The Use of Metasploit Tool in Development Lifecycle

Total Page:16

File Type:pdf, Size:1020Kb

The Use of Metasploit Tool in Development Lifecycle Masaryk University Faculty of Informatics The use of Metasploit tool in development lifecycle Bachelor’s Thesis Miroslav Maceček Brno, Spring 2016 Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Miroslav Maceček Advisor: RNDr. Petr Švenda, Ph.D. i Acknowledgement I would like to express my gratitude to my collegues and friends for their support. I woul like to thank to my advisor RNDr. Petr Švenda, Ph.D. for his patience. iii Abstract This bachelor thesis explore the use of Metasploit in the web applica- tion development process. Firstly, it describes structure and general workflow of an open source Metasploit Framework. It also describes most extensive plugin for web application testing Wmap. This plu- gin is tested against application Mutillidae II, which contains a lot of known vulnerabilities. The success of this test is evaluated afterwards. This text describe a couple different ways of creating customized test scenarios, which evaluates OwnCloud and LimeSurvey applications. iv Keywords Metasploit, penetration testing, web application, development process, Mutilidae II v Contents 1 Introduction ............................ 1 2 Metasploit ............................. 3 2.1 Metasploit Framework Components ............. 3 2.1.1 Libraries . 3 2.1.2 Interfaces . 3 2.1.3 Modules . 4 2.1.4 Mixins and Plugins . 5 2.2 General Workflow ....................... 5 3 Wmap Plugin ........................... 7 3.1 List of modules ........................ 7 3.1.1 wmap_ssl . 7 3.1.2 wmap_server . 7 3.1.3 wmap_dir . 9 3.1.4 wmap_file . 10 3.1.5 wmap_unique_query . 11 3.1.6 Managing modules . 11 4 Test Environment ......................... 13 4.1 Mutillidae II .......................... 13 4.2 LimeSurvey .......................... 14 4.3 OwnCloud .......................... 14 5 Use of the Metasploit ...................... 17 5.1 Mapping the Application ................... 17 5.2 Discovering Vulnerabilities . 18 5.3 Analyzing the Results .................... 19 5.3.1 Mutillidae II Results . 19 5.3.2 LimeSurvey Results . 21 5.3.3 OwnCloud Results . 21 6 Test Automation ......................... 23 6.1 Resource Scripts ........................ 23 6.2 Plugins ............................ 23 6.3 Auxiliary Module Custom Commands . 23 6.4 Custom Auxiliary Modules . 24 6.5 Metasploit Remote API .................... 24 6.6 Ruby Programming ...................... 24 7 Creating Resource Script .................... 25 vii 8 Conclusion ............................. 27 Bibliography . 29 A An appendix ............................ 31 viii 1 Introduction Web applications take important role in today’s world. They perform lot of useful functions and they are used daily by a significant amount of people. A lot of users count on them without realising that neither of them is a 100% secure. There are applications which contain or han- dle financial transactions, personal information, classified or private documents. These data draw attackers, seeking their way to gain an unauthorized access to them and eventually selling them or releasing them publicly. Every successful attack can cause significant losses to the owners and to the companies responsible for the data. To prevent such damage a penetration testing was introduced. The purpose of this thesis is to explore the possibilities of Metas- ploit[1] as a tool for the web application penetration testing. This verification consists of running and evaluating tests on the application with known vulnerabilities Mutillidae II[2]. Large partion of the text describes Wmap plugin. 1 2 Metasploit Metasploit Project was started in 2003 by H. D. Moore as a computer security project to provide a public resource to exploit development. One of its most famous sub-projects is Metasploit Framework. It used to be written in Perl, but it was completely rewritten in Ruby in 2007. This originally open source project has been acquired by a commercial security company Rapid7 in 2009[3]. 2.1 Metasploit Framework Components Metasploit Framework is a modular system based on a few core com- ponents: libraries, interfaces, modules, mixins, and plugins[4]. 2.1.1 Libraries At the core of Metasploit Framework are libraries. These libraries contain a set of classes and utilities that manage the various parts of Metasploit Framework, such as modules, plugins, and interfaces. ∙ REX - Ruby Extension Library, is the most fundamental com- ponent of Metasploit Framework. It handles sockets, protocols, servers and text transformations. ∙ Core - The Core library (msfcore) provides the basic API. It en- ables exploits, sessions, and plugins to interact with the different interfaces. ∙ Base - The Base library (msfbase) provides wrapper routines and utility classes for easier work with the Core library. 2.1.2 Interfaces There are several interfaces that can be used to access and utilize the functionality of Metasploit Framework. ∙ MSFconsole - The console interface, also known as msfconsole, provides an easy and interactive way to access the features and options within Metasploit Framework. 