Network Exploitation Using Metasploit Framework

Total Page:16

File Type:pdf, Size:1020Kb

Network Exploitation Using Metasploit Framework NETWORK EXPLOITATION USING METASPLOIT FRAMEWORK MRS.B.SINDHIYA M.PHIL ASSISTANT PROFESSOR E.VIJAY DEPARTMENT OF COMPUTER SCIENCE MSC SHOLAR SRI KRISHNA ARTS AND SCIENCE COLLEGE DEPARTMENT OF COMPUTER SCIENCE COIMBATORE, INDIA. SRI KRISHNA ARTS AND SCIENCE COLLEGE [email protected] COIMBATORE, INDIA. [email protected] ABSTRACT vendors, who develop patches for them. The countermeasures for each and every attack have In computer networks, network attack is referred as to be precise in order to keep information security "any attempt to destroy, expose, alter, disable, steal intact. or gain unauthorized access to or make unauthorized use of an asset. 1. INTRODUCTION The proposed Network Exploitation using An exploit is a piece of software, a chunk Metasploit framework aims at finding the of data, or sequence of commands that takes weakness of any network (LAN) and working advantage of a bug, glitch or vulnerability in order towards the main objective of compromising the to cause unintended or unanticipated behavior to target network for exploitation. This helps in occur on computer software, hardware, or identifying how network are configured weakly something electronic (usually computerized). which are prone to network attacks by third Such behavior frequently includes such things as parties or anonymous people and what measures gaining control of a computer system or allowing can be done in order to overcome these types of privilege escalation or a denial-of-service attack. attacks, Computer Network Exploitation (CNE): The Metasploit Framework is a penetration Includes enabling actions and intelligence testing toolkit, exploit development platform, and collection via computer networks that exploit research tool. The framework includes hundreds data gathered from target or enemy of working remote exploits for a variety of information systems or networks. platforms. Payloads, encoders, and nop slide Metasploit Framework is an open source attack generators can be mixed and matched with framework first developed by H. D. Moore in 2003. exploit modules to solve almost any exploit- Metasploit is used for hacking into systems for related task. Exploit is a piece of code that testing purposes. Metasploit provides useful exploits a software bug leading to a security hole information to people who perform penetration There is a never ending race between the testing, IDS signature development, and exploit 97 attackers, who try to find loopholes, and the research. With the latest Metasploit 3.0 release, the project has moved to an all Ruby programming exploit and payload, some information about the base.Metasploit Framework, a tool for developing target system is needed, such as operating system and executing exploit code against a remote target version and installed network services. This machine. Other important sub-projects include the information can be gleaned with port scanning Opcode Database, shell code archive and related and OS fingerprinting tools such as Nmap. Vulnerability scanners such as Expose or Nesses research. The Metasploit Project is well known for can detect target system vulnerabilities. its anti-forensic and evasion tools, some of which Metasploit can import vulnerability scan data are built into the Metasploit Framework. and compare the identified vulnerabilities to existing exploit modules for accurate Choosing and configuring an exploit (code exploitation. that enters a target system by taking advantage of one of its bugs; about 900 different exploits for Windows, Unix/Linux and Mac OS X 3. Nmap ("Network Mapper") is a free and open systems are included); Optionally checking source (license) utility for network discovery and whether the intended target system is security auditing. Many systems and network susceptible to the chosen exploit; Choosing administrators also find it useful for tasks such as and configuring a payload (code that will be network inventory, managing service upgrade executed on the target system upon successful schedules, and monitoring host or service entry; for instance, a remote shell or a VNC uptime. Nmap uses raw IP packets in novel ways server); Choosing the encoding technique so to determine what hosts are available on the that the intrusion-prevention system (IPS) network, what services (application name and ignores the encoded payload; version) those hosts are offering, what operating systems (and OS versions) they are running, Executing the exploit, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but 1. This modular approach – allowing the works fine against single hosts. Nmap runs on all combination of any exploit with any major computer operating systems, and official payload – is the major advantage of the binary packages are available forLinux, Framework. It facilitates the tasks of Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the attackers, exploit writers and payload Nmap suite includes an advanced GUI and writers. results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility 2. Metasploit runs on UNIX (including Linux and for comparing scan results (Ndiff), and a packet Mac OS X) and on Windows. It includes two generation and response analysis tool (Nping). command-line interfaces, a web-based interface and a native GUI. The web interface is intended to be run from the attacker's computer. The Metasploit Framework can be extended to use add-ons in multiple languages. To choose an 2. SYSTEM STUDY Nowadays, wired networks, especially the Internet, have already become a platform to support not only high 2.1 EXISTING SYSTEM In broad sense, hacking toolkits include not only the software 2.1.1DRAWBACKS To start, a program cannot be installed unless you have access to the root of a certain operating system, which means you sho • A sniffer can only sniff around where the victim’s machineNMAP is