SlideShare a Scribd company logo
METASPLOIT and the
WEB…
By: Nipun Jaswal, Director of Cyber Security,
Lucrypt Limited UK
msf(about_me)>
 Author of Mastering Metasploit
 6+ Years of Experience
 Expertise: Wireless, Exploit Writing, Malware Dev
 Expertise: Radio Frequencies, Surveillance Products
 15+ Hall of Fames
 Director of Cyber Security, Lucrypt Ltd. UK
 Worked with Elite LEAs throughout the World
 More at: nipunjaswal.com, nipunjaswal.info
Do You Expect NETAPI Today? Ms_08_067?
Familiar With Metasploit?
Familiar With Metasploit?
Metasploit for Web
 SQL Injections
 Scanner
 Login Brute Forcers
 RCE Injection
 And Many More
 WMAP Integration
 In Built Support for Many CMS and Variety of HTTP Functions
Metasploit for Web Advantages
 Support Variety of Functions and In Built Modules for Web
 Can work over Large Ranges
 Integration to Report Database and Reporting Features
 Extensible Support and Wide Community of Developers
 Easy to Code
Heart of Metasploit: Its Library
Metasploit and HTTP
https://github.com/rapid7/metasploit-framework/blob/master/lib/rex/proto/http/client_request.rb
Let’s Write an Example Module to Check
Wordpress Version
.HTML
Tools of the Trade
Conventionally:
 1. Intercept the Request/Response
 2. Find out Version From Readme.html Page
 3. Print on Screen
Conventionally:
Conventionally:
The MSF Way:
The MSF Way:
The MSF Way:
The MSF Way Admin Check:
The MSF Way Admin Check:
The MSF Way Admin Check:
Exploiting SQL Injections with MSF
RCE Based Backdoor Using MSF
DEMOTwit:@nipunjaswal
FB: nipun.jaswal

More Related Content

PPT
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Nipun Jaswal
 
PDF
Hijacking Softwares for fun and profit
Nipun Jaswal
 
PDF
Basics of Meterpreter Evasion
Nipun Jaswal
 
PDF
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
 
PPTX
Android Application Penetration Testing - Mohammed Adam
Mohammed Adam
 
PDF
[OWASP Poland Day] OWASP for testing mobile applications
OWASP
 
PPTX
Web Application Security - DevFest + GDay George Town 2016
Gareth Davies
 
PPTX
Basics of getting Into Bug Bounty Hunting
Muhammad Khizer Javed
 
Beyond Ethical Hacking By Nipun Jaswal , CSA HCF Infosec Pvt. Ltd
Nipun Jaswal
 
Hijacking Softwares for fun and profit
Nipun Jaswal
 
Basics of Meterpreter Evasion
Nipun Jaswal
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
 
Android Application Penetration Testing - Mohammed Adam
Mohammed Adam
 
[OWASP Poland Day] OWASP for testing mobile applications
OWASP
 
Web Application Security - DevFest + GDay George Town 2016
Gareth Davies
 
Basics of getting Into Bug Bounty Hunting
Muhammad Khizer Javed
 

What's hot (20)

PPTX
Where To Start When Your Environment is Fucked
Amanda Berlin
 
PPTX
OSX/Pirrit: The blue balls of OS X adware
Amit Serper
 
PPTX
WiFi security
Ihor Uzhvenko
 
PPTX
So Your Company Hired A Pentester
NorthBayWeb
 
PDF
Owasp Mobile Top 10 - M7 & M8
5h1vang
 
PDF
Canberk Bolat - Alice Android Diyarında
CypSec - Siber Güvenlik Konferansı
 
PDF
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
PDF
What you need to know about ExPetr ransomware
Kaspersky
 