3 2. Metasploit ∙ MSFgui - MSFgui is a Java based graphical interface that pro- vides the same functionality as the console with the additional benefits of GUI. Additionally, msfgui enables you to connect to a remote msfrpcd session on a remote host. ∙ MSFcli - MSFcli runs directly from the command line. MSFcli enables you to automate exploit testing without the use of an interactive interface. ∙ Armitage - Armitage is a graphical user interface that visually streamlines the features within the Metasploit Framework, such as host discovery, server-side and client-side exploitation, pivot- ing, and privilege escalation. 2.1.3 Modules Modules are the core components of Metasploit Framework. A mod- ule is a piece of software that can perform a specific action, such as exploitation, fuzzing, and scanning. Each task that you can perform with Metasploit Framework is defined within a module. Modules that are available can be located in the following directory: <installation di- rectory>/metasploit/msf3/modules. There are several module types available that depend on the purpose of the module and the type of action that the module performs. ∙ Exploit - Executes a sequence of commands to target a specific vulnerability in order to provide the attacker with access to the targeted system. ∙ Auxiliary - Performs arbitrary actions like information gathering, database fingerprinting, network scanning. ∙ Post-Exploitation - Enables attacker to gather more informations or to gain further access. ∙ Payload - It is the shell code that runs after an exploit successfully compromises a system. The payload enables attacker to define how he wants to connect to the shell and what he wants to do to the target system. 4 2. Metasploit ∙ NOP generator - Generates a series of random bytes that can be used to bypass standard IDS (Intrusion Detection System) and IPS (Intrusion Prevention System) NOP sled signatures. ∙ Payload encoder - A payload encoder enables attacker to evade IDS and IPS signatures that are looking for specific bytes of a payload. 2.1.4 Mixins and Plugins A mixin provides way for sharing a code between modules. A plugin works directly with the API. It is a component that extends, enhances or alters the functionality of the Metasploit Framework. 2.2 General Workflow The following section provides a brief description of the general work- flow for the Metasploit Framework. ∙ Choose a module - The type of module which user should use is defined by the purpose of the task. All modules can be listed by show all command. If the user already knows what kind of module does he need, he can narrow down the search by entering show and the type of module mentioned in 2.1.3 eg. show Payload. Selected module has to be loaded via load for future usage. ∙ Configure the module - Available options for loaded module can be displayed by show option. If an option is required, user must specify a value for it. Otherwise, it can be left empty. ∙ Set the option - For specifying options, user can use set and unset command. Changes made with these commands work only within the current module context. ∙ Select a target - before running an exploit module, the user has to choose a vulnerable target. List of potential targets can be displayed by show targets. 5 2. Metasploit ∙ Select a payload - After selecting the target, user can display list of payloads for given vulnerability with show payloads. The chosen payload has to be set with set command. ∙ Run the module - The command for running the module is exploit. 6 3 Wmap Plugin Wmap is a web application scanner for Metasploit originatelly created from the tool SQLMap[5]. It is integrated in Metasploit Framework and it consists of several modules. „As of Metasploit Framework version 3.3.2, every exploit module has been assigned a rank based on its potential impact to the target system."[6] Nearly all of the 39 default modules have normal ranking, which means that „The exploit is otherwise reliable, but depends on a specific version and can’t (or doesn’t) reliably autodetect."[6] There is one exception. It is the module exploit/multi/http/lcms_php_exec with excellent ranking (exploit will never crash the service). Since there is no available data supporting this ranking system I did not consider it meaningful and reliable. This plugin is capable of reading all gathered traffic stored in the Metasploit database. The test itself runs all enabled modules and allows user to configure nodes for distributed clients storing all results to the central database. In case there are no nodes configured, the test will be run from the local host. 3.1 List of modules 3.1.1 wmap_ssl auxiliary/scanner/http/cert This module checks the server certificate if it is valid and not expired. auxiliary/scanner/http/ssl Parse the server SSL certificate to obtain the common name and signa- ture algorithm. 3.1.2 wmap_server auxiliary/admin/http/tomcat_administration Detects the Tomcat administration interface.