linked. facilitates the following features • Data which sniffer tries to capture is often filtered and scannedFlexible: for Supports specific constraintsdozens of andadvanced keywords techniques for mapping out networksfilled with IP filters, • Usually the presence of a sniffer on the network can firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), 2.2. PROPOSED SYSTEM OS detection, version detection, ping sweeps, and more. The proposed system recommends the usage of two efficient tools (NMAP & MSF) which would eventually over the drawbacks of the Powerful: Nmap has been used to scan huge 2.2.1 FEATURES networks of literally hundreds ofthousands of Metasploit framework has many extensive features whichmachines. makes it easier to work, which includes the following Msfconsole - Metasploit interactive session Portable: Most operating systems are supported, including Linux, MicrosoftWindows, FreeBSD, Msfcli- execute exploit without interactive session OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, SunOS, Amiga, and more. Msfd- a daemon to share a single session Easy: While Nmap offers a rich set of advanced Msfgui- the Metasploit GUI application features for power users,you can start out as simply as "nmap -v -A targethost". Both traditional Msfweb- the Metasploit web interface command line and graphical (GUI) versions are Msfpayload - list supported payloads available to suit our preference. Binaries are available for those who do not wish to compile Msfencode- use Metasploit encoder Nmap from source. msfopcode- an interface to the opcode database Free: The primary goals of the Nmap Project is to help make the Internet a msfelfscan- search an ELF for a specific opcode Littlemore secure and to provide msfpescan- search a PE for a specific opcode administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source For more information on Cygwin, please see the code that you may modify and redistribute under Cygwin web site at http://www.cygwin.com/ To the terms of the license. install the Framework on Windows, download the latest version of the Windows installer from 3.2 INPUT DESIGN http://framework.metasploit.com/, perform an Installing the Framework is as easy as extracting the online update, and launch the msfweb interface. tar ball, changing into the created directory, and Once msfweb is running, access the executing your preferred user interface. We strongly http://127.0.0.1:55555/URL from within your recommend that you use a version of the Ruby browser. At this time, only Mozilla and Internet interpreter that was built with support for the GNU Explorer are fully supported. read line library. If you are using the Framework on 3.3 OUTPUT DESIGN Mac OS X, you will need to install GNU read line and then recompile the Ruby interpreter. Using a version From the msfconsole interface, you can of Ruby with read line support enables tab view the list of modules that are available for you to completion of the console interface. The msfconsole interact with. You can see all available modules user interface is preferred for everyday use, but the through the show all command. To see the list of msfweb interface can be useful for live modules of a particular type you can use the show demonstrations. To perform a system-wide module type command, where module type is any installation, we recommend that you copy the en- one of exploits, encoders, payloads, and so on. You tire Framework directory into a globally accessible can select a module with the use command by location (/usr/local/msf) and then create symbolic specifying the module‟s name as the argument. The links from the msf* applications to a directory in the info command can be used to view information system path (/usr/local/bin). User-specific modules about a module without using it. Unlike Metasploit can be placed into HOME/.msf3/modules directory. 2.x, the new version of Metasploit supports The structure of this directory should mirror that of interacting with each different module types through the use command.
Recommended publications
  • Oracle with Metasploit
    Oracle Penetration Testing Using the Metasploit Framework Chris Gates & Mario Ceballos Metasploit Project Abstract Over the years there have been tons of Oracle exploits, SQL Injection vulnerabilities, and post exploitation tricks and tools that had no order, methodology, or standardization, mainly just random .sql files. Additionally, none of the publicly available Pentest Frameworks have the ability to leverage built- in package SQL Injection vulnerabilities for privilege escalation, data extraction, or getting operating system access. In this whitepaper we will present an Oracle Pentesting Methodology and give you all the tools to break the "unbreakable" Oracle as Metasploit auxiliary modules. We've created your version and SID enumeration modules, account bruteforcing modules, ported all the public (and not so public) Oracle SQL Injection vulnerabilities into SQLI modules (with IDS evasion examples for 10g/11g), modules for OS interaction, and modules for automating some of our post exploitation tasks. The modules are currently only supported under Linux and OSX. Oracle Penetration Testing Methodology Locate a system running Oracle. Determine Oracle Version. Determine Oracle SID. Guess/Bruteforce USERNAME/PASS. Privilege Escalation via SQL Injection. Manipulate Data/Post Exploitation. Cover Tracks. Locating an Oracle System You will typically find most Oracle installations by performing port scanning in the target netblock. The Oracle listener default port is 1521 but can listen on an port generally in the 1521-1540 range. You can also discover oracle instances by scanning other common Oracle ports. Review http://www.red- database-security.com/whitepaper/oracle_default_ports.html for common Oracle ports. Generally running a service scan will NOT give you the Oracle TNS Listener version but updated fingerprints for new versions of Nmap may yield versions in some situations.
