Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Slides:



Advertisements
Similar presentations
Armitage and Metasploit Penetration Testing Lab
Advertisements

Offensive Security Part 1 Basics of Penetration Testing
A Complete Tool For System Penetration Testing Presented By:- Mahesh Kumar Sharma B.Tech IV Year Computer Science Roll No. :- CS09047.
METASPLOIT.
1 Host Based Intrusion Detection: Analyzing System Logs Bob Winding, Vikram Ahmed University of Notre Dame 12/13/2006.
Browser Exploitation Framework (BeEF) Lab
Remote Desktop Security Raghav Chawla, Jon Ussery Group 20.
Dennis  Application Security Specialist  WhiteHat Security  Full-Time Student  University of Houston – Main Campus ▪ Computer.
Introduction to InfoSec – Recitation 15 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
MIS Week 2 Site:
Exploitation: Buffer Overflow, SQL injection, Adobe files Source:
Kali Linx Attacks Jim Nasto. Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the.
Demo: Rubber Quack Quack.
Social Engineering Toolkit Computer Science Innovations, LLC.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
Module 1A An Introduction to Metasploit – Based upon Chapter 2 of “Metasploit the Penetration testers guide” Based upon Chapter 2 of “Metasploit the Penetration.
JMU GenCyber Boot Camp Summer, “Canned” Exploits For many known vulnerabilities attackers do not have to write their own exploit code Many repositories.
Testing Exploits and Malware in an isolated environment Luca Allodi – Fabio Massacci – Vadim Kotov
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Tim Wostradowski, Ian Brophy, John Ang.  Project Conception  Developing the Idea  Refining the Method  Gathering the Data  From Data to Information.
Intro to Ethical Hacking
Nessus Vulnerability Scan
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Adversary playbook.
Unified Management Agent (UMA)
Network Exploitation Tool
Metasploit a one-stop hack shop
Module 22 (Metasploit Introduction)
Metasploit Project For this exploit I will be using the following strategy Create backdoor exe file Upload file to website Have victim computer download.
123 hp com setup 6978 Printer Support Call:
Hp com setup Printer Support Call:
123 hp com setup 8710 Call Now Printer:
hp com setup 8710 Printer Support Call:
123 hp com setup 4650 Printer Support:
hp com setup 4650 Printer Support Call:
123 hp com setup Printer Support Call:
hp com setup Printer Support Call:
123 hp com setup 6978 Printer Support Call:
Hp com setup Printer Support Call:
123 hp com setup 8710 Call Now Printer:
hp com setup 8710 Printer Support Call:
123 hp com setup 4650 Printer Support:
hp com setup 4650 Printer Support Call:
123 hp com setup Printer Support Call:
hp com setup Printer Support Call:
123 hp com setup 6978 Printer Support Call:
Hp com setup Printer Support Call:
123 hp com setup 8710 Call Now Printer:
hp com setup 8710 Printer Support Call:
123 hp com setup 4650 Printer Support:
hp com setup 4650 Printer Support Call:
123 hp com setup Printer Support Call:
hp com setup Printer Support Call:
123 hp com setup Printer Support Call:
hp com setup Printer Support Call:
Hp com setup Printer Support Call:
123 hp com setup 4650 Printer Support:
hp com setup 4650 Printer Support Call:
123 hp com setup HP Printer Support Call:
hp com setup Printer Support Call:
123 hp com setup 6978 hp Printer Number:
hp com setup 6978 hp Printer Number:
123 hp com setup 4650 Printer Support Call:
hp com setup 4650 Printer Support:
123 hp com setup 8710 Call Now Printer:
Web Application Penetration Testing ‘17
JADE - Java Agent DEvelopment framework -
Go to and download and install“ADOBE READER”
Penetration Testing & Network Defense
Presentation transcript:

Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Tools / Assumptions Attacker – BackTrack 4.2 Metasploit Framework 3.0 PDF file for embedding Victim – Windows XP File and Printer Sharing Adobe Reader 8.0 – 9.0

Exploit Concept Attacker embeds exploit in a PDF file Victim opens the PDF file –Unknowingly saves and runs exploit Attacker takes control of victim machine

Exploit Demos Live Demo Offline Demo

Start BackTrak

Open 2 Terminals

Open msfconsole in both Terminals

Setup Exploit

Setup Exploit Handler

Wait for Victim to Open PDF

Prey on their Ignorance

Victim is now a Victim

Attacker now has Access

Example of Control

Example of Control (cont)

Setup Exploit 2

Setup Handler 2

Wait for Victim to Open

Prey on Victim’s Ignorance

Ta Da! Attacker has a VNC Session

Example of Control

Example of Control (cont)

Prevent the Attack DO NOT open files from people you don’t know DO NOT allow firewall exceptions for applications you don’t know KEEP popular programs up to date DISABLE File and Printer Sharing if you aren’t using it

Questions?