cit 480: securing computer systems · 2019. 8. 25. · vulnerability scanners can identify...

18
CIT 480: Securing Computer Systems Vulnerability Scanning and Exploitation Frameworks

Upload: others

Post on 28-Mar-2021

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

CIT 480: Securing Computer Systems

Vulnerability Scanning and Exploitation Frameworks

Page 2: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Vulnerability Scanners Vulnerability scanners are automated tools that scan hosts and networks for potential vulnerabilities, including

– Configuration errors – Known unpatched vulnerabilities

Page 3: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Vulnerability Databases

Page 4: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Advantages Vulnerability scanners can identify thousands of potential security issues.

– Automatically and quickly. – On a regular basis, to ensure no systems have become

vulnerable. Can identify problems missed by or misconfigured by administrators.

Lets security know where problems exist.

Essential part of defense in depth.

Page 5: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Drawbacks Results only as good as vulnerability database.

– Must keep vulnerability db up to date. Some reported vulnerabilities are false positives.

– Must check for existence of actual vulnerability. – Configure scanner to ignore false +s in future scans.

Human threats are better than scanner – Can use zero day vulnerabilities not found in db. – Can find misconfigurations or combinations of security

problems that lead to vulnerabilities that scanner cannot find.

Page 6: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Vulnerability Scanners

Page 7: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

OpenVAS Architecture

Page 8: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

OpenVAS In-progress Scans

Page 9: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

OpenVAS Vulnerability Report

Page 10: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Exploitation Frameworks Exploitation frameworks allow users to

– Choose and configure an exploit from a database of exploits.

– Launch exploits on specified targets to verify whether a vulnerability is present or not.

Useful for – Verifying vulnerability scanner results. – Performing penetration tests. – Convincing management that a problem exists.

Page 11: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Exploitation Frameworks

Page 12: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Metasploit Architecture

Page 13: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Metasploit Interfaces msfconsole

– Interactive command line interface. msfcli

– Non-interactive command line interface. – msfcli windows/smb/ms08_067_netapi RHOST=192.168.56.101

PAYLOAD=windows/shell/bind_tcp

Armitage – Interactive graphical interface.

Page 14: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Exploit Configuration 1. OS and Application Version

– Variants of exploit may need to be chosen. 2. Target selection

– IP address and port 3. Payload selection

– Select shellcode type, e.g. shell or desktop. 4. Encoding

– Encoding of exploit avoids IPS or AV detection.

Page 15: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Payloads Bind Shell

– Open a port on the exploited host offering a shell with no password required.

Reverse Shell – Target makes connection back to listening port on one

of your servers, offering a shell. Remote Desktop

– Remote desktop using RDP, VNC, NX, or X. Meterpreter

– Advanced payload with post-exploitation modules, including key logging, sniffing, hash dumping, etc.

Page 16: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Key Points Vulnerability scanners

– Automatically scan network to find vulnerabilities based on vulnerability database.

– Results only as good as vulnerability database. – Human attackers are better than scanners, so a

clean scan doesn’t indicate perfect security. Exploitation frameworks

– Verify vulnerability scanner results. – Assist in penetration testing.

Page 17: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

References 1. David Kennedy et. Al., Metasploit: The

Penetration Tester’s Guide, No Starch Press, 2011.

Page 18: CIT 480: Securing Computer Systems · 2019. 8. 25. · Vulnerability scanners can identify thousands of potential security issues. – Automatically and quickly. – On a regular

Released under CC BY-SA 3.0 This presentation is released under the Creative Commons

Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0) license You are free:

to Share — to copy and redistribute the material in any medium to Adapt— to remix, build, and transform upon the material to use part or all of this presentation in your own classes

Under the following conditions: Attribution — You must attribute the work to James Walden, but

cannot do so in a way that suggests that he endorses you or your use of these materials.

Share Alike — If you remix, transform, or build upon this material, you must distribute the resulting work under this or a similar open license.

Details and full text of the license can be found at https://creativecommons.org/licenses/by-nc-sa/3.0/