    [Show full text]
  • Software Assurance
    Information Assurance State-of-the-Art Report Technology Analysis Center (IATAC) SOAR (SOAR) July 31, 2007 Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance Distribution Statement A E X C E E C L I L V E R N E Approved for public release; C S E I N N I IO DoD Data & Analysis Center for Software NF OR MAT distribution is unlimited. Information Assurance Technology Analysis Center (IATAC) Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance State-of-the-Art Report (SOAR) July 31, 2007 IATAC Authors: Karen Mercedes Goertzel Theodore Winograd Holly Lynne McKinley Lyndon Oh Michael Colon DACS Authors: Thomas McGibbon Elaine Fedchak Robert Vienneau Coordinating Editor: Karen Mercedes Goertzel Copy Editors: Margo Goldman Linda Billard Carolyn Quinn Creative Directors: Christina P. McNemar K. Ahnie Jenkins Art Director, Cover, and Book Design: Don Rowe Production: Brad Whitford Illustrations: Dustin Hurt Brad Whitford About the Authors Karen Mercedes Goertzel Information Assurance Technology Analysis Center (IATAC) Karen Mercedes Goertzel is a subject matter expert in software security assurance and information assurance, particularly multilevel secure systems and cross-domain information sharing. She supports the Department of Homeland Security Software Assurance Program and the National Security Agency’s Center for Assured Software, and was lead technologist for 3 years on the Defense Information Systems Agency (DISA) Application Security Program. Ms. Goertzel is currently lead author of a report on the state-of-the-art in software security assurance, and has also led in the creation of state-of-the-art reports for the Department of Defense (DoD) on information assurance and computer network defense technologies and research.
    [Show full text]
  • Metasploit Framework «Back|Track-[IT]
    Metasploit Framework www.backtrack.it «Back|Track-[IT] www.backtrack.it (c) 2009 brigante - fiocinino [email protected] [email protected] Metasploit Framework Metasploit Framework www.backtrack.it Metasploit Framework www.backtrack.it Questo documento è rivolto a tutti coloro che vogliono conoscere cos'é, come viene utilizzato e cosa comporta l' uso del “Metasploit Framework”, parte del Metasploit Project. Metasploit è più di un semplice progetto per la sicurezza informatica, è un vero è proprio insieme di strumenti, (appunto denominato Framework), che ha praticamente rivoluzionato l' intero mondo della sicurezza informatica. Come per la stragrande maggioranza della nostra documentazione verrà, anche in questo documento, dato spazio sia alla parte teorica che alla parte pratica e descrittiva, con svariati esempi e con la descrizione dettagliata alcuni nostri video, reperibili naturalmente dall' apposita sezione del nostro portale. “Che cos'é Metasploit” Metasploit Project nasce con l' intento di fornire informazioni su vulnerabilità, sviluppo di sistemi di rilevamento di intrusioni e semplificare le operazioni di penetration testing. Il sub-project più conosciuto è il Metasploit Framework, un' insieme di strumenti per lo sviluppo e l'esecuzione di exploits, di shellcodes, auxiliary, opcode noto per lo sviluppo di strumenti di elusione ed anti- rilevamento. Uno dei principali Goals del “Metasploit Project” è quello di mirare principalmente a fornire informazioni utili allo sviluppo di nuove tecniche di pentesting e di firme per
    [Show full text]
  • Metasploit Pro User Guide
    4.11 USER GUIDE Getting Started First things first. If you haven't installed Metasploit yet, check out this these instructions if you're a commercial user. Otherwise, if you already have Metasploit installed, congratulations! You've come to the right place to get started. What's Metasploit? Metasploit is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts: Metasploit Pro, Express, Community, and Nexpose Ultimate. Metasploit Framework The Metasploit Framework is the foundation on which the commercial products are built. It is an open source project that provides the infrastructure, content, and tools to perform penetration tests and extensive security auditing. Thanks to the open source community and Rapid7's own hard working content team, new modules are added on a regular basis, which means that the latest exploit is available to you as soon as it's published. There are quite a few resources available online to help you learn how to use the Metasploit Framework; however, we highly recommend that you take a look at the Metasploit Framework Wiki, which is maintained by Rapid7's content team, to ensure that you have the most up to date information available. You can also use the sidebar navigation on the left to view the documentation that is available on this site; just click on the Metasploit Framework topic or search for the topic you want. Either way, if you are unable to find what you need, let us know, and we will add it to the documentation back log.
