- This topic has 20 replies, 14 voices, and was last updated 11 years, 11 months ago by
Don Donzal.
-
AuthorPosts
-
-
January 21, 2009 at 9:09 am #3233
Don Donzal
KeymasterRyan Linn has been contributing to EH-Net for quite some time. With his willingness to help with many projects and writing assignments, the quality of his work, and the expanse of his knowledge, it only made sense for him to be our next columnist. This first contribution will give you a great indication of his talents.
We also came up with a new format for EH-Net vids that we hope will become the standard template. Please let us know what you think.
In the near future, look for additional book reviews from Ryan in addition to Part 2 of this video series, other vids and a review of SANS updated 6-day course, Web App Penetration Testing and Ethical Hacking, by InGuardians Kevin Johnson. Should be a great year with this fantastic addition to our family.
Welcome into the fray!!
Permanent link: [Article]-Video: The 15-Minute Network Pen Test Part1
[align=center:1kxhh4to]
[/align:1kxhh4to]
There are numerous tools used in the Penetration Testing (pen testing) process, and there are plenty of books that go into how to use the individual tools. There are very few resources that discuss how the tools are used and how to approach the process. When Henry Qin at the Duke University ACM Chapter approached EthicalHacker.net on doing a presentation for his organization on the tools and process of pen testing, I jumped at the opportunity. The following videos encompass the basic outline of what was presented at Duke with some minor changes.
The first video takes the viewer through the initial network recon stage of pen testing and then follows up with actual exploitation using Metasploit. Initially the network is scanned through Nmap, and after some basic discovery and information gathering, the scan continues to Nessus. Nessus is a vulnerability scanning tool that allows the user to analyze a host for vulnerabilities, but also has the ability to export reports. The video then walks the viewer through importing the Nessus vulnerabilities directly into Metasploit in order to determine which Metasploit modules correspond to the Nessus vulnerabilities for the specific host. The module data is then used to compromise a remote Microsoft Windows XP box.
Stay tuned for Part 2 coming very soon.
Don
-
January 21, 2009 at 1:43 pm #21500
RoleReversal
ParticipantNice video and walkthrough Ryan 😀
I’m looking forward to part 2
-
January 21, 2009 at 2:23 pm #21501
morpheus063
ParticipantReally Nice video. Thank you so much for this video and looking forward for the next release.
All the best.
-
January 22, 2009 at 3:06 am #21502
dynamik
ParticipantGreat job! My only (very) minor suggestion would be to do a little editing and cut out that awkward silence while waiting for metasploit to load. I’m definitely looking forward to part two 😀
-
January 22, 2009 at 4:51 am #21503
alan
Participantenjoyed it! waiting for the i’ve got shell access, now what!? part 2 🙂
-
January 22, 2009 at 7:52 am #21504
stimmerman
ParticipantThanks for the video! The metasploit database/import thing was nice to learn 🙂
Can’t wait for part two with ophtcrack? -
January 22, 2009 at 7:28 pm #21505
MadmanTM
Participantyup, ophcrack with some little hash would be exquisite.
thanks for the first part and impatiently waiting for the second one.
-
January 26, 2009 at 7:16 pm #21506
punkrokk
Participantnice video Ryan, I liked the demo of the metasploit db also!
-
January 26, 2009 at 10:57 pm #21507
blackazarro
ParticipantNice, especially the part of importing Nessus results to Metasploit. Can’t wait for part 2.
-
January 27, 2009 at 5:08 pm #21508
apollo
ParticipantThanks for the positive feedback 🙂 I’m hoping to do more of these in the future, so if you have some suggestions for things you would like to see, feel free to drop me a PM. Hopefully everyone will find part 2 as interesting as part 1.
-
January 28, 2009 at 2:18 pm #21509
Humper
ParticipantVery nice work!!
Whens part two going to be up? You got me hooked now.. I wanna know more
-
January 28, 2009 at 7:13 pm #21510
snortymcsnort
ParticipantGreat job on the video!
I am working on some tools for an upcoming penetration test of my network. I have been running nessus scans on some XP boxes and they are currently showing as vulnerable to the MS08-067 vulnerability. I am exporting the scans as .nbe files and importing them into Metasploit framework3 using a sqlite3 database. When I run db_autopwn -t -x, some older exploits will show up but not the MS08-067 one that is in Metaploit. I looked in the nbe file and the reference to MS08-067 does show up. I have also ran fasttrack and that exploit from Metasploit does work. How does Metasploit reference the vulnerabilities found in the nessus scan?
-
January 28, 2009 at 8:54 pm #21511
apollo
ParticipantIf you want the latest and greatest, then you need to make sure you have both of your feeds updated. You will want to make sure you have the latest plugins from nessus. The latest metasploit modules may not be in the metasploit release that is on the backtrack3 cd or the likes, so you may need to make sure that you update metasploit via subversion in order to have the latest exploits.
There are references in each metasploit module to CVE and other vulnerability tracking numbers, and metasploit walks through those to match up with the vulnerabilities that nessus provides. If you don’t have the latest from Metasploit, or don’t have the latest from nessus, either one of those could lead to false negatives.
If you have updated both and still don’t see it listed, let me know and I can try to help you figure out what is going on.
Let me know if you have any more questions 🙂
-
January 29, 2009 at 1:46 pm #21512
snortymcsnort
ParticipantThanks for the reply Apollo. I believe I have updated Nessus and Metasploit to the latest feeds. What I am seeing in my NBE file is a reference to ms08-067, CVE-2008-4250, nBID 31874, and at the beginning of the line the number 34477. Do you know the name of the file in Metasploit that reference these numbers?
Thanks
-
January 29, 2009 at 4:38 pm #21513
apollo
Participantmodules/exploits/windows/smb/ms08_067_netapi.rb is the metasploit module. To find out what external vulnerability references a module has, if you open the file in a text viewer and search for the word “References” it should be easy to find. This one has two: A CVE of 2008-4250 and a MS reference of MS08-067.
Hope this helps
-
January 30, 2009 at 5:20 pm #21514
Kev
ParticipantNice job Apollo. I think its always helpful for people new to this to not only see how to work individual tools, but how to string them together efficiently. BTW, I enjoyed meeting and talking with you at the last Eh-net “get together” at Defcon. Keep up the good work.
-
February 18, 2009 at 1:40 am #21515
punkrokk
Participantwhere’s part deux ?? ;D
-
February 18, 2009 at 2:33 am #21516
apollo
ParticipantIt is coming, Don has it and it is in the queue 🙂
There is even one more after part 2 that will showcase some potential post-exploitation.
-
February 18, 2009 at 8:29 am #21517
RoleReversal
Participant -
February 18, 2009 at 11:42 am #21518
rmsa
ParticipantTanks, this video is a nice job Apollo.
-
February 18, 2009 at 10:19 pm #21519
Don Donzal
KeymasterNot a bad reception for his first official column. Well do him a favor and get him the recognition he deserves and digg this video:
http://digg.com/security/Video_The_15_Minute_Network_Pen_Test_Part_1
Don
PS – Part 2 to drop next week! 8)
-
-
AuthorPosts
- You must be logged in to reply to this topic.