SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Network	Exploitation
Mam	Koeun
Web Security at Trendsec Solution
I. About	me
II. Understanding	Basic	MSF	&	Terms
III. How	does	exploitation	work?
IV. How	does	exploitation	work?	
V. Common	Steps	of	a	compromise	
VI. Scan	For	ports	and	services	
VII.Metasploit	Framework	Basics
VIII.Meterpreter	Basics
Table	Of	Contents
ØMam	Koeun	
ØWeb	Security	@	Trendsec	Solution
ØCambodian	Mekong	University
About	Me
• Payload:	Actual	codes	that	transmit	data	or	
do	any	actions	automatically	as	its	purposes,	it	
runs	after	exploitation	
• Exploit:	Code	that	allows	attacker	to	take	
advantage	of	a	vulnerable	system
• Vulnerability:	Weaknesses	that	allows	
attacker	break	into/compromise	a	system’s	
security		
Understanding	Basic	MSF&TERMS
1- Vulnerability
2- Exploit
3- Payload
Robber
Vulnerable House
Understanding Basic MSF&TERMS
How	does	exploitation	work?
Exploit + Payload
Upload/Download Data, malware, rootkit,..
Exploit run first, if succeed payload runs next
How	does	exploitation	work?
- Scan ports and services running on that
target IP
- Identify a vulnerability service / known
exploit or private exploit
- Compromise, launch exploit, exploitation
plan
Common	Steps	Of	a	Compromise
- Scan a machine using tools like “nmap”
- Use port scanner to scan for ports and
services running on remote system
- Services scanning with version indentified
same time
Scan	For	Ports	and	Services
- Tool	for	development	and	testing	of	vulnerability	
- Can	be	used	for:
- Penetrating	testing
- Exploit	research
- Developing	IDS	signatures	
- Started	by	H.D	Moore,	2003	(Perl)
- Was	rewritten	in	Ruby,	2007	
- Acquired	by	Rapid7,	2009	
- Open	Source	and	free	for	use	
- Over	770+	tested	exploit	
- Over	228	payloads
Metasploit Basics
Commands	detail	in	
Demontration(Vulnerability	on	RPC	
DCOM(MS03_026))
- Scan a machine using tools like “nmap”
root@khnog#nmap –v –n [Target-IP]
root@khnog#nmap –sV –n [Target-IP]
- root@khnog#gcc dcom -0 dcom (compile
file)
- root@khnog#./dcom [target-ID] [target-IP]
THANK YOU

Mais conteúdo relacionado

Mais procurados

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 
IO Learning Objectives
IO Learning ObjectivesIO Learning Objectives
IO Learning Objectives
thinkict
 

Mais procurados (20)

15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks15 Tips to Protect Yourself from Cyber Attacks
15 Tips to Protect Yourself from Cyber Attacks
 
The Corporate Web Security Landscape
The Corporate Web Security LandscapeThe Corporate Web Security Landscape
The Corporate Web Security Landscape
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Internet security software
Internet security softwareInternet security software
Internet security software
 
6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi6 Security Tips for Using Public WiFi
6 Security Tips for Using Public WiFi
 
How to stop computer crime
How to stop computer crimeHow to stop computer crime
How to stop computer crime
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Don’t Fall Victim to Social Engineering Traps
Don’t Fall Victim to Social Engineering TrapsDon’t Fall Victim to Social Engineering Traps
Don’t Fall Victim to Social Engineering Traps
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IO Learning Objectives
IO Learning ObjectivesIO Learning Objectives
IO Learning Objectives
 
Adware
AdwareAdware
Adware
 

Destaque

La computadora
La computadora  La computadora
La computadora
Erika_abi
 
Human resources chapter 1
Human resources chapter 1Human resources chapter 1
Human resources chapter 1
Dhawal Patva
 
Reviewing article
Reviewing articleReviewing article
Reviewing article
Callum Ward
 
Nurturing CGs Keynote NCCGP 2013
Nurturing CGs Keynote NCCGP 2013Nurturing CGs Keynote NCCGP 2013
Nurturing CGs Keynote NCCGP 2013
NCCGP
 
