SlideShare a Scribd company logo
2
Most read
3
Most read
Chapter 8
Vulnerability Exploitation
 We’ve completed our recon and learned as
much about the organization and network as
we could by visiting public sites
 We’ve verified targets and identified services
used and potential vulnerabilities via ping
sweeps, port scans, OS fingerprinting, and
banner grabbing
 Now the real fun begins…
Exploits may have unintended consequences
(e.g., crashing a service or a server)
Mitigate such risks by:
 Obtaining your exploit tools from reliable
sources. If the site provides a hash value,
verify the integrity of your downloads
 Experiment with the tools in a lab
environment which mimics the client’s
production network as closely as possible
 Explain risks to client before executing
exploits
 Large number of nmap scripts
◦ Used to find exploitable vulnerabilities
◦ Written in the NASL scripting language
 To execute all nmap scripts:
nmap –A IP-address
 Nessus by Tenable
◦ Automatic vulnerability scanning tool
◦ Used to be free to all; now free (with limitations) for
home use, otherwise commercial (license >=$1,500
per year)
 Open Vulnerability Assessment System
(OpenVAS)
◦ Free
◦ Branched off from Nessus when the latter went
commercial
◦ Fewer and different plug-ins than Nessus
 Brute Force login attacks (password guessing)
◦ medusa
◦ THC Hydra
 Password cracking and rainbow tables will be
discussed in chapter 10
 Fuzzing: Providing a program with different
data in the hopes of finding usable anomalies
◦ Often used in web attacks, but can be used
anywhere there is user input
◦ Note: This is a very noisy type of attack
 JBroFuzz attempts to find directories located
on a web server by fuzzing directory names
◦ Available via the Open Web Application Security
Project (OWASP)
 Tool beloved by security experts and black
hats alike
 Community edition is free for students and
small companies
 Framework which gives one access to
hundreds of different exploits and payloads,
with more being added daily
◦ Exploit: The code that lets you use a vulnerability to
deliver a payload (think: bomber)
◦ Payload: The code that you are trying to get to run
(think: bomb). Common payloads are a reverse shell
and the meterpreter
 Launch Metasploit
◦ Msfconsole
 Explore exploits (optional) and payloads
◦ show exploits
◦ show payloads
◦ search type:exploit search-string
 Specify exploit
◦ use path/exploitname
◦ use auxiliary/scanner/ftp/anonymous
 Specify payload
◦ set PAYLOAD path/payloadname
 Explore exploit options (optional)
◦ show options
 Provide values for options
◦ set RHOSTS 70.0.0.3
◦ set RPORT 21
◦ set LHOST 192.168.0.4
◦ set LHOST 3456
 Execute the exploit
◦ Exploit
 Background a meterpreter session
◦ CTRL^z
 Show list of sessions
◦ sessions –l (That is a lower case el, not the
number 1)
 Interact with a session (e.g., session 2)
◦ sessions –i 2
 Quit the program
◦ Exit
Metasploit is extremely powerful and versatile.
The book shows a few sample exploits. As you
have time, explore additional exploits and their
options. We’ll be looking at payloads next
chapter
 www.exploit-db.com (Note that the book has
a typo on page 236)
 Beware of downloaded code!
◦ Consider the source
◦ Examine it
◦ Check its hash if appropriate
◦ Run it in a test environment first
Remember the SANS Top 10?
 Service misconfiguration
 Overflow flaw
 Information leakage

More Related Content

What's hot (20)

