Top Banner
Network Exploitation Mam Koeun Web Security at Trendsec Solution
11

Network Exploitation

Apr 15, 2017

Download

Technology

KHNOG
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Exploitation

NetworkExploitation

MamKoeunWeb Security at Trendsec Solution

Page 2: Network Exploitation

I. AboutmeII. UnderstandingBasicMSF&TermsIII. Howdoesexploitationwork?IV. Howdoesexploitationwork?V. CommonStepsofacompromiseVI. ScanForportsandservicesVII.MetasploitFrameworkBasicsVIII.MeterpreterBasics

TableOfContents

Page 3: Network Exploitation

ØMamKoeunØWebSecurity@TrendsecSolutionØCambodianMekongUniversity

AboutMe

Page 4: Network Exploitation

• Payload:Actualcodesthattransmitdataordoanyactionsautomaticallyasitspurposes,itrunsafterexploitation

• Exploit:Codethatallowsattackertotakeadvantageofavulnerablesystem

• Vulnerability:Weaknessesthatallowsattackerbreakinto/compromiseasystem’ssecurity

UnderstandingBasicMSF&TERMS

Page 5: Network Exploitation

1- Vulnerability 2- Exploit3- Payload

Robber

Vulnerable House

Understanding Basic MSF&TERMS

Howdoesexploitationwork?

Page 6: Network Exploitation

Exploit + Payload

Upload/Download Data, malware, rootkit,..

Exploit run first, if succeed payload runs next

Howdoesexploitationwork?

Page 7: Network Exploitation

- Scan ports and services running on that target IP

- Identify a vulnerability service / known exploit or private exploit

- Compromise, launch exploit, exploitation plan

CommonStepsOfaCompromise

Page 8: Network Exploitation

- Scan a machine using tools like “nmap”- Use port scanner to scan for ports and

services running on remote system - Services scanning with version indentified

same time

ScanForPortsandServices

Page 9: Network Exploitation

- Toolfordevelopmentandtestingofvulnerability- Canbeusedfor:

- Penetratingtesting- Exploitresearch- DevelopingIDSsignatures

- StartedbyH.DMoore,2003(Perl)- WasrewritteninRuby,2007- AcquiredbyRapid7,2009- OpenSourceandfreeforuse- Over770+testedexploit- Over228payloads

Metasploit Basics

Page 10: Network Exploitation

CommandsdetailinDemontration(VulnerabilityonRPC

DCOM(MS03_026))- Scan a machine using tools like “nmap”

root@khnog#nmap –v –n [Target-IP]root@khnog#nmap –sV –n [Target-IP]

- root@khnog#gcc dcom -0 dcom (compile file)

- root@khnog#./dcom [target-ID] [target-IP]

Page 11: Network Exploitation

THANK YOU