Presentation is loading. Please wait.

Presentation is loading. Please wait.

Penetration Testing & Network Defense

Similar presentations


Presentation on theme: "Penetration Testing & Network Defense"— Presentation transcript:

1 Penetration Testing & Network Defense
Exploitation                     Peer Instruction Questions for Cybersecurity: Pentesting by William E. Johnson, Allison Luzader, Irfan Ahmed is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

2 Upon gaining access to a machine, you find a network interface running on a /24 network. How would you map it? Run nmap on your machine with a /24 masking based on that address Use Metasploit’s autoroute and run a port scan on /24 Use Metasploit’s migration feature to gain direct access to /24 Run a broadcast scan on all interfaces Answer: B Category: port scanning

3 You’ve exploited Notepad (gaining Meterpreter access) and expect that the user may close the application. What should you do to prevent losing your Meterpreter? Background the Meterpreter Re-exploit the machine Migrate to a different process Upload a new Meterpreter payload Replace the Meterpreter with a reverse Meterpreter Answer: C Category: metasploit, meterpreter

4 Using Metasploit, you’re able to fully access a Windows XP SP2 machine
Using Metasploit, you’re able to fully access a Windows XP SP2 machine. What would be the most efficient way to upload and execute a file from your attacking host? Use the windows/upexec/bind_tcp payload to upload and execute the file in Metasploit Use Metasploit to get a Meterpreter, then use the upload and execute commands to upload and execute the file Exploit the machine with MS08-067, get a shell with windows/shell/bind_tcp payload, download the file from your machine, and execute it. Use Netcat to transfer the file and execute it in a Meterpreter session Answer: A Category: metasploit No reason to spend unnecessary time for remote execution using Meterpreter, etc. when you can just use a quick payload The goal here is to leave the smallest footprint possible

5 You’ve exploited a set of machines, and need to run an identical set of Meterpreter commands on each one. How would you do this? Use Meterpreter’s execute command to execute a Meterpreter script Use Meterpreter’s resource command to execute a local script Use Meterpreter’s resource command to execute a script placed on the remote machines Use Meterpreter’s shell command to run a shell script with Meterpreter commands Answer: B Category: metasploit, meterpreter

6 You’ve exploited a machine, gained Meterpreter access, and run autoroute to access a new network from that machine. How do you run exploits against machines on the new network without losing your Meterpreter? Run the Meterpreter migrate command to migrate to a new Metasploit session Run the Meterpreter background command to return to the Msfconsole Run the Meterpreter clearenv command to clean Meterpreter’s environment for new exploits Run the Meterpreter resource command to save access to that machine Run the Meterpreter interact command to interact with the new machines Answer: B Category: metasploit, meterpreter


Download ppt "Penetration Testing & Network Defense"

Similar presentations


Ads by Google