PDF
An EyeWitness View into your Network
CTruncer
 
PPTX
Netcat
penetration Tester
 
PDF
The State of the Veil Framework
VeilFramework
 
PDF
Penetration Testing Resource Guide
Bishop Fox
 
PDF
NS3 Tech Talk
Rodrigo Melo
 
PPTX
2014 Security Onion Conference
DefensiveDepth
 
PDF
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
CTruncer
 
PDF
Metasploit for Penetration Testing: Beginner Class
Georgia Weidman
 
PDF
Nmap for Scriptors
n|u - The Open Security Community
 
PPTX
Network Sniffing
budi rahardjo
 
PDF
Pen-Testing with Metasploit
Mohammed Danish Amber
 
PDF
Pyongyang Fortress
Mayank Dhiman
 
PPTX
Pentesting custom TLS stacks
Alexandre Moneger
 
PPTX
Security Onion Advance
Kaustubh Padwad
 
PDF
Ever Present Persistence - Established Footholds Seen in the Wild
CTruncer
 
PDF
Egress-Assess and Owning Data Exfiltration
CTruncer
 
PDF
Firewalls and Virtualization - pfSense Hangout June 2014
Netgate
 
PPT
Fileextraction with suricata
MrArora Arjuna
 
PPTX
Using metasploit
CyberRad
 
An EyeWitness View into your Network
CTruncer
 
The State of the Veil Framework
VeilFramework
 
Penetration Testing Resource Guide
Bishop Fox
 
NS3 Tech Talk
Rodrigo Melo
 
2014 Security Onion Conference
DefensiveDepth
 
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
CTruncer
 
Metasploit for Penetration Testing: Beginner Class
Georgia Weidman
 
Network Sniffing
budi rahardjo
 
Pen-Testing with Metasploit
Mohammed Danish Amber
 
Pyongyang Fortress
Mayank Dhiman
 
Pentesting custom TLS stacks
Alexandre Moneger
 
Security Onion Advance
Kaustubh Padwad
 
Ever Present Persistence - Established Footholds Seen in the Wild
CTruncer
 
Egress-Assess and Owning Data Exfiltration
CTruncer
 
Firewalls and Virtualization - pfSense Hangout June 2014
Netgate
 
Fileextraction with suricata
MrArora Arjuna
 
Using metasploit
CyberRad
 

Viewers also liked (13)

PDF
OTMT Valuation Update 9M2014
Ahmed Ramadan
 
PPSX
Petition for Spouse
Elizee Hernandez Law Firm
 
PPTX
Proyecto X
proyecto x x x
 
PPTX
біотехнологічні організми
Юрій Сиротюк
 
PPT
презентация1
Юрій Сиротюк
 
PPT
Borderline personality organization
charles53
 
PDF
Adp presentation
LAUREANO TURIENZO ESTEBAN
 
DOCX
1 слайд
Наталія Горя
 
PPTX
Cuadro comparativo leida coromoto derecho mercantil
Leida Ramos
 
PPTX
WhatsApp in Customer Service
Estelle Wienk
 
PDF
Analisis sistem transportasi
Iwan Udin
 
PDF
For Engagement and Great: Digital Healthcare & IoT UX 사례 중심으로
Billy Choi
 
PPTX
Problems with the marketing of Shohoj.com
Salsabil Rahman
 
OTMT Valuation Update 9M2014
Ahmed Ramadan
 
Petition for Spouse
Elizee Hernandez Law Firm
 
Proyecto X
proyecto x x x
 
біотехнологічні організми
Юрій Сиротюк
 
презентация1
Юрій Сиротюк
 
Borderline personality organization
charles53
 
Adp presentation
LAUREANO TURIENZO ESTEBAN
 
Cuadro comparativo leida coromoto derecho mercantil
Leida Ramos
 
WhatsApp in Customer Service
Estelle Wienk
 
Analisis sistem transportasi
Iwan Udin
 
For Engagement and Great: Digital Healthcare & IoT UX 사례 중심으로
Billy Choi
 
Problems with the marketing of Shohoj.com
Salsabil Rahman
 
Ad

Similar to Introduction to Exploitation (20)