Recommended publications
  • Oracle with Metasploit
    Oracle Penetration Testing Using the Metasploit Framework Chris Gates & Mario Ceballos Metasploit Project Abstract Over the years there have been tons of Oracle exploits, SQL Injection vulnerabilities, and post exploitation tricks and tools that had no order, methodology, or standardization, mainly just random .sql files. Additionally, none of the publicly available Pentest Frameworks have the ability to leverage built- in package SQL Injection vulnerabilities for privilege escalation, data extraction, or getting operating system access. In this whitepaper we will present an Oracle Pentesting Methodology and give you all the tools to break the "unbreakable" Oracle as Metasploit auxiliary modules. We've created your version and SID enumeration modules, account bruteforcing modules, ported all the public (and not so public) Oracle SQL Injection vulnerabilities into SQLI modules (with IDS evasion examples for 10g/11g), modules for OS interaction, and modules for automating some of our post exploitation tasks. The modules are currently only supported under Linux and OSX. Oracle Penetration Testing Methodology Locate a system running Oracle. Determine Oracle Version. Determine Oracle SID. Guess/Bruteforce USERNAME/PASS. Privilege Escalation via SQL Injection. Manipulate Data/Post Exploitation. Cover Tracks. Locating an Oracle System You will typically find most Oracle installations by performing port scanning in the target netblock. The Oracle listener default port is 1521 but can listen on an port generally in the 1521-1540 range. You can also discover oracle instances by scanning other common Oracle ports. Review http://www.red- database-security.com/whitepaper/oracle_default_ports.html for common Oracle ports. Generally running a service scan will NOT give you the Oracle TNS Listener version but updated fingerprints for new versions of Nmap may yield versions in some situations.
    [Show full text]
  • Software Assurance
    Information Assurance State-of-the-Art Report Technology Analysis Center (IATAC) SOAR (SOAR) July 31, 2007 Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance Distribution Statement A E X C E E C L I L V E R N E Approved for public release; C S E I N N I IO DoD Data & Analysis Center for Software NF OR MAT distribution is unlimited. Information Assurance Technology Analysis Center (IATAC) Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance State-of-the-Art Report (SOAR) July 31, 2007 IATAC Authors: Karen Mercedes Goertzel Theodore Winograd Holly Lynne McKinley Lyndon Oh Michael Colon DACS Authors: Thomas McGibbon Elaine Fedchak Robert Vienneau Coordinating Editor: Karen Mercedes Goertzel Copy Editors: Margo Goldman Linda Billard Carolyn Quinn Creative Directors: Christina P. McNemar K. Ahnie Jenkins Art Director, Cover, and Book Design: Don Rowe Production: Brad Whitford Illustrations: Dustin Hurt Brad Whitford About the Authors Karen Mercedes Goertzel Information Assurance Technology Analysis Center (IATAC) Karen Mercedes Goertzel is a subject matter expert in software security assurance and information assurance, particularly multilevel secure systems and cross-domain information sharing. She supports the Department of Homeland Security Software Assurance Program and the National Security Agency’s Center for Assured Software, and was lead technologist for 3 years on the Defense Information Systems Agency (DISA) Application Security Program. Ms. Goertzel is currently lead author of a report on the state-of-the-art in software security assurance, and has also led in the creation of state-of-the-art reports for the Department of Defense (DoD) on information assurance and computer network defense technologies and research.
