/?oref=ng-HPriver data/2015/02/apple-building-solar-powered-data- command-center/104400/?oref=ng-HPriver  window-to-enterprise-infection/d/d-id/ window-to-enterprise-infection/d/d-id/ MIS

 What I noted  hammond-terrorist-watchlist-fbi/ hammond-terrorist-watchlist-fbi/  amazon_taboola_microsoft_adplock_plus_unblock/ amazon_taboola_microsoft_adplock_plus_unblock/  _to_flush_flash_if_you_havent_already_enough_is_e nough/ _to_flush_flash_if_you_havent_already_enough_is_e nough/  ack_d_link/ ack_d_link/  arders_on_parking_lot_driveby_blitz/ arders_on_parking_lot_driveby_blitz/ MIS

 Feedback from students last week indicated a preference to go through last weeks exploits live in class  We will run through nmap of Metasploitable, the exploits from last week, and the Social Engineering Toolkit on my laptop MIS

 Metasploit is primarily written in Ruby  The book “Metasploit” also uses a lot of PowerShell in it’s examples  We are not going to try and make you either Ruby or PowerShell developers here tonight  Rather, we will look at some of the basic structure and steps you might go through to modify modules for you own purposes. MIS

 Recall from Week 2, the Tomcat Exploit MIS

 Explore Modules MIS

 Here is what the start of this module looks like: MIS

 The previous page has some interesting lines to consider  “require ‘msf/core’”  Module will include all functionality from Metasploit’s core libraries  “class Metasploit3, Msf::Exploit::Remote  Defines this as an “Exploit” module  “include Msf::Exploit::Remote::HttpClient”  Pulls in the HttpClient module that includes functionality to handle http traffic MIS

 Grab a module close to what you want to do  Tweak it to get the functionality you need  This may involve sharpening your coding skills first MIS

 Depending on the Exploit, you may need to know:  MSSQL  Oracle  PowerShell  Bash  Etc… MIS

 Modifying the tools is one of the distinguishing skills in top flight Consultants  Lots of people can run nmap, Nessus, and Metasploit, but to distinguish yourself in the field, this needs to be your jumping off point. Please Note: I’m not saying I am any good at this, there’s a reason I’m teaching the course instead of consulting ;-) MIS

 For Metasploit, scripting is basically modules for meterpreter  Same concept as earlier, but specific to meterpreter sessions  This is also a point where the book contains older information  Scripts are no longer being accepted for Metasploit  Script functionality is being ported to modules. MIS

 Metasploit is constantly evolving  To stay on top you may want to follow on twitter:  HD  Metasploit  Andréz  Check in on Rapid7 and DarkOperator   MIS

 metasploit/blog/2015/01/30/weekly- metasploit-wrapup metasploit/blog/2015/01/30/weekly- metasploit-wrapup MIS

 pro pro MIS

 MIS

 We spent almost all of our time in the open source Metasploit Framework due to licensing  Metasploit Pro looks just as good and works just as well as the commercial products just mentioned MIS

 1 st Exam Covering Metasploit  In the news  Introduction to WebGoat MIS

? MIS