PPTX
Finalppt metasploit
devilback
 
PDF
Exploits Attack on Windows Vulnerabilities
Amit Kumbhar
 
PPTX
Metasploit
Lalith Sai
 
PPTX
Pentesting with linux
Hammad Ahmed Khawaja
 
PPTX
Metasploit
Parth Sahu
 
PPTX
Introduction To Ethical Hacking
Raghav Bisht
 
PDF
Metasploit Computer security testing tool
medoelkang600
 
PDF
Dan Guido SOURCE Boston 2011
Source Conference
 
PPTX
Metasploit
Raghunath G
 
PDF
Metasploitation part-1 (murtuja)
ClubHack
 
PPTX
Introduction To Exploitation & Metasploit
Raghav Bisht
 
PDF
Hack Attack! An Introduction to Penetration Testing
Steve Phillips
 
PDF
Threats, Threat Modeling and Analysis
Ian G
 
PPTX
metaploit framework
Le Quyen
 
PDF
iCrOSS 2013_Pentest
M.Syarifudin, ST, OSCP, OSWP
 
PDF
24 33 -_metasploit
wozgeass
 
PDF
Web Application Security: Introduction to common classes of security flaws an...
Thoughtworks
 
PDF
Tw noche geek quito webappsec
Thoughtworks
 
PPT
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
 
PDF
Web hackingtools cf-summit2014
ColdFusionConference
 
Finalppt metasploit
devilback
 
Exploits Attack on Windows Vulnerabilities
Amit Kumbhar
 
Metasploit
Lalith Sai
 
Pentesting with linux
Hammad Ahmed Khawaja
 
Metasploit
Parth Sahu
 
Introduction To Ethical Hacking
Raghav Bisht
 
Metasploit Computer security testing tool
medoelkang600
 
Dan Guido SOURCE Boston 2011
Source Conference
 
Metasploit
Raghunath G
 
Metasploitation part-1 (murtuja)
ClubHack
 
Introduction To Exploitation & Metasploit
Raghav Bisht
 
Hack Attack! An Introduction to Penetration Testing
Steve Phillips
 
Threats, Threat Modeling and Analysis
Ian G
 
metaploit framework
Le Quyen
 
iCrOSS 2013_Pentest
M.Syarifudin, ST, OSCP, OSWP
 
24 33 -_metasploit
wozgeass
 
Web Application Security: Introduction to common classes of security flaws an...
Thoughtworks
 
Tw noche geek quito webappsec
Thoughtworks
 
Sembang2 Keselamatan It 2004
Linuxmalaysia Malaysia
 
Web hackingtools cf-summit2014
ColdFusionConference
 
Ad

More from primeteacher32 (20)

PPT
Software Development Life Cycle
primeteacher32
 
PPTX
Variable Scope
primeteacher32
 
PPTX
Returning Data
primeteacher32
 
PPTX
Intro to Functions
primeteacher32
 
PPTX
Introduction to GUIs with guizero
primeteacher32
 
PPTX
Function Parameters
primeteacher32
 
PPTX
Nested Loops
primeteacher32
 
PPT
Conditional Loops
primeteacher32
 
PPTX
Introduction to Repetition Structures
primeteacher32
 
PPTX
Input Validation
primeteacher32
 
PPTX
Windows File Systems
primeteacher32
 
PPTX
Nesting Conditionals
primeteacher32
 
PPTX
Conditionals
primeteacher32
 
PPT
Intro to Python with GPIO
primeteacher32
 
PPTX
Variables and Statements
primeteacher32
 
PPTX
Variables and User Input
primeteacher32
 
PPT
Intro to Python
primeteacher32
 
PPTX
Raspberry Pi
primeteacher32
 
PPT
Hardware vs. Software Presentations
primeteacher32
 
PPTX
Block chain security
primeteacher32
 
Software Development Life Cycle
primeteacher32
 
Variable Scope
primeteacher32
 
Returning Data
primeteacher32
 
Intro to Functions
primeteacher32
 
Introduction to GUIs with guizero
primeteacher32
 
Function Parameters
primeteacher32
 
Nested Loops
primeteacher32
 
Conditional Loops
primeteacher32
 
Introduction to Repetition Structures
primeteacher32
 
Input Validation
primeteacher32
 
Windows File Systems
primeteacher32
 
Nesting Conditionals
primeteacher32
 
Conditionals
primeteacher32
 
Intro to Python with GPIO
primeteacher32
 
Variables and Statements
primeteacher32
 
Variables and User Input
primeteacher32
 
Intro to Python
primeteacher32
 
Raspberry Pi
primeteacher32
 
Hardware vs. Software Presentations
primeteacher32
 
Block chain security
primeteacher32
 

Recently uploaded (20)