PPTX
LKNOG3 - Bug Bounty
LKNOG
 
PPTX
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Mazin Ahmed
 
PPTX
Web security: concepts and tools used by attackers
tomasperezv
 
PDF
Your internet-exposure-that-makes-you-vulnerable
IIMBNSRCEL
 
PPTX
ZeroNights2013 testing of password policy
Anton Dedov
 
PPTX
Android Hacking + Pentesting
Sina Manavi
 
PPTX
How to-become-secure-and-stay-secure
IIMBNSRCEL
 
PPTX
Owasp mobile top 10
Pawel Rzepa
 
PDF
Testing iOS apps without jailbreak in 2018
SecuRing
 
PPTX
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
 
PDF
[OWASP Poland Day] Security knowledge framework
OWASP
 
PDF
Security by Weston Hecker
EC-Council
 
Where To Start When Your Environment is Fucked
Amanda Berlin
 
OSX/Pirrit: The blue balls of OS X adware
Amit Serper
 
WiFi security
Ihor Uzhvenko
 
So Your Company Hired A Pentester
NorthBayWeb
 
Owasp Mobile Top 10 - M7 & M8
5h1vang
 
Canberk Bolat - Alice Android Diyarında
CypSec - Siber Güvenlik Konferansı
 
Android security and penetration testing | DIVA | Yogesh Ojha
Yogesh Ojha
 
What you need to know about ExPetr ransomware
Kaspersky
 
LKNOG3 - Bug Bounty
LKNOG
 
Backup-File Artifacts - OWASP Khartoum InfoSec Sessions 2016 - Mazin Ahmed
Mazin Ahmed
 
Web security: concepts and tools used by attackers
tomasperezv
 
Your internet-exposure-that-makes-you-vulnerable
IIMBNSRCEL
 
ZeroNights2013 testing of password policy
Anton Dedov
 
Android Hacking + Pentesting
Sina Manavi
 
How to-become-secure-and-stay-secure
IIMBNSRCEL
 
Owasp mobile top 10
Pawel Rzepa
 
Testing iOS apps without jailbreak in 2018
SecuRing
 
CSE-Ethical-Hacking-ppt.pptx
AnshumaanTiwari2
 
[OWASP Poland Day] Security knowledge framework
OWASP
 
Security by Weston Hecker
EC-Council
 
Ad

Similar to Ground Zero Training- Metasploit For Web (20)

PDF
01 Metasploit kung fu introduction
Mostafa Abdel-sallam
 
PDF
Metasploit Computer security testing tool
medoelkang600
 
PPTX
Finalppt metasploit
devilback
 
PDF
Pen-Testing with Metasploit
Mohammed Danish Amber
 
PPTX
Metasploit
Lalith Sai
 
PPTX
Introduction To Exploitation & Metasploit
Raghav Bisht
 
PPTX
Pentesting with linux
Hammad Ahmed Khawaja
 
PPTX
Introduction to Metasploit
GTU
 
PPTX
Introduction to metasploit
GTU
 
PDF
Metaploit
Ajinkya Pathak
 
PPTX
BSides Algiers - Metasploit framework - Oussama Elhamer
Shellmates
 
PDF
SSMF (Security Scope Metasploit Framework) - Course Syllabus
Security Scope
 
PPTX
Metasploit Framework and Payloads supported
Swapnil Gharat
 
PDF
01_Metasploit - The Elixir of Network Security
Harish Chaudhary
 
PPTX
Introduction To Ethical Hacking
Raghav Bisht
 
PDF
24 33 -_metasploit
wozgeass
 
PDF
Metasploitation part-1 (murtuja)
ClubHack
 
PPTX
Metaploit
alexngchunkiat
 
PPTX
Introduction of Metasploit and task.pptx
hira11ahmed02
 
PPTX
Metasploit framwork
Deepanshu Gajbhiye
 
01 Metasploit kung fu introduction
Mostafa Abdel-sallam
 
Metasploit Computer security testing tool
medoelkang600
 
Finalppt metasploit
devilback
 
Pen-Testing with Metasploit
Mohammed Danish Amber
 
Metasploit
Lalith Sai
 
Introduction To Exploitation & Metasploit
Raghav Bisht
 
Pentesting with linux
Hammad Ahmed Khawaja
 
Introduction to Metasploit
GTU
 
Introduction to metasploit
GTU
 
Metaploit
Ajinkya Pathak
 
BSides Algiers - Metasploit framework - Oussama Elhamer
Shellmates
 
SSMF (Security Scope Metasploit Framework) - Course Syllabus
Security Scope
 
Metasploit Framework and Payloads supported
Swapnil Gharat
 
01_Metasploit - The Elixir of Network Security
Harish Chaudhary
 
Introduction To Ethical Hacking
Raghav Bisht
 
24 33 -_metasploit
wozgeass
 
Metasploitation part-1 (murtuja)
ClubHack
 
Metaploit
alexngchunkiat
 
Introduction of Metasploit and task.pptx
hira11ahmed02
 
Metasploit framwork
Deepanshu Gajbhiye
 
Ad

Recently uploaded (20)

PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PDF
Introduction to Data Science: data science process
ShivarkarSandip
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
Introduction to Data Science: data science process
ShivarkarSandip
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
flutter Launcher Icons, Splash Screens & Fonts
Ahmed Mohamed
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
Software Testing Tools - names and explanation
shruti533256
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 

Ground Zero Training- Metasploit For Web