57
METASPLOIT By- RAHUL BHUTKAR (B/5) NIKHIL BIRARI(B/6)

Finalppt metasploit

Embed Size (px)

Citation preview

  • 1.By-RAHUL BHUTKAR (B/5)NIKHIL BIRARI(B/6)

2. What is Metasploit? A collaboration between the open source community andRapid7, Metasploit software helps security and IT professionalsidentify security issues, verify vulnerability mitigations, andmanage expert-driven security assessments, providing truesecurity risk intelligence. Capabilities include smart exploitation, password auditing, webapplication scanning, and social engineering. Teams can collaborate in Metasploit and present their findingsin consolidated reports. Metasploit editions range from a free edition to professionalenterprise editions, all based on the Metasploit Framework, anopen source software development kit with the worldslargest, public collection of quality-assured exploits. 3. Metasploit is a hacking framework written in ruby. It isdesigned to help make writing and executing exploits assimple as possible. 4. History of the Metasploit ProjectMetasploitProjectHD Moore & FriendsA community-driven project since 2003Rapid7Maker of NeXposeVulnerability ManagementPurchase the Project from HDMetasploitFrameworkThe original open-source exploit framework 5. Metasploit Versions1.0 released in 2003 (Perl)2.0 released in 2004 (Better Perl) 2.7 released in late 2006 3.0 released in 2007 (Ruby) 3.2 released in late 2008 3.3 released in late 20093.4 released in early 2010 3.4.1 is the most recent releaseMetasploitnow has 567 exploits and 283 auxiliary modules (up from 551 and 261 in v3.4) 6. Metasploit Framework OverviewOpen source tool Used for Penetration testing IDS Signature Development Exploit ResearchConsists of Web server Console Signatures 7. Runs on any operating system Source code for Linux/Unix/MacOS X Portable to Windows via CYGWINAllows anyone to exploit & usually root certain machineswith only an IP address and a basic background of the systemRequires no knowledge of the software bug, or exploitmachine code 8. Metasploit Framework OverviewVersionsOpen source tool Used forPenetration testingIDS Signature DevelopmentExploit Research Consists ofWeb serverConsoleSignatures 9. Penetration Testing OverviewActive evaluation of a system or network of systemsAssume the role of a black hat hacker or bad guyOften uses the same tools as hackers 10. Metasploit brings together many of the tools and techniquesused by hackers 11. What is penetration testing? Penetration testing, oftencalled pentesting,pen testing, or security testing, is thepractice of attacking your own or your clients IT systems inthe same way a hacker would to identify security holes. Ofcourse, you do this without actually harming the network.The person carrying out a penetration test is called apenetration tester or pentester.Lets make one thing crystal clear: Penetration testingrequires that you get permission from the person who ownsthe system. Otherwise, you would be hacking thesystem, which is illegal in most countries and trust me, youdont look good in an orange jump suit. 12. You can become a penetration tester at home by testing yourown server and later make a career out of it. At Rapid7, wehave a team of professionals that pentest government andenterprise IT systems for a living. And let me tell you, theyenjoy their job!To better understand penetration testing, you first need tounderstand the basic security concepts ofvulnerabilities, exploits, and payloads. 13. What is a vulnerability? A vulnerability is a security hole in a piece of software, hardware or operating systemthat provides a potential angle to attack the system. A vulnerability can be as simple asweak passwords or as complex as buffer overflows or SQL injection vulnerabilities. To test if you have any vulnerabilities in your systems, you typically use a vulnerabilitymanagement solution, also known as a vulnerability scanner or vulnerability assessmentsolution. If you would like to get your hands on a free vulnerability scanner, try NeXposeCommunity Edition, one of Metasploits sister projects. Vulnerability Scanning Vulnerability scanning will allow you to quickly scan a target IP range looking for knownvulnerabilities, giving a penetration tester a quick idea of what attacks might be worthconducting. When used properly, this is a great asset to a pen tester, yet it is not withoutits draw backs. Vulnerability scanning is well known for a high false positive and falsenegative rate. This has to be kept in mind when working with any vulnerability scanningsoftware. Lets look through some of the vulnerability scanning capabilities that the MetasploitFramework can provide. 14. What is security research? Vulnerabilities are typically found by security researchers, whichis a posh term for smart people who like to find flaws in systemsand break them. At Rapid7, we have a team of vulnerabilityresearchers that do nothing else all day. Trust us, this can be alot of fun. Like penetration testing, security research can be used for goodand evil. Some countries dont make the distinction and outlawsecurity research completely, so make sure you check yourcountrys legislation before you start researching and especiallybefore you publish any research. 15. What is an exploit? To take advantage of a vulnerability, you often need an exploit, asmall and highly specialized computer program whose onlyreason of being is to take advantage of a specific vulnerabilityand to provide access to a computer system. Exploits oftendeliver a payload to the target system to grant the attacker accessto the system. The Metasploit Project host the worlds largest public databaseof quality-assured exploits. Have a look at our exploit database its right here on the site. Even the name Metasploit comes from the term exploit.Metasploit was the first software to provide a commonframework for a large selection of exploits. Think of it as anabstraction layer (Meta) for exploits (abbreviated sploits).Get it? 16. WARNINGS : Metasploit is very powerful, and very dangerous This is a briefing of a demo I did on my ownsystems & network, not a live demo I used VMWare to isolate the operating systemfrom other systems and the internet Use of this an any unauthorized way will get youfired/arrested/deported/smited by God, etc... 17. InstallationInstalled on both Windows and Linux with sameresults/ease of useUses a web server as interfaceSignature updates downloaded automaticallyStarted the web server & logged in 18. Web Interface 19. Demo System 1 Linux Used Redhat 8 Released Sept 2002, still inwide use Running services samba (file sharing), andSSH 20. Linux system - Port scan 21. Linux system - Port scan Nmap reveals several things Services SSH, rpcbind, filesharing Operating System Linux, kernel version 2.4.6 2.4.26, or 2.4.9, 2.6.5 2.6.11 Doesnt tell us the distribution, but we canguess 22. Demo Select linux from exploit filters 23. Demo Filesharing (port 139) is running on a linuxmachine Assume samba is running Choose samba trans2open from list ofexploits 24. What is a payload? A payload is the piece of software that lets you control acomputer system after its been exploited. The payload istypically attached to and delivered by the exploit. Just imaginean exploit that carries the payload in its backpack when itbreaks into the system and then leaves the backpack there.Yes, its a corny description, but you get the picture. Metasploits most popular payload is called Meterpreter, whichenables you to do all sorts of funky stuff on the target system.For example, you can upload and download files from thesystem, take screenshots, and collect password hashes. You caneven take over the screen, mouse, and keyboard to fully controlthe computer. If youre feeling particularly bad-ass, you can eventurn on a laptops webcam and be a fly on the wall. 25. Demo Payloads Add User Bind shell Exec execute one command And many more Chose linux_ia32_bind 26. Demo I had little success with check option. Most of the time, metasploit would say itwas not vulnerable, however, it was Run Exploit 27. Demo Shell access opens up the doors to any other service Steal passwords Add/delete users Alter/disrupt services Download files Change files Change logs Full access to any other privilege services on other machines 28. Summary Metasploit is very easy to use, and very powerful Web interface allows the scans to be run fromany system, on any operating system Evidence may or may not be left behind on thesystem IDS/IPS will sense these exploits Only contains old & well known exploits 29. Bibliography :www.metasploit.comwww.wikipedia.comwww.rapid7.com