160 likes | 313 Views
OWASP German Chapter Advanced Penetration Testing in secured Enviroments - Part 1. Marko Winkler marko.wnklr@gmail.com. Content. Virtual Lab Planning Reconnaissance Exploitation Prospects. Virtual Lab. Kali Linux: http ://www.kali.org/downloads/
E N D
OWASP German ChapterAdvanced Penetration Testing in secured Enviroments-Part 1 Marko Winkler marko.wnklr@gmail.com
Content • Virtual Lab • Planning • Reconnaissance • Exploitation • Prospects
Virtual Lab Kali Linux: http://www.kali.org/downloads/ Kioptrix: http://www.kioptrix.com/dlvm/Kioptrix_Level_1.rar
Planning – Dradis Framework • Ruby on Rails (RoR) framework • web-based interface • simplifies data collection throughout the testing cycle • manage data overload that can occur when pentesting • combining disparate data sources, such as Nmap, Nessus, and even Metasploit • sharing data with team members
Planning – Dradis Framework Source: http://dradisframework.org/
Reconnaissance • Intelligence Gathering is performing reconnaissance against a target to gather as much information as utilized when penetrating the target during the vulnerability assessment and exploitation phases Sources: http://www.pentest-standard.org/index.php/Intelligence_Gathering#Intelligence_Gathering Lee Allen - Advances Penetration TestingforHighly-SecuredEnviroments: The Ultimate Security Guide
Reconnaissance – nmap • ActiveFootprinting : Port Scanning & Banner Grabbing • Nmap ("Network Mapper") writtenby Gordon Lyon • standard for network auditing/scanning • runs on both Linux and Windows (cmd line & GUI) • Nmapcommandsyntax: nmap -{type(s)} -{opt(s)} {target} • Nmapscripting engine allows you to create and use custom scripts that perform many different functions
Reconnaissance – nmap • Further Information: DefCon18 - http://www.youtube.com/watch?v=wMammEJywyA
Reconnaissance – Banner Grapping • enumeration technique used to glean information about computer systems on a network and the services running its open ports • used to identify network the version of applications and operating system • suallyperformed on Hyper Text Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP) • Tools commonly used to perform banner grabbing are Telnet, nmap, and Netcat Source: http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Banner_Grabbing_2
Exploitation – Exploit-DB • Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software • aim is to collect exploits from submittals and mailing lists and concentrate them in one, easy to navigate database
Exploitation – searchsploit • shell script to search a local repository of exploitdb • root@pentest ~# searchsploit [term1] [term2] [term3]
Exploitation – The Hard Way • Getexploit: /usr/share/exploitdb/platforms/ • Path: /linux/remote/10.c • gcc10.c -o SambaRemoteExploit • Troubleshooting?
Exploitation – Metasploit!! • single most useful auditing tools/framework freely available to security professionals (MSFconsole & Armitage) • Ruby based • easilybuildattackvectorstoaddexploits, playloads, encoders • createandexecuteadvancedattacks • uses PostgreSQL as its database Source: http://www.offensive-security.com/metasploit-unleashed/Msfconsole
Resources • Lee Allen - Advances Penetration TestingforHighly-SecuredEnviroments: The Ultimate Security Guide