PDF
Ch7.pdf fghjkloiuytrezgdrsrddfhhvhjgufygfgjhfugyfufutfgyufuygfuygfuytfuytftfy...
SuKosh1
 
PDF
Crafting Winning CVs Cover Letters and Mastering Job Interviews with Roman Vi...
Excellence Foundation for South Sudan
 
PDF
VisionIAS - UPSC GS Paper I Question Paper 2025 with Answer Key.pdf
saxenashubh937
 
PDF
ILLUMINATI CALL KAMPALA IN UGANDA+256776963507/0741506136
Illuminati Agent in Kampala Uganda+256776963507/0741506136
 
PPTX
Resume-Writing-Workshop powerpoint Presentation
nmorales22
 
PDF
From-Idea-to-Business-Plan-A-Practical-Guide.pdf
eman youssif
 
PDF
Convex optimization analysis in todays world scenario.pdf
mahizxy
 
PDF
REFRIGERATION THANDA AND AIR PABANA PATHA PADHE
AjitBiswal14
 
PPTX
Future_Proofing_Your_Career_25_Essential_Skills_for_2025.pptx
presentifyai
 
PDF
Find Your Dream Job with Formwalaa – Fast, Smart & Effortless Job Search
Reeshna Prajeesh
 
PPTX
Ganesh Mahajan Digital marketing Portfolio.pptx
ganeshmahajan786
 
PPTX
原版英国牛津大学毕业证(Oxon毕业证书)如何办理
Taqyea
 
PPTX
intro-to-accounting-week-1.pptxbahshhahz
matthewEmpleo1
 
PDF
NotificationForTheTeachingPositionsAdvt012025.pdf
sunitsaathi
 
PPTX
Mastering the Cloud with AWS: A Deep Dive into Amazon Web Services
cbitssnavjotdm
 
PDF
Mastercard Foundation post.pdf documentation
odameamesika
 
PDF
Smarter Private Job Search Starts with Formwalaa
Reeshna Prajeesh
 
PDF
165. Reviewer Certificate in Physical Science
Manu Mitra
 
PPTX
Leadership Principles Presentations.pptx
ChrisBus1
 
PPTX
A Guide for a Winning Interview July 2025
Bruce Bennett
 
Ch7.pdf fghjkloiuytrezgdrsrddfhhvhjgufygfgjhfugyfufutfgyufuygfuygfuytfuytftfy...
SuKosh1
 
Crafting Winning CVs Cover Letters and Mastering Job Interviews with Roman Vi...
Excellence Foundation for South Sudan
 
VisionIAS - UPSC GS Paper I Question Paper 2025 with Answer Key.pdf
saxenashubh937
 
ILLUMINATI CALL KAMPALA IN UGANDA+256776963507/0741506136
Illuminati Agent in Kampala Uganda+256776963507/0741506136
 
Resume-Writing-Workshop powerpoint Presentation
nmorales22
 
From-Idea-to-Business-Plan-A-Practical-Guide.pdf
eman youssif
 
Convex optimization analysis in todays world scenario.pdf
mahizxy
 
REFRIGERATION THANDA AND AIR PABANA PATHA PADHE
AjitBiswal14
 
Future_Proofing_Your_Career_25_Essential_Skills_for_2025.pptx
presentifyai
 
Find Your Dream Job with Formwalaa – Fast, Smart & Effortless Job Search
Reeshna Prajeesh
 