    [Show full text]
  • An Encrypted Payload Protocol and Target-Side Scripting Engine
    An Encrypted Payload Protocol and Target-Side Scripting Engine Dino A. Dai Zovi [email protected] Abstract into the remote process and then triggering the vulnera- Modern exploit payloads in commercial and open-source bility (the injection vector) in order to cause the remote penetration testing frameworks have grown much more process to execute the injected code (the payload). Tra- advanced than the traditional shellcode they replaced. ditionally, these payloads have been written in processor- These payloads permit interactive access without launch- specific assembly language, assembled, and extracted by ing a shell, network proxying, and many other rich fea- hand into reusable machine code components. These tures. Available payload frameworks have several lim- payloads were typically small and executed an operating itations, however. They make little use of encryption to system shell, causing them to be commonly referred to secure delivery and communications, especially in earlier as shellcode. Common shellcode variants included func- stage payloads. In addition, their richer features require tionality such as restoring dropped privileges, breaking a constant network connection to the penetration tester, out of chroot environments, and attaching the shell to making them unsuitable against mobile clients, such as an inbound or outbound network connection. This style laptops, PDAs, and smart phones. of payload construction was both labor and skill inten- This work introduces a first-stage exploit payload that sive. is able to securely establish an encrypted channel using With the growth of commercial penetration testing ElGamal key agreement and the RC4 stream cipher. The services and especially commercial penetration test- key agreement implementation requires only modular ing products, exploit payloads have gotten considerably exponentiation and RC4 also lends itself to an implemen- more capable and complex.
    [Show full text]
  • The Use of Metasploit Tool in Development Lifecycle
    Masaryk University Faculty of Informatics The use of Metasploit tool in development lifecycle Bachelor’s Thesis Miroslav Maceček Brno, Spring 2016 Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Miroslav Maceček Advisor: RNDr. Petr Švenda, Ph.D. i Acknowledgement I would like to express my gratitude to my collegues and friends for their support. I woul like to thank to my advisor RNDr. Petr Švenda, Ph.D. for his patience. iii Abstract This bachelor thesis explore the use of Metasploit in the web applica- tion development process. Firstly, it describes structure and general workflow of an open source Metasploit Framework. It also describes most extensive plugin for web application testing Wmap. This plu- gin is tested against application Mutillidae II, which contains a lot of known vulnerabilities. The success of this test is evaluated afterwards. This text describe a couple different ways of creating customized test scenarios, which evaluates OwnCloud and LimeSurvey applications. iv Keywords Metasploit, penetration testing, web application, development process, Mutilidae II v Contents 1 Introduction ............................ 1 2 Metasploit ............................. 3 2.1 Metasploit Framework Components ............. 3 2.1.1 Libraries . 3 2.1.2 Interfaces . 3 2.1.3 Modules . 4 2.1.4 Mixins and Plugins . 5 2.2 General Workflow ....................... 5 3 Wmap Plugin ........................... 7 3.1 List of modules ........................ 7 3.1.1 wmap_ssl . 7 3.1.2 wmap_server .
