[CT437]: Start Assignment 1 presentation
This commit is contained in:
Binary file not shown.
After Width: | Height: | Size: 215 KiB |
Binary file not shown.
After Width: | Height: | Size: 238 KiB |
BIN
year4/semester2/CT437/assignments/presentation/images/nmap.png
Normal file
BIN
year4/semester2/CT437/assignments/presentation/images/nmap.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 586 KiB |
Binary file not shown.
After Width: | Height: | Size: 218 KiB |
BIN
year4/semester2/CT437/assignments/presentation/images/uniog.jpg
Normal file
BIN
year4/semester2/CT437/assignments/presentation/images/uniog.jpg
Normal file
Binary file not shown.
After Width: | Height: | Size: 107 KiB |
BIN
year4/semester2/CT437/assignments/presentation/presentation.pdf
Normal file
BIN
year4/semester2/CT437/assignments/presentation/presentation.pdf
Normal file
Binary file not shown.
@ -0,0 +1,88 @@
|
||||
%! TeX program = lualatex
|
||||
\documentclass[]{beamer}
|
||||
|
||||
\setbeamercolor{title}{fg=black}
|
||||
\setbeamercolor{frametitle}{fg=black}
|
||||
\setbeamercolor{caption}{fg=black}
|
||||
\setbeamercolor{caption name}{fg=black}
|
||||
|
||||
\setbeamertemplate{navigation symbols}{}
|
||||
\setbeamertemplate{itemize item}{\color{black}$\bullet$}
|
||||
|
||||
% packages
|
||||
\usepackage{fontspec}
|
||||
\setmainfont{EB Garamond}
|
||||
\usefonttheme{serif}
|
||||
\setmonofont[Scale=MatchLowercase]{Deja Vu Sans Mono}
|
||||
|
||||
\usepackage{microtype} % Slightly tweak font spacing for aesthetics
|
||||
\usepackage[english]{babel} % Language hyphenation and typographical rules
|
||||
|
||||
\usepackage{minted}
|
||||
\usemintedstyle{algol_nu}
|
||||
\usepackage{xcolor}
|
||||
|
||||
\usepackage{pgfplots}
|
||||
\pgfplotsset{width=\textwidth,compat=1.9}
|
||||
|
||||
\usepackage{caption}
|
||||
\newenvironment{code}{\captionsetup{type=listing, skip=0pt}}{}
|
||||
|
||||
\usepackage[yyyymmdd]{datetime}
|
||||
\renewcommand{\dateseparator}{--}
|
||||
|
||||
\author{Andrew Hayes }
|
||||
\title{CT437 Assignment 1}
|
||||
\subtitle{Ethical Hacking \& Penetration Testing using Kali Linux \& Metasploit}
|
||||
\institute{Student ID: 21321503}
|
||||
|
||||
\begin{document}
|
||||
|
||||
\frame{\titlepage}
|
||||
|
||||
\begin{frame}{Finding Exploits}
|
||||
The first thing I did to see what kind of vulnerabilities might exist in the Metasploitable2 virtual machine was to run a \mintinline{shell}{nmap} on the virtual machine's IP address to see what ports are in use and what services are on those ports:
|
||||
|
||||
\begin{figure}[H]
|
||||
\centering
|
||||
\includegraphics[width=0.8\textwidth]{./images/nmap.png}
|
||||
\caption{Output of \texttt{nmap}}
|
||||
\end{figure}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Exploit 1: FTP}
|
||||
Seeing that there was a FTP service running using \texttt{vsftpd 2.3.4}, I then searched for this service in the Metasploit console and saw that there was a backdoor exploit for this particular version of \texttt{vsftpd}:
|
||||
|
||||
\begin{figure}[H]
|
||||
\centering
|
||||
\includegraphics[width=\textwidth]{./images/searchftp.png}
|
||||
\caption{Output of \texttt{search vsftpd} in \texttt{msfconsole}}
|
||||
\end{figure}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Exploit 1: FTP}
|
||||
I then set the \texttt{RHOST} value and ran the exploit:
|
||||
|
||||
\begin{figure}[H]
|
||||
\centering
|
||||
\includegraphics[width=\textwidth]{./images/ftpexploit.png}
|
||||
\caption{Results of running \texttt{use exploit/unix/ftp/vsftpd\_234\_backdoor}}
|
||||
\end{figure}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Exploit 1: FTP}
|
||||
\begin{itemize}
|
||||
\item As can be seen from the output on the previous slide, this backdoor exploit gives us remote root access to the vulnerable Metasploitable2 machine -- a highly dangerous vulnerability.
|
||||
\item This works because version \texttt{2.3.4} of the \texttt{vsftpd} program was shipped with a malicious backdoor inserted into the binary that is triggered when a user attempts to login with a username ending in \texttt{:)} and opens a command shell on TCP port \texttt{6200}.
|
||||
\item The Metasploit exploit module attempts to login with a username ending in \texttt{:)}, triggering the backdoor, and then connects to port \texttt{6200}, thus giving the malicious user root access to the target system.
|
||||
\end{itemize}
|
||||
\end{frame}
|
||||
|
||||
\begin{frame}{Exploit 2: Samba}
|
||||
Seeing from the \texttt{nmap} output that there is a Samba service running, I then searched for this service in the Metasploit console and saw that there were more than 70 possible exploits using Samba.
|
||||
One in particular caught my eye, that being the \texttt{exploit/multi/samba/usermap\_script} module, as it had rank ``Excellent'' and allows the attacker to gain shell access to the target system.
|
||||
\end{frame}
|
||||
|
||||
|
||||
|
||||
\end{document}
|
Reference in New Issue
Block a user