27
Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

  • View
    241

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Metasploit – Embedded PDF Exploit

Metasploit – Embedded PDF Exploit

Presented by: Jesse LucasPresented by: Jesse Lucas

Page 2: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Tools / AssumptionsTools / Assumptions

Attacker – BackTrack 4.2

• Metasploit Framework 3.0• PDF file for embedding

Victim – Windows XP

• File and Printer Sharing• Adobe Reader 8.0 – 9.0

Page 3: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Exploit ConceptExploit Concept

• Attacker embeds exploit in a PDF file

• Victim opens the PDF file– Unknowingly saves and runs exploit

• Attacker takes control of victim machine

Page 4: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas
Page 5: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas
Page 6: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas
Page 7: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Exploit DemosExploit Demos

• Live Demo

• Offline Demo

Page 8: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Start BackTrakStart BackTrak

Page 9: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Open 2 TerminalsOpen 2 Terminals

Page 10: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Open msfconsole in both TerminalsOpen msfconsole in both Terminals

Page 11: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Setup ExploitSetup Exploit

Page 12: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Setup Exploit HandlerSetup Exploit Handler

Page 13: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Wait for Victim to Open PDFWait for Victim to Open PDF

Page 14: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Prey on their IgnorancePrey on their Ignorance

Page 15: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Victim is now a VictimVictim is now a Victim

Page 16: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Attacker now has AccessAttacker now has Access

Page 17: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Example of ControlExample of Control

Page 18: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Example of Control (cont)Example of Control (cont)

Page 19: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Setup Exploit 2Setup Exploit 2

Page 20: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Setup Handler 2Setup Handler 2

Page 21: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Wait for Victim to OpenWait for Victim to Open

Page 22: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Prey on Victim’s IgnorancePrey on Victim’s Ignorance

Page 23: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Ta Da! Attacker has a VNC Session

Ta Da! Attacker has a VNC Session

Page 24: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Example of ControlExample of Control

Page 25: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Example of Control (cont)Example of Control (cont)

Page 26: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Prevent the AttackPrevent the Attack

• DO NOT open files from people you don’t know

• DO NOT allow firewall exceptions for applications you don’t know

• KEEP popular programs up to date

• DISABLE File and Printer Sharing if you aren’t using it

Page 27: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas

Questions?Questions?