    [Show full text]
  • Metasploit Framework - Guide for Pentesters Ii
    Metasploit Framework - guide for pentesters ii Copyright © 2012 Software Media Sp. z o.o. SK Editor in Chief: Ewa Dudzic [email protected] Managing Editor: Aleksandra Cacko [email protected] DTP: Andrzej Kuca, Lalit Agarwal, Aleksandra Cacko Art Director: Andrzej Kuca [email protected] Graphics and cover: Ireneusz Pogroszewski Proofreaders: Edward Werzyn, Gareth Watters Top Betatesters: Stefanus Natahusada, Steven Wierckx Special Thanks to the Beta testers and Proofreaders who helped us with this issue. Without their assistance there would not be a PenTest e-book. Senior Consultant/Publisher: Pawel Marciniak Production Director: Andrzej Kuca Publisher: Software Media 02-682 Warszawa, ul. Bokserska 1 http://pentestmag.com/ First edition Issue 2/2012 (2) ISSN 2084-1116 Whilst every effort has been made to ensure the high quality of the e-book, the editors make no warranty, express or implied, concerning the results of content usage. All trademarks presented in the magazine were used only for informative purposes. All rights to trade marks presented in the magazine are reserved by the companies which own them. DISCLAIMER! The techniques described in our articles may only be used in private, local networks. The editors hold no responsibility for misuse of the presented techniques or consequent data loss. Metasploit Framework - guide for pentesters iv Contents 1 Metasploit: An Introduction 1 What is Metasploit? . .1 Architecture of Metasploit: . .2 Platform Used for demonstration . .2 Metasploit Interfaces: . .3 Good Practices for using Metasploit: . .3 Updating via Msfupdate . .3 Port scanning via Nmap . .4 Meterpreter: Metasploit’s Payload . .4 What typically payloads allow you to do after execution of exploit? .
    [Show full text]
  • Anex: Automated Network Exploitation Through
    ANEX: AUTOMATED NETWORK EXPLOITATION THROUGH PENETRATION TESTING A Thesis presented to the Faculty of California Polytechnic State University, San Luis Obispo In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Eric Francis Dazet June 2016 c 2016 Eric Francis Dazet ALL RIGHTS RESERVED ii COMMITTEE MEMBERSHIP TITLE: ANEX: Automated Network Exploitation through Penetration Testing AUTHOR: Eric Francis Dazet DATE SUBMITTED: June 2016 COMMITTEE CHAIR: Bruce Edward DeBruhl II, Ph.D. Assistant Professor of Computer Science COMMITTEE MEMBER: Zachary J. Peterson, Ph.D. Associate Professor of Computer Science COMMITTEE MEMBER: Phillip Nico, Ph.D. Professor of Computer Science iii ABSTRACT ANEX: Automated Network Exploitation through Penetration Testing Eric Francis Dazet Cyber attacks are a growing concern in our modern world, making security evalua- tion a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a sys- tem's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration testing tools are not as effective as manual tests. They are not as flexible as manual testing, cannot discover every vulnerability, and can lead to a false sense of security. The development of better automated tools can help organizations quickly and frequently know the state of their security measures and can help improve the manual penetration testing process by accelerating repetitive tasks without sacrificing results.
    [Show full text]
  • Metasploit Framework
    . Metasploitation A CanSecWest Presentation Original Presenter: HD Moore Presentation and Additional Information: Tyler Reguly Who is this guy? Who am I? Graduate of Fanshawe College ± Computer Systems Technology 3-year diploma Previously worked at Fanshawe College in student support and as a Sys Admin for a small marketing company Worked doing quasi-International web development for the past 5 years. Now at nCircle as a Vulnerability and Exposure Research Engineer Also a moderator on AntiOnline.com Maintain the ComputerDefense.org blog. © Toronto Area Security Klatch 2005 www.TASK.to Why are we here? The goal tonight? Cover information introduced by H.D. Moore at CanSecWest. We¶ll provide you with background information on the Metasploit project and Metasploit Framework. Basic Framework usage Functional differences between Framework versions Various Metasploit Project Web Fuzzers Brief overview of other sections of the Metasploit Project © Toronto Area Security Klatch 2005 www.TASK.to Meta-what? What is Metasploit? Metasploit itself is nothing« it¶s not even a word« but it¶s come to mean so much more. Metasploit has come to be synonymous with the Metasploit Framework. Metasploit is actually The Metasploit Project. Whose goal is to provide information that will be useful in Pentration Testing, IDS Signature Development and exploit research. The Metasploit Framework is one aspect of the Metasploit Project. Other parts of the project include: MSRT, MAFIA, Hamachi, etc. © Toronto Area Security Klatch 2005 www.TASK.to Metasploit Framework The framework is an open-source platform for developing, testing and using exploit code. (Point µn Click Hacking) The current ³stable´ version is version 2.5 Primarily written in perl, sections that are written in C, python and assembly.