Silabus logam kurikul
Silabus logam kurikulSilabus logam kurikul
Silabus logam kurikul
Aries M
 
Infografis ujian-nasional-2015-argb
Infografis ujian-nasional-2015-argbInfografis ujian-nasional-2015-argb
Infografis ujian-nasional-2015-argb
Aries M
 
Resourceful Communities NCCGP 2013
Resourceful Communities NCCGP 2013Resourceful Communities NCCGP 2013
Resourceful Communities NCCGP 2013
NCCGP
 
Rpp mmk 2
Rpp mmk 2Rpp mmk 2
Rpp mmk 2
Aries M
 

Destaque (20)

La computadora
La computadora  La computadora
La computadora
 
Human resources chapter 1
Human resources chapter 1Human resources chapter 1
Human resources chapter 1
 
Reviewing article
Reviewing articleReviewing article
Reviewing article
 
Nurturing CGs Keynote NCCGP 2013
Nurturing CGs Keynote NCCGP 2013Nurturing CGs Keynote NCCGP 2013
Nurturing CGs Keynote NCCGP 2013
 
Process mining tools and defines
Process mining tools and definesProcess mining tools and defines
Process mining tools and defines
 
Silabus logam kurikul
Silabus logam kurikulSilabus logam kurikul
Silabus logam kurikul
 
αφροδιτη
αφροδιτηαφροδιτη
αφροδιτη
 
MainManager Cleaning module
MainManager Cleaning moduleMainManager Cleaning module
MainManager Cleaning module
 
Towers
TowersTowers
Towers
 
紹介活動宣言
紹介活動宣言紹介活動宣言
紹介活動宣言
 
2014年以降家つくり成功読本
2014年以降家つくり成功読本2014年以降家つくり成功読本
2014年以降家つくり成功読本
 
Efecto del agente espesante en la liberación de tirosol de natillas
Efecto del agente espesante en la liberación de tirosol de natillas Efecto del agente espesante en la liberación de tirosol de natillas
Efecto del agente espesante en la liberación de tirosol de natillas
 
TECNICAS DE AMPLIFICACAO DE ACIDOS NUCLEICOS
TECNICAS DE AMPLIFICACAO DE ACIDOS NUCLEICOSTECNICAS DE AMPLIFICACAO DE ACIDOS NUCLEICOS
TECNICAS DE AMPLIFICACAO DE ACIDOS NUCLEICOS
 
Infografis ujian-nasional-2015-argb
Infografis ujian-nasional-2015-argbInfografis ujian-nasional-2015-argb
Infografis ujian-nasional-2015-argb
 
Resourceful Communities NCCGP 2013
Resourceful Communities NCCGP 2013Resourceful Communities NCCGP 2013
Resourceful Communities NCCGP 2013
 
Mathematical Finance
Mathematical Finance Mathematical Finance
Mathematical Finance
 
Rpp mmk 2
Rpp mmk 2Rpp mmk 2
Rpp mmk 2
 
κεφ9
κεφ9κεφ9
κεφ9
 
Brief (1)
Brief (1)Brief (1)
Brief (1)
 
MainManager CAFM Software from FM180.com
MainManager CAFM Software from FM180.comMainManager CAFM Software from FM180.com
MainManager CAFM Software from FM180.com
 

Semelhante a Network Exploitation

01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
Harish Chaudhary
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 

Semelhante a Network Exploitation (20)

Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
The Threat Landscape & Network Security Measures
The Threat Landscape & Network Security MeasuresThe Threat Landscape & Network Security Measures
The Threat Landscape & Network Security Measures
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)Cyber crimeppt1-samweg1 (1)
Cyber crimeppt1-samweg1 (1)
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Application security
Application securityApplication security
Application security
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
Hvordan stopper du CryptoLocker?
Hvordan stopper du CryptoLocker?Hvordan stopper du CryptoLocker?
Hvordan stopper du CryptoLocker?
 
Metasploit
MetasploitMetasploit
Metasploit
 
PoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
 
Cyber security
Cyber securityCyber security
Cyber security
 
Honey pots
Honey potsHoney pots
Honey pots
 
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
WatchGuard - Cryptolocker en het gevecht tegen IT 's grootste vijand - Orbid ...
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Network Exploitation