    [Show full text]
  • Metasploit Framework «Back|Track-[IT]
    Metasploit Framework www.backtrack.it «Back|Track-[IT] www.backtrack.it (c) 2009 brigante - fiocinino [email protected] [email protected] Metasploit Framework Metasploit Framework www.backtrack.it Metasploit Framework www.backtrack.it Questo documento è rivolto a tutti coloro che vogliono conoscere cos'é, come viene utilizzato e cosa comporta l' uso del “Metasploit Framework”, parte del Metasploit Project. Metasploit è più di un semplice progetto per la sicurezza informatica, è un vero è proprio insieme di strumenti, (appunto denominato Framework), che ha praticamente rivoluzionato l' intero mondo della sicurezza informatica. Come per la stragrande maggioranza della nostra documentazione verrà, anche in questo documento, dato spazio sia alla parte teorica che alla parte pratica e descrittiva, con svariati esempi e con la descrizione dettagliata alcuni nostri video, reperibili naturalmente dall' apposita sezione del nostro portale. “Che cos'é Metasploit” Metasploit Project nasce con l' intento di fornire informazioni su vulnerabilità, sviluppo di sistemi di rilevamento di intrusioni e semplificare le operazioni di penetration testing. Il sub-project più conosciuto è il Metasploit Framework, un' insieme di strumenti per lo sviluppo e l'esecuzione di exploits, di shellcodes, auxiliary, opcode noto per lo sviluppo di strumenti di elusione ed anti- rilevamento. Uno dei principali Goals del “Metasploit Project” è quello di mirare principalmente a fornire informazioni utili allo sviluppo di nuove tecniche di pentesting e di firme per
    [Show full text]
  • Metasploit Pro User Guide
    4.11 USER GUIDE Getting Started First things first. If you haven't installed Metasploit yet, check out this these instructions if you're a commercial user. Otherwise, if you already have Metasploit installed, congratulations! You've come to the right place to get started. What's Metasploit? Metasploit is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts: Metasploit Pro, Express, Community, and Nexpose Ultimate. Metasploit Framework The Metasploit Framework is the foundation on which the commercial products are built. It is an open source project that provides the infrastructure, content, and tools to perform penetration tests and extensive security auditing. Thanks to the open source community and Rapid7's own hard working content team, new modules are added on a regular basis, which means that the latest exploit is available to you as soon as it's published. There are quite a few resources available online to help you learn how to use the Metasploit Framework; however, we highly recommend that you take a look at the Metasploit Framework Wiki, which is maintained by Rapid7's content team, to ensure that you have the most up to date information available. You can also use the sidebar navigation on the left to view the documentation that is available on this site; just click on the Metasploit Framework topic or search for the topic you want. Either way, if you are unable to find what you need, let us know, and we will add it to the documentation back log.
    [Show full text]
  • An Encrypted Payload Protocol and Target-Side Scripting Engine
    An Encrypted Payload Protocol and Target-Side Scripting Engine Dino A. Dai Zovi [email protected] Abstract into the remote process and then triggering the vulnera- Modern exploit payloads in commercial and open-source bility (the injection vector) in order to cause the remote penetration testing frameworks have grown much more process to execute the injected code (the payload). Tra- advanced than the traditional shellcode they replaced. ditionally, these payloads have been written in processor- These payloads permit interactive access without launch- specific assembly language, assembled, and extracted by ing a shell, network proxying, and many other rich fea- hand into reusable machine code components. These tures. Available payload frameworks have several lim- payloads were typically small and executed an operating itations, however. They make little use of encryption to system shell, causing them to be commonly referred to secure delivery and communications, especially in earlier as shellcode. Common shellcode variants included func- stage payloads. In addition, their richer features require tionality such as restoring dropped privileges, breaking a constant network connection to the penetration tester, out of chroot environments, and attaching the shell to making them unsuitable against mobile clients, such as an inbound or outbound network connection. This style laptops, PDAs, and smart phones. of payload construction was both labor and skill inten- This work introduces a first-stage exploit payload that sive. is able to securely establish an encrypted channel using With the growth of commercial penetration testing ElGamal key agreement and the RC4 stream cipher. The services and especially commercial penetration test- key agreement implementation requires only modular ing products, exploit payloads have gotten considerably exponentiation and RC4 also lends itself to an implemen- more capable and complex.