    [Show full text]
  • Buffer Overflows and Software Security
    ECE590 Computer and Information Security Fall 2019 Buffer Overflows and Software Security Tyler Bletsch Duke University What is a Buffer Overflow? • Intent ▪ Arbitrary code execution • Spawn a remote shell or infect with worm/virus ▪ Denial of service • Steps ▪ Inject attack code into buffer ▪ Redirect control flow to attack code ▪ Execute attack code 3 Buffer Problem: Data overwrite int main(int argc, char *argv[]) { char passwd_ok = 0; char passwd[8]; strcpy(passwd, argv[1]); if (strcmp(passwd, "niklas")==0) passwd_ok = 1; if (passwd_ok) { ... } } Layout in memory: longpassword1 • passwd buffer overflowed, overwriting passwd_ok flag ▪ Any password accepted! 7 Another Example: Code injection via function pointer char buffer[100]; void (*func)(char*) = thisfunc; strcpy(buffer, argv[1]); func(buffer); arbitrarycodeX • Problems? ▪ Overwrite function pointer • Execute code arbitrary code in buffer 8 Stack Attacks: Code injection via return address • When a function is called… ▪ parameters are pushed on stack ▪ return address pushed on stack ▪ called function puts local variables on the stack • Memory layout arbitrarystuffX • Problems? ▪ Return to address X which may execute arbitrary code 9 Demo cool.c #include <stdlib.h> #include <stdio.h> int main() { char name[1024]; printf("What is your name? "); scanf("%s",name); printf("%s is cool.\n", name); return 0; } 10 Demo – normal execution 11 Demo – exploit 12 How to write attacks • Use NASM, an assembler: ▪ Great for machine code and specifying data fields attack.asm %define buffer_size 1024
    [Show full text]
  • Code Security
    Chapter 8 Code Security Introduction to IT Security 378 Software security is hard ■ One of the main problems in software engineering at the moment □ often poor programming because of lacking education/awareness in developers and bad tooling (languages/platforms making mistakes too easy to make and impact of mistakes too severe) □ often due to project deadlines ■ Unclear how to practically write correct and secure code, even with increased project resources □ formal validation is extremely costly, not clear how to do on complex code bases ■ Therefore many security relevant errors in currently deployed code ■ Classification of security problems: “Common Weakness Enumeration” (CWE) at https://cwe.mitre.org/ ■ Publicly known software vulnerabilities: “Common Vulnerabilities and Exposures” (CVE) at https://cve.mitre.org/ Introduction to IT Security 379 CWE/SANS Top 25 most dangerous software errors Insecure Interaction Between Components ■ CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ■ CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') ■ CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ■ CWE-434 Unrestricted Upload of File with Dangerous Type ■ CWE-352 Cross-Site Request Forgery (CSRF) ■ CWE-601 URL Redirection to Untrusted Site ('Open Redirect') http://www.sans.org/top25-software-errors/ Introduction to IT Security 380 CWE/SANS Top 25 most dangerous software errors Risky Resource Management ■ CWE-120 Buffer
    [Show full text]
  • Metasploit-The-Penetration-Tester-S
    “The best guide to the Metasploit Metasploit Framework.” — HD Moore, Metasploit Founder of the Metasploit Project The Penetration Tester’s Guide The Metasploit Framework makes discovering, Bypass antivirus technologies and circumvent exploiting, and sharing vulnerabilities quick and security controls relatively painless. But while Metasploit is used by Integrate Nmap, NeXpose, and Nessus with security professionals everywhere, the tool can be Guide Tester’s Penetration The Metasploit to automate discovery hard to grasp for first-time users. Metasploit: The Penetration Tester’s Guide fills this gap by teaching you Use the Meterpreter shell to launch further how to harness the Framework and interact with the attacks from inside the network vibrant community of Metasploit contributors. Harness stand-alone Metasploit utilities, third- Once you’ve built your foundation for penetration party tools, and plug-ins testing, you’ll learn the Framework’s conventions, Learn how to write your own Meterpreter post- interfaces, and module system as you launch simulated exploitation modules and scripts attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and You’ll even touch on exploit discovery for zero-day enumeration, client-side attacks, wireless attacks, and research, write a fuzzer, port existing exploits into the targeted social-engineering attacks. Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put Learn how to: someone else’s to the test, Metasploit: The Penetration Find and exploit unmaintained, misconfigured, and Tester’s Guide will take you there and beyond. unpatched systems Perform reconnaissance and find valuable information about your target Kennedy O’Gorman THE FINEST IN GEEK ENTERTAINMENT™ “I LAY FLAT.” This book uses RepKover — a durable binding that won’t snap shut.
    [Show full text]