Top Banner
43

State of the Framework Address: Recent Developments in the Metasploit Framework

Jul 05, 2015

Download

Technology

egypt

Presented at DerbyCon, 2011
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: State of the Framework Address: Recent Developments in the Metasploit Framework
Page 2: State of the Framework Address: Recent Developments in the Metasploit Framework

We interrupt your regularly scheduled programming to bring

you…

Page 3: State of the Framework Address: Recent Developments in the Metasploit Framework

The State of the Framework

Page 4: State of the Framework Address: Recent Developments in the Metasploit Framework

Past

Page 5: State of the Framework Address: Recent Developments in the Metasploit Framework

We must know where we came from to know where we

are going

Page 6: State of the Framework Address: Recent Developments in the Metasploit Framework
Page 7: State of the Framework Address: Recent Developments in the Metasploit Framework
Page 8: State of the Framework Address: Recent Developments in the Metasploit Framework
Page 9: State of the Framework Address: Recent Developments in the Metasploit Framework

4.0

2003 2007 2008 2009 2011 … 2010

3.2 BSD

3.4

2012

3.0 3.6

3.1

Page 10: State of the Framework Address: Recent Developments in the Metasploit Framework

Modules by type and release

0

200

400

600

800

1000

1200

1400

3.0 3.1 3.2 3.3 3.4 3.5 3.6 3.7 4.0

Post

Auxiliary

Exploit

Page 11: State of the Framework Address: Recent Developments in the Metasploit Framework

Modules Over Time

0

100

200

300

400

500

600

700

800

1-M

ar-20

07

1-Ju

l-20

07

1-N

ov-2

00

7

1-M

ar-20

08

1-Ju

l-20

08

1-N

ov-2

00

8

1-M

ar-20

09

1-Ju

l-20

09

1-N

ov-2

00

9

1-M

ar-20

10

1-Ju

l-20

10

1-N

ov-2

01

0

1-M

ar-20

11

1-Ju

l-20

11

Exploit

Auxiliary

Post

Page 12: State of the Framework Address: Recent Developments in the Metasploit Framework

Module Format

• Originally tied to directory structure

– Now more flexible

• Module broke if you mv'd it

Page 13: State of the Framework Address: Recent Developments in the Metasploit Framework

Uses for Metasploit

• Running exploits, getting shells

• Creating exploits

Page 14: State of the Framework Address: Recent Developments in the Metasploit Framework
Page 15: State of the Framework Address: Recent Developments in the Metasploit Framework

Present

Page 16: State of the Framework Address: Recent Developments in the Metasploit Framework
Page 17: State of the Framework Address: Recent Developments in the Metasploit Framework

Focuses for 4.0

• Usability

• Scalability

• Passwords

• Better payloads

• Post exploitation

Page 18: State of the Framework Address: Recent Developments in the Metasploit Framework

Usability

• Installers that make everything easy

• Help for most commands

• Database command improvements

• Msfvenom

Page 19: State of the Framework Address: Recent Developments in the Metasploit Framework

Everything Works Out of the Box

• Ruby 1.9.2

• Postgres

• Java (for msfgui, armitage)

• Option to automatically update

• pcaprub

Page 20: State of the Framework Address: Recent Developments in the Metasploit Framework

The Database

• Auto configured by installer

• Now a core feature used by lots of modules

– Almost all auxiliaries, many posts

• Scales much better than before

• Better search capabilities

• Workspaces for logical separation

Page 21: State of the Framework Address: Recent Developments in the Metasploit Framework

Scalability

Page 22: State of the Framework Address: Recent Developments in the Metasploit Framework

Recent Focus on Passwords

• Authenticated code execution by design is better than an exploit

• Obvious: SSH, Telnet, RDP, VNC

• Less obvious:

– MySQL/MSSQL/PostgreSQL

– Tomcat/Axis2/JBOSS/Glassfish

– ManageEngine

Page 23: State of the Framework Address: Recent Developments in the Metasploit Framework

Payloads

• Dozens of formats and architectures

– PHP; Java (jar, war, jsp); Win32, 64; BSD; OSX

– x86, PPC, ARM, MIPS, cmd exec, …

• Reverse HTTP(s) stagers for Win32, Java meterpreters

• Railgun

Page 24: State of the Framework Address: Recent Developments in the Metasploit Framework

