Top Banner
Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas
27

Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Metasploit – Embedded PDF Exploit

Metasploit – Embedded PDF Exploit

Presented by: Jesse LucasPresented by: Jesse Lucas

Page 2: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Tools / AssumptionsTools / Assumptions

Attacker – BackTrack 4.2

• Metasploit Framework 3.0• PDF file for embedding

Victim – Windows XP

• File and Printer Sharing• Adobe Reader 8.0 – 9.0

Page 3: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Exploit ConceptExploit Concept

• Attacker embeds exploit in a PDF file

• Victim opens the PDF file– Unknowingly saves and runs exploit

• Attacker takes control of victim machine

Page 4: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.
Page 5: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.
Page 6: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.
Page 7: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Exploit DemosExploit Demos

• Live Demo

• Offline Demo

Page 8: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Start BackTrakStart BackTrak

Page 9: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Open 2 TerminalsOpen 2 Terminals

Page 10: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Open msfconsole in both TerminalsOpen msfconsole in both Terminals

Page 11: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Setup ExploitSetup Exploit

Page 12: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Setup Exploit HandlerSetup Exploit Handler

Page 13: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Wait for Victim to Open PDFWait for Victim to Open PDF

Page 14: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Prey on their IgnorancePrey on their Ignorance

Page 15: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Victim is now a VictimVictim is now a Victim

Page 16: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Attacker now has AccessAttacker now has Access

Page 17: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Example of ControlExample of Control

Page 18: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Example of Control (cont)Example of Control (cont)

Page 19: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Setup Exploit 2Setup Exploit 2

Page 20: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Setup Handler 2Setup Handler 2

Page 21: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Wait for Victim to OpenWait for Victim to Open

Page 22: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Prey on Victim’s IgnorancePrey on Victim’s Ignorance

Page 23: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Ta Da! Attacker has a VNC Session

Ta Da! Attacker has a VNC Session

Page 24: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Example of ControlExample of Control

Page 25: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Example of Control (cont)Example of Control (cont)

Page 26: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Prevent the AttackPrevent the Attack

• DO NOT open files from people you don’t know

• DO NOT allow firewall exceptions for applications you don’t know

• KEEP popular programs up to date

• DISABLE File and Printer Sharing if you aren’t using it

Page 27: Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas.

Questions?Questions?