Ganesh Mahajan Digital marketing Portfolio.pptx
ganeshmahajan786
 
原版英国牛津大学毕业证(Oxon毕业证书)如何办理
Taqyea
 
intro-to-accounting-week-1.pptxbahshhahz
matthewEmpleo1
 
NotificationForTheTeachingPositionsAdvt012025.pdf
sunitsaathi
 
Mastering the Cloud with AWS: A Deep Dive into Amazon Web Services
cbitssnavjotdm
 
Mastercard Foundation post.pdf documentation
odameamesika
 
Smarter Private Job Search Starts with Formwalaa
Reeshna Prajeesh
 
165. Reviewer Certificate in Physical Science
Manu Mitra
 
Leadership Principles Presentations.pptx
ChrisBus1
 
A Guide for a Winning Interview July 2025
Bruce Bennett
 

Introduction to Exploitation

  • 2.  We’ve completed our recon and learned as much about the organization and network as we could by visiting public sites  We’ve verified targets and identified services used and potential vulnerabilities via ping sweeps, port scans, OS fingerprinting, and banner grabbing  Now the real fun begins…
  • 3. Exploits may have unintended consequences (e.g., crashing a service or a server) Mitigate such risks by:  Obtaining your exploit tools from reliable sources. If the site provides a hash value, verify the integrity of your downloads  Experiment with the tools in a lab environment which mimics the client’s production network as closely as possible  Explain risks to client before executing exploits
  • 4.  Large number of nmap scripts ◦ Used to find exploitable vulnerabilities ◦ Written in the NASL scripting language  To execute all nmap scripts: nmap –A IP-address
  • 5.  Nessus by Tenable ◦ Automatic vulnerability scanning tool ◦ Used to be free to all; now free (with limitations) for home use, otherwise commercial (license >=$1,500 per year)  Open Vulnerability Assessment System (OpenVAS) ◦ Free ◦ Branched off from Nessus when the latter went commercial ◦ Fewer and different plug-ins than Nessus
  • 6.  Brute Force login attacks (password guessing) ◦ medusa ◦ THC Hydra  Password cracking and rainbow tables will be discussed in chapter 10
  • 7.  Fuzzing: Providing a program with different data in the hopes of finding usable anomalies ◦ Often used in web attacks, but can be used anywhere there is user input ◦ Note: This is a very noisy type of attack  JBroFuzz attempts to find directories located on a web server by fuzzing directory names ◦ Available via the Open Web Application Security Project (OWASP)
  • 8.  Tool beloved by security experts and black hats alike  Community edition is free for students and small companies  Framework which gives one access to hundreds of different exploits and payloads, with more being added daily ◦ Exploit: The code that lets you use a vulnerability to deliver a payload (think: bomber) ◦ Payload: The code that you are trying to get to run (think: bomb). Common payloads are a reverse shell and the meterpreter
  • 9.  Launch Metasploit ◦ Msfconsole  Explore exploits (optional) and payloads ◦ show exploits ◦ show payloads ◦ search type:exploit search-string  Specify exploit ◦ use path/exploitname ◦ use auxiliary/scanner/ftp/anonymous  Specify payload ◦ set PAYLOAD path/payloadname
  • 10.  Explore exploit options (optional) ◦ show options  Provide values for options ◦ set RHOSTS 70.0.0.3 ◦ set RPORT 21 ◦ set LHOST 192.168.0.4 ◦ set LHOST 3456  Execute the exploit ◦ Exploit
  • 11.  Background a meterpreter session ◦ CTRL^z  Show list of sessions ◦ sessions –l (That is a lower case el, not the number 1)  Interact with a session (e.g., session 2) ◦ sessions –i 2  Quit the program ◦ Exit
  • 12. Metasploit is extremely powerful and versatile. The book shows a few sample exploits. As you have time, explore additional exploits and their options. We’ll be looking at payloads next chapter
  • 13.  www.exploit-db.com (Note that the book has a typo on page 236)  Beware of downloaded code! ◦ Consider the source ◦ Examine it ◦ Check its hash if appropriate ◦ Run it in a test environment first
  • 14. Remember the SANS Top 10?  Service misconfiguration  Overflow flaw  Information leakage