Post Modules

• Biggest change in a long time

• Replaces meterpreter scripts

• More comprehensive Post-exploitation API

– OMG Railgun

– Shell sessions, too

– You should have been in Rob and Chris' talk

• My utopian ideal: post mods work on all kinds of sessions on all supported platforms

Page 25: State of the Framework Address: Recent Developments in the Metasploit Framework

Moar Passwerdz

Page 26: State of the Framework Address: Recent Developments in the Metasploit Framework

Uses for Metasploit

• Running exploits, getting shells

• Creating exploits

• Auxiliary modules, discovery, systems admin

• Post exploitation, looting pwned boxes

• Data collection and correlation

Page 27: State of the Framework Address: Recent Developments in the Metasploit Framework

Future

Page 28: State of the Framework Address: Recent Developments in the Metasploit Framework

Future of Exploits

• Continued focus on Authenticated Code Exec

– Oracle, various CMSes

• Hack all the things

Page 29: State of the Framework Address: Recent Developments in the Metasploit Framework

Future of Payloads

• Linux meterpreter – Yes, I know I've been saying this for 3 years

• Java meterpreter to keep pace with Win32 – Thanks to mihi

• Meterpreter needs to only load stuff that makes sense for the platform

• IPv6 support for more stuff – Mostly works, 32-bit Windows and Linux payloads

– Toredo

Page 30: State of the Framework Address: Recent Developments in the Metasploit Framework

Future of Post Exploitation

• Huge amount of community dev going into Post modules

• Password stealers for every conceivable application that stores them

– Thanks TheLightCosine!

• More local privesc exploits

Page 31: State of the Framework Address: Recent Developments in the Metasploit Framework

More Post Exploitation

• More and better APIs

– Cross-platform pilfering

• Easier

Page 32: State of the Framework Address: Recent Developments in the Metasploit Framework

Future of Modules in General

• Some form of exploit abstraction

• Transport should be a user option

– Not a whole different module with the same exploit code

– Example: PDF exploits over HTTP, FTP, SMB, email

Page 33: State of the Framework Address: Recent Developments in the Metasploit Framework

Startup Time

Page 34: State of the Framework Address: Recent Developments in the Metasploit Framework

Contributing Should be Easy

Page 35: State of the Framework Address: Recent Developments in the Metasploit Framework

Contribution Workflow

Find a bug Submit a ticket Ask about it in

IRC

Get tired of waiting, fix it

yourself Submit a patch

Tell me I forgot about it

Remind me again

Give up

Page 36: State of the Framework Address: Recent Developments in the Metasploit Framework
Page 37: State of the Framework Address: Recent Developments in the Metasploit Framework

Documentation

• Two main sources of documentation right now

– Reading 500k lines of ruby source

– Asking me in IRC

• It was hard to write, it should be hard to read, dammit!

Page 38: State of the Framework Address: Recent Developments in the Metasploit Framework

Documentation

• Updated users' guide

• Updated developers' guide

• Clean up rdoc

Page 39: State of the Framework Address: Recent Developments in the Metasploit Framework

Installation Should be Easier

• Everything should *really* work out of the box

• Everything should be configurable from the commandline

• Install Express/Pro without another big download of mostly the same stuff

– I know, shameless plug, but hey it pays for all the rest of this

Page 40: State of the Framework Address: Recent Developments in the Metasploit Framework

Uses for Metasploit

• Running exploits, getting shells

• Creating exploits

• Auxiliary modules, discovery, systems admin

• Post exploitation, looting pwned boxes

• Data collection and correlation

• And….

Page 41: State of the Framework Address: Recent Developments in the Metasploit Framework
Page 42: State of the Framework Address: Recent Developments in the Metasploit Framework

Why?

• Metasploit should be the first and the last tool you need

• Anything that gets you access

– Proof positive tool

– Not just exploits, identities

• Maintain that access

• Use your access to achieve your goals

• Store all of the above in a manageable way

Page 43: State of the Framework Address: Recent Developments in the Metasploit Framework

Questions?

• If I have ever kickbanned you in #metasploit, I'm sorry

– But not that sorry, you should have googled more