    [Show full text]
  • Metasploit Framework - Guide for Pentesters Ii
    Metasploit Framework - guide for pentesters ii Copyright © 2012 Software Media Sp. z o.o. SK Editor in Chief: Ewa Dudzic [email protected] Managing Editor: Aleksandra Cacko [email protected] DTP: Andrzej Kuca, Lalit Agarwal, Aleksandra Cacko Art Director: Andrzej Kuca [email protected] Graphics and cover: Ireneusz Pogroszewski Proofreaders: Edward Werzyn, Gareth Watters Top Betatesters: Stefanus Natahusada, Steven Wierckx Special Thanks to the Beta testers and Proofreaders who helped us with this issue. Without their assistance there would not be a PenTest e-book. Senior Consultant/Publisher: Pawel Marciniak Production Director: Andrzej Kuca Publisher: Software Media 02-682 Warszawa, ul. Bokserska 1 http://pentestmag.com/ First edition Issue 2/2012 (2) ISSN 2084-1116 Whilst every effort has been made to ensure the high quality of the e-book, the editors make no warranty, express or implied, concerning the results of content usage. All trademarks presented in the magazine were used only for informative purposes. All rights to trade marks presented in the magazine are reserved by the companies which own them. DISCLAIMER! The techniques described in our articles may only be used in private, local networks. The editors hold no responsibility for misuse of the presented techniques or consequent data loss. Metasploit Framework - guide for pentesters iv Contents 1 Metasploit: An Introduction 1 What is Metasploit? . .1 Architecture of Metasploit: . .2 Platform Used for demonstration . .2 Metasploit Interfaces: . .3 Good Practices for using Metasploit: . .3 Updating via Msfupdate . .3 Port scanning via Nmap . .4 Meterpreter: Metasploit’s Payload . .4 What typically payloads allow you to do after execution of exploit? .
    [Show full text]
  • Anex: Automated Network Exploitation Through
    ANEX: AUTOMATED NETWORK EXPLOITATION THROUGH PENETRATION TESTING A Thesis presented to the Faculty of California Polytechnic State University, San Luis Obispo In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Eric Francis Dazet June 2016 c 2016 Eric Francis Dazet ALL RIGHTS RESERVED ii COMMITTEE MEMBERSHIP TITLE: ANEX: Automated Network Exploitation through Penetration Testing AUTHOR: Eric Francis Dazet DATE SUBMITTED: June 2016 COMMITTEE CHAIR: Bruce Edward DeBruhl II, Ph.D. Assistant Professor of Computer Science COMMITTEE MEMBER: Zachary J. Peterson, Ph.D. Associate Professor of Computer Science COMMITTEE MEMBER: Phillip Nico, Ph.D. Professor of Computer Science iii ABSTRACT ANEX: Automated Network Exploitation through Penetration Testing Eric Francis Dazet Cyber attacks are a growing concern in our modern world, making security evalua- tion a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a sys- tem's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration testing tools are not as effective as manual tests. They are not as flexible as manual testing, cannot discover every vulnerability, and can lead to a false sense of security. The development of better automated tools can help organizations quickly and frequently know the state of their security measures and can help improve the manual penetration testing process by accelerating repetitive tasks without sacrificing results.
