[Article]-Video: The 15-Minute Network Pen Test Part 1

Viewing 20 reply threads
  • Author
    Posts
    • #3233
      Don Donzal
      Keymaster

      Ryan Linn has been contributing to EH-Net for quite some time. With his willingness to help with many projects and writing assignments, the quality of his work, and the expanse of his knowledge, it only made sense for him to be our next columnist. This first contribution will give you a great indication of his talents.

      We also came up with a new format for EH-Net vids that we hope will become the standard template. Please let us know what you think.

      In the near future, look for additional book reviews from Ryan in addition to Part 2 of this video series, other vids and a review of SANS updated 6-day course, Web App Penetration Testing and Ethical Hacking, by InGuardians Kevin Johnson. Should be a great year with this fantastic addition to our family.

      Welcome into the fray!!

      Permanent link: [Article]-Video: The 15-Minute Network Pen Test Part1

      [align=center:1kxhh4to][/align:1kxhh4to]

      There are numerous tools used in the Penetration Testing (pen testing) process, and there are plenty of books that go into how to use the individual tools. There are very few resources that discuss how the tools are used and how to approach the process.  When Henry Qin at the Duke University ACM Chapter approached EthicalHacker.net on doing a presentation for his organization on the tools and process of pen testing, I jumped at the opportunity.  The following videos encompass the basic outline of what was presented at Duke with some minor changes.

      The first video takes the viewer through the initial network recon stage of pen testing and then follows up with actual exploitation using Metasploit.  Initially the network is scanned through Nmap, and after some basic discovery and information gathering, the scan continues to Nessus.  Nessus is a vulnerability scanning tool that allows the user to analyze a host for vulnerabilities, but also has the ability to export reports.  The video then walks the viewer through importing the Nessus vulnerabilities directly into Metasploit in order to determine which Metasploit modules correspond to the Nessus vulnerabilities for the specific host.  The module data is then used to compromise a remote Microsoft Windows XP box.

      Stay tuned for Part 2 coming very soon.

      Don

    • #21500
      RoleReversal
      Participant

      Nice video and walkthrough Ryan 😀

      I’m looking forward to part 2

    • #21501
      morpheus063
      Participant

      Really Nice video. Thank you so much for this video and looking forward for the next release.

      All the best.

    • #21502
      dynamik
      Participant

      Great job! My only (very) minor suggestion would be to do a little editing and cut out that awkward silence while waiting for metasploit to load. I’m definitely looking forward to part two 😀

    • #21503
      alan
      Participant

      enjoyed it! waiting for the i’ve got shell access, now what!? part 2 🙂

    • #21504
      stimmerman
      Participant

      Thanks  for the video! The metasploit database/import thing was nice to learn 🙂
      Can’t wait for part two with ophtcrack?

    • #21505
      MadmanTM
      Participant

      yup, ophcrack with some little hash would be exquisite.

      thanks for the first part and impatiently waiting for the second one.

    • #21506
      punkrokk
      Participant

      nice video Ryan, I liked the demo of the metasploit db also!

    • #21507
      blackazarro
      Participant

      Nice, especially the part of importing Nessus results to Metasploit. Can’t wait for part 2.

    • #21508
      apollo
      Participant

      Thanks for the positive feedback 🙂 I’m hoping to do more of these in the future, so if you have some suggestions for things you would like to see, feel free to drop me a PM.  Hopefully everyone will find part 2 as interesting as part 1.

    • #21509
      Humper
      Participant

      Very nice work!!

      Whens part two going to be up?  You got me hooked now.. I wanna know more

    • #21510
      snortymcsnort
      Participant

      Great job on the video!

      I am working on some tools for an upcoming penetration test of my network. I have been running nessus scans on some XP boxes and they are currently showing as vulnerable to the MS08-067 vulnerability. I am exporting the scans as .nbe files and importing them into Metasploit framework3 using a sqlite3 database. When I run db_autopwn -t -x, some older exploits will show up but not the MS08-067 one that is in Metaploit. I looked in the nbe file and the reference to MS08-067 does show up. I have also ran fasttrack and that exploit from Metasploit does work. How does Metasploit reference the vulnerabilities found in the nessus scan?

    • #21511
      apollo
      Participant

      If you want the latest and greatest, then you need to make sure you have both of your feeds updated.  You will want to make sure you have the latest plugins from nessus.  The latest metasploit modules may not be in the metasploit release that is on the backtrack3 cd or the likes, so you may need to make sure that you update metasploit via subversion in order to have the latest exploits. 

      There are references in each metasploit module to CVE and other vulnerability tracking numbers, and metasploit walks through those to match up with the vulnerabilities that nessus provides.  If you don’t have the latest from Metasploit, or don’t have the latest from nessus, either one of those could lead to false negatives.

      If you have updated both and still don’t see it listed, let me know and I can try to help you figure out what is going on.

      Let me know if you have any more questions 🙂

    • #21512
      snortymcsnort
      Participant

      Thanks for the reply Apollo.  I believe I have updated Nessus and Metasploit to the latest feeds.  What I am seeing in my NBE file is a reference to ms08-067,  CVE-2008-4250, nBID 31874, and at the beginning of the line the number 34477.  Do you know the name of the file in Metasploit that reference these numbers?

      Thanks

    • #21513
      apollo
      Participant

      modules/exploits/windows/smb/ms08_067_netapi.rb is the metasploit module.  To find out what external vulnerability references a module has, if you open the file in a text viewer and search for the word “References” it should be easy to find.  This one has two: A CVE of 2008-4250 and a MS reference of MS08-067. 

      Hope this helps

    • #21514
      Kev
      Participant

      Nice job Apollo. I think its always helpful for people new to this to not only see how to work individual tools, but how to string them together efficiently. BTW, I enjoyed meeting and talking with you at the last Eh-net “get together” at Defcon. Keep up the good work.

    • #21515
      punkrokk
      Participant

      where’s part deux ?? ;D

    • #21516
      apollo
      Participant

      It is coming, Don has it and it is in the queue 🙂

      There is even one more after part 2 that will showcase some potential post-exploitation. 

    • #21517
      RoleReversal
      Participant

      @apollo wrote:

      It is coming

      Woohoo! 😀

    • #21518
      rmsa
      Participant

      Tanks, this video is a nice job Apollo.

    • #21519
      Don Donzal
      Keymaster

      Not a bad reception for his first official column. Well do him a favor and get him the recognition he deserves and digg this video:

      http://digg.com/security/Video_The_15_Minute_Network_Pen_Test_Part_1

      Don

      PS – Part 2 to drop next week!  8)

Viewing 20 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?