© 2010 – MAD Security, LLC All rights reserved Team Operations Collaborate with Armitage and Metasploit.

Slides:



Advertisements
Similar presentations
Optimizing Device Drivers For Terminal Servers Plug And Play Device Redirection Framework Gaurav Daga Program Manager Windows Terminal Server Microsoft.
Advertisements

Chapter 20 Oracle Secure Backup.
Module 1: Introduction to SQL Server Reporting Services.
PC Client Training Customer Name © 2010 CYPRESS COMMUNICATIONS, INC. 1.
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
MMOs and Socket Servers Diego O. Scarpa 10 y 11 de Diciembre – Hotel Panamericano - Buenos Aires.
Armitage and Metasploit Penetration Testing Lab
© 2010 – MAD Security, LLC All rights reserved ArmitageArmitage A Power User’s Interface for Metasploit.
Overview of Laserfiche Architecture
TikTok The Web-Based Punchclock E. Edge J. Vu. Introduction Introduce Team Describe Our Project Architecture User Manual.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
11 ADMINISTERING MICROSOFT WINDOWS SERVER 2003 Chapter 2.
Scott Hoffpauir BroadSoft, Inc. Vice President, Engineering OPENSIG October 15, 1999 The Enhanced Services Layer in a Distributed Packet Network.
Proxy Servers Dr. Ronald Bergmann, CIO, ISO. Proxy servers A proxy server is a machine which acts as an intermediary between the computers of a local.
Adobe Flash Media Server. Outline What is Adobe Flash Media Server? What can we do with it? How the server works? How to install and set-up the server?
Hands-On Microsoft Windows Server Connecting Through Terminal Services Terminal server – Enables clients to run services and software applications.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
Dennis  Application Security Specialist  WhiteHat Security  Full-Time Student  University of Houston – Main Campus ▪ Computer.
IPNexus Briefing Instant Messaging and Collaboration.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
Product Overview T-Client Blue Sea Systems (Pvt.) Ltd.
Trimble Connected Community
Syteline Workflow WORKFLOW OVERVIEW What is Workflow? Knowledge management Document management Collaboration All terms referring to a WORKFLOW.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Module 1: Server Roles and Initial Configuration Tasks
CH2 System models.
BIAB T ECHNOLOGY (B RANCH -I N -A-B OX ). A GENDA BIAB Solution Components BIAB Benefits BIAB Infrastructure.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Opton 4 short presentation1 Opton 4 User friendly operating software for Symmetron’s Stylitis data loggers.
IPMI 2.0 Overview SOL-Serial redirection over Lan Management of servers and systems in a remote environment over LAN connections Allow IT managers to manage.
1 aba.com BANKERS Best Practices: Effective Release Management April Faulk, Senior Director of Elearning Technology Anna Phipps, Senior Director.
BOSS Business Objects Shared Service Steve Rademacher – June 2009.
Texas Forty-Two By: Nate Normandin CS 470. What is Texas Forty-Two? A Domino Game A way for people to learn the game A way for people to play others A.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Architecture Models. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Chapter 8: Objectives Explain how to use a server in a home or office network Install a server Set up a server Manage and monitor a server Design a server-based.
1 Makes Mobile WiMAX Simple Netspan Overview Andy Hobbs Director, Product Management 5 th October 2007.
BeamAuth : Two-Factor Web Authentication with a Bookmark 14 th ACM Conference on Computer and Communications Security Ben Adida Presenter : SJ Park.
COGNOS 8BI Introduction and Architecture
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Building Mobile Phone Applications With Windows Azure Nick HarrisWindows Azure Technical Evangelist Microsoft Blog:
File Server Architecture In File Server Architecture, file server can’t process the data but can only pass on the data to the client who can process it.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Attention After changing your internet browser (proxy) settings, you can only access those web sites allowed/directed by KHU Library. In order to browse.
Mobile + Cloud: Building Mobile Applications with Windows Azure Wade Wegner Blog:
How Web Database Architectures Work CPS181s April 8, 2003.
Windows Azure poDRw_Xi3Aw.
What the $#*! IS my password? Secure Online Password Storage Lon Smith Aaron Gremmert.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Core and Framework DIRAC Workshop October Marseille.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
How to be a SharePoint Developer
NodeJS Security Using PassportJS and HelmetJS:
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
SFS-HTTP: Securing the Web with Self-Certifying URLs
Module Overview Installing and Configuring a Network Policy Server
SCTP Handoff for Cluster Servers
Securing the Network Perimeter with ISA 2004
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Central Authentication Service
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Presentation transcript:

© 2010 – MAD Security, LLC All rights reserved Team Operations Collaborate with Armitage and Metasploit

Overview Team Operations Teaming Features Architecture and Setup Session Passing Using External Tools Team Organization

Team Operations

Armitage Teaming User Experience –Single user-like –Local control of Metasploit Teaming Features –Real Time Communication –Data Sharing –Session Sharing

Features: Event Log

Features: Data Sharing

Features: Session Sharing

Architecture

Setup Perform these steps on shared server… Start Metasploit’s RPC daemon –msfrpcd -U username -P password –f Start Deconfliction server –armitage --server attack_server_ip username password Connect clients!

Setup

Setup

Session Passing Inject meterpreter into memory Point at any multi/handler you like Uses: –Send session to a friend –Duplicate your access

Session Passing Inject meterpreter into memory Point at any multi/handler you like Uses: –Send session to a friend –Duplicate your access

Session Passing Inject meterpreter into memory Point at any multi/handler you like Uses: –Send session to a friend –Duplicate your access

External Tools In a team environment, not everyone will use Armitage –Everyone can still benefit from Armitage’s accesses Metasploit SOCKS proxy routes client traffic using pivot Web browsers may use a proxy server to connect

External Tools

Team Organization Split team into roles –Attack –Multiple post-exploitation roles Distribute attacks Centralize post-exploitation

Team Organization Use Armitage on big screen Event log augments existing communication channel External tools may play too (not everyone needs Armitage)

Summary Team Operations Teaming Features Architecture and Setup Session Passing Using External Tools Team Organization