    [Show full text]
  • Metasploit Framework
    . Metasploitation A CanSecWest Presentation Original Presenter: HD Moore Presentation and Additional Information: Tyler Reguly Who is this guy? Who am I? Graduate of Fanshawe College ± Computer Systems Technology 3-year diploma Previously worked at Fanshawe College in student support and as a Sys Admin for a small marketing company Worked doing quasi-International web development for the past 5 years. Now at nCircle as a Vulnerability and Exposure Research Engineer Also a moderator on AntiOnline.com Maintain the ComputerDefense.org blog. © Toronto Area Security Klatch 2005 www.TASK.to Why are we here? The goal tonight? Cover information introduced by H.D. Moore at CanSecWest. We¶ll provide you with background information on the Metasploit project and Metasploit Framework. Basic Framework usage Functional differences between Framework versions Various Metasploit Project Web Fuzzers Brief overview of other sections of the Metasploit Project © Toronto Area Security Klatch 2005 www.TASK.to Meta-what? What is Metasploit? Metasploit itself is nothing« it¶s not even a word« but it¶s come to mean so much more. Metasploit has come to be synonymous with the Metasploit Framework. Metasploit is actually The Metasploit Project. Whose goal is to provide information that will be useful in Pentration Testing, IDS Signature Development and exploit research. The Metasploit Framework is one aspect of the Metasploit Project. Other parts of the project include: MSRT, MAFIA, Hamachi, etc. © Toronto Area Security Klatch 2005 www.TASK.to Metasploit Framework The framework is an open-source platform for developing, testing and using exploit code. (Point µn Click Hacking) The current ³stable´ version is version 2.5 Primarily written in perl, sections that are written in C, python and assembly.
    [Show full text]
  • Buffer Overflows and Software Security
    ECE590 Computer and Information Security Fall 2019 Buffer Overflows and Software Security Tyler Bletsch Duke University What is a Buffer Overflow? • Intent ▪ Arbitrary code execution • Spawn a remote shell or infect with worm/virus ▪ Denial of service • Steps ▪ Inject attack code into buffer ▪ Redirect control flow to attack code ▪ Execute attack code 3 Buffer Problem: Data overwrite int main(int argc, char *argv[]) { char passwd_ok = 0; char passwd[8]; strcpy(passwd, argv[1]); if (strcmp(passwd, "niklas")==0) passwd_ok = 1; if (passwd_ok) { ... } } Layout in memory: longpassword1 • passwd buffer overflowed, overwriting passwd_ok flag ▪ Any password accepted! 7 Another Example: Code injection via function pointer char buffer[100]; void (*func)(char*) = thisfunc; strcpy(buffer, argv[1]); func(buffer); arbitrarycodeX • Problems? ▪ Overwrite function pointer • Execute code arbitrary code in buffer 8 Stack Attacks: Code injection via return address • When a function is called… ▪ parameters are pushed on stack ▪ return address pushed on stack ▪ called function puts local variables on the stack • Memory layout arbitrarystuffX • Problems? ▪ Return to address X which may execute arbitrary code 9 Demo cool.c #include <stdlib.h> #include <stdio.h> int main() { char name[1024]; printf("What is your name? "); scanf("%s",name); printf("%s is cool.\n", name); return 0; } 10 Demo – normal execution 11 Demo – exploit 12 How to write attacks • Use NASM, an assembler: ▪ Great for machine code and specifying data fields attack.asm %define buffer_size 1024
    [Show full text]
  • Code Security
    Chapter 8 Code Security Introduction to IT Security 378 Software security is hard ■ One of the main problems in software engineering at the moment □ often poor programming because of lacking education/awareness in developers and bad tooling (languages/platforms making mistakes too easy to make and impact of mistakes too severe) □ often due to project deadlines ■ Unclear how to practically write correct and secure code, even with increased project resources □ formal validation is extremely costly, not clear how to do on complex code bases ■ Therefore many security relevant errors in currently deployed code ■ Classification of security problems: “Common Weakness Enumeration” (CWE) at https://cwe.mitre.org/ ■ Publicly known software vulnerabilities: “Common Vulnerabilities and Exposures” (CVE) at https://cve.mitre.org/ Introduction to IT Security 379 CWE/SANS Top 25 most dangerous software errors Insecure Interaction Between Components ■ CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ■ CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') ■ CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ■ CWE-434 Unrestricted Upload of File with Dangerous Type ■ CWE-352 Cross-Site Request Forgery (CSRF) ■ CWE-601 URL Redirection to Untrusted Site ('Open Redirect') http://www.sans.org/top25-software-errors/ Introduction to IT Security 380 CWE/SANS Top 25 most dangerous software errors Risky Resource Management ■ CWE-120 Buffer
    [Show full text]
  • Network Exploitation Using Metasploit Framework
    NETWORK EXPLOITATION USING METASPLOIT FRAMEWORK MRS.B.SINDHIYA M.PHIL ASSISTANT PROFESSOR E.VIJAY DEPARTMENT OF COMPUTER SCIENCE MSC SHOLAR SRI KRISHNA ARTS AND SCIENCE COLLEGE DEPARTMENT OF COMPUTER SCIENCE COIMBATORE, INDIA. SRI KRISHNA ARTS AND SCIENCE COLLEGE [email protected] COIMBATORE, INDIA. [email protected] ABSTRACT vendors, who develop patches for them. The countermeasures for each and every attack have In computer networks, network attack is referred as to be precise in order to keep information security "any attempt to destroy, expose, alter, disable, steal intact. or gain unauthorized access to or make unauthorized use of an asset. 1. INTRODUCTION The proposed Network Exploitation using An exploit is a piece of software, a chunk Metasploit framework aims at finding the of data, or sequence of commands that takes weakness of any network (LAN) and working advantage of a bug, glitch or vulnerability in order towards the main objective of compromising the to cause unintended or unanticipated behavior to target network for exploitation. This helps in occur on computer software, hardware, or identifying how network are configured weakly something electronic (usually computerized). which are prone to network attacks by third Such behavior frequently includes such things as parties or anonymous people and what measures gaining control of a computer system or allowing can be done in order to overcome these types of privilege escalation or a denial-of-service attack. attacks, Computer Network Exploitation (CNE): The Metasploit Framework is a penetration Includes enabling actions and intelligence testing toolkit, exploit development platform, and collection via computer networks that exploit research tool.
    [Show full text]
  • Metasploit-The-Penetration-Tester-S
    “The best guide to the Metasploit Metasploit Framework.” — HD Moore, Metasploit Founder of the Metasploit Project The Penetration Tester’s Guide The Metasploit Framework makes discovering, Bypass antivirus technologies and circumvent exploiting, and sharing vulnerabilities quick and security controls relatively painless. But while Metasploit is used by Integrate Nmap, NeXpose, and Nessus with security professionals everywhere, the tool can be Guide Tester’s Penetration The Metasploit to automate discovery hard to grasp for first-time users. Metasploit: The Penetration Tester’s Guide fills this gap by teaching you Use the Meterpreter shell to launch further how to harness the Framework and interact with the attacks from inside the network vibrant community of Metasploit contributors. Harness stand-alone Metasploit utilities, third- Once you’ve built your foundation for penetration party tools, and plug-ins testing, you’ll learn the Framework’s conventions, Learn how to write your own Meterpreter post- interfaces, and module system as you launch simulated exploitation modules and scripts attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and You’ll even touch on exploit discovery for zero-day enumeration, client-side attacks, wireless attacks, and research, write a fuzzer, port existing exploits into the targeted social-engineering attacks. Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put Learn how to: someone else’s to the test, Metasploit: The Penetration Find and exploit unmaintained, misconfigured, and Tester’s Guide will take you there and beyond. unpatched systems Perform reconnaissance and find valuable information about your target Kennedy O’Gorman THE FINEST IN GEEK ENTERTAINMENT™ “I LAY FLAT.” This book uses RepKover — a durable binding that won’t snap shut.
    [Show full text]