Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Exploits and Metasploit

Objective

Lab 4 is designed to provide you with hands-on, practical experience with exploiting vulnerabilities that we identify during the scanning and enumeration phase. Upon completion of lab 4, you will have an understanding of the following:

1. Nessus Refresher - we will revisit using Nessus to identify specific vulnerabilities

2. Metasploit - exploit the vulnerability that was identified with Nessus and use Meterpreter commands to gather information

Procedures

1. Nessus Refresher
  1. Power on the XP Security/Win7 VM along with the Win 2000 Server VM
  2. Re-run a Nessus scan looking for ONLY MS03-026. You will need to modify the scan policy and selected plug-ins to achieve this
  3. Screeshot your scan results and include in your submission

2. Exploiting MS03-026 - Manual
  1. Power on the BackTrack 5/Kali VM. Power off the XP Security VM for better performance.
  2. (In-class Students ONLY) Since the CDM lab does not allow internet connectivity to the VMs, you will need to download and transfer (via a USB drive) the exploit (oc- 192.dcom) from the COL site to the BackTrack 5 VM system. Or download the exploit from http://downloads.securityfocus.com/vulnerabilities/exploits/oc192-dcom.c
  3. (DL Students ONLY) The oc192-dcom.c file is on the desktop of the BT5R3-GNOME- VM-32 virtual machines in the new Gold snapshot
  4. To see the contents of the file, type cat oc192-dcom.c from the directory where the file resides (where did you put it?) and press enter
  5. Compile and run to view the options for the exploit. Include a screenshot of the complied exploit and output from running the exploit without any options

6. Run the exploit against the Windows 2000 system. Gather the following information about the server and include in your submission:
  1. The full version information
  2. The current network card/IP address settings on the server
  3. A list of the user accounts on the system
  4. The ARP table showing if any other systems have connected recently

3. Exploiting MS03-026 and Meterpreter Use - Metasploit
  1. Let's exploit the same vulnerability using Metasploit. On the BackTrack 5/Kali VM open a new terminal and type msfconsole and press enter
  2. Type search ms03-026 and press enter
  3. Figure out how to use this exploit and run it against the Windows 2000 Server, using Meterpreter as your payload (should be the default payload)
  4. Once connected via Meterpreter examine the options you have (i.e. stdapi, core, priv, etc.). Collect the same information as above in Part 2 Step 6 and include in your submission
  5. Figure out how to dump the password hashes off of the Windows 2000 Server, include a screenshot of the hashes in your submission. Q1. What accounts in this password hash dump would be of interest? Which ones would you likely skip/not crack?
  6. Q2. What process ID is Meterpreter running in? Gather the PID and then the service name. What account was running the exploited process? What is this process and what does it do in Windows? Run the command to identify the user context that Meterpreter is running in and include a screenshot in your submission. Q3. Given our current context, is token stealing possible - why or why not?
  7. Q4. If token stealing works from our current context, see if you can steal the token for the local admin account (hint: you'll need to look at the running processes and then steal the token of a process running in the user's context)
  8. Try to dump the hashes again. Q5. Why does it not work?
  9. Q6. Try to steal the token of the System account again by going back to the initial process by re-stealing the associated token. Why does it not work (i.e. what accounts have access to the tokens, specifically the impersonate delegate tokens)?
  10. Figure out how to get System level access again - there is a Meterpreter command that you can run that will put your Meterpreter session back in the context of the System account from a standard user account. Verify this by running the command that shows your current user context - include this work as a screenshot in your submission
  11. Q7. Which process ID did it migrate you to? Verify this by running the command that shows your current process ID after migration to the System account
  12. Now, steal the token associated with the winmgmt.exe process...attempt to dump the hashes again. It should work, include this as a screenshot in your submission file.

Note - the above questions and usage of Meterpreter is very important. You need to understand both how to exploit a system, and to understand the level of access you have

What you need to submit
To get credit for this lab you need to submit the following:
- A screenshot of the Nessus output, highlighting the MS03-026 vulnerability and all mentioned screenshot requirements listed in the lab instructions and answers to all questions in this lab assignment in a single file
- Note - it is helpful to the grader (me) if you put some level of explanation prior to each screenshot. Random screenshots that do not fulfill the requirement will receive zero credit. If you put "some" explanation at least the grader will know what you were trying to show and is more likely to issue partial credit.

Additional Exercises
The following items are additional exercises related to the lab. Feel free to explore these topics on your own.
- Spend time learning the ins and outs of Metasploit. Take a look at all the different payloads and meterpreter options and scripting. We will examine some of the more advanced features in Metasploit in a later module. In addition, this may come in handy for the capture the flag exercise at the conclusion of the course!
- We examined some of Meterpreter's options, look at the others as well. In addition, examine the other /post exploitation options...not all are available from Metrepreter.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91970535

Have any Question?


Related Questions in Computer Engineering

Question please assist with discussion questions please

Question: Please assist with discussion questions. Please answer following questions with at least 3 paragraph response. Thank you. Access control starts first with assessing risks so you can properly identify potential ...

Suppose that you want an operation for the adt list that

Suppose that you want an operation for the ADT list that adds an array of items to the end of the list. The header of the method could be as follows. public void addAll(T[] items) Write an implementation of this method f ...

Describe an ethical conundrum found in a magazine or

Describe an ethical conundrum found in a magazine or newspaper article, and please give your own thoughts. Give good citations, of course.

The newly elected president needs to decide the remaining 4

The newly elected president needs to decide the remaining 4 spots available in the cabinet he/she is appointing. If there are 13 eligible candidates for these positions (where rank matters), how many different ways can t ...

Write a java console application that calculates and

Write a java console application that calculates and displays the bank interest for N bank accounts. N should be declared as a constant and it should be equal to the largest digit of your student ID number (e.g. if your ...

student who is taking quizzes public class student

/** A student who is taking quizzes. */ public class Student { private String name; private double totalScore; private int quizCount; public Student (String n) { name = n; totalScore = 0; quizCount = 0; } public String g ...

Question suppose jim is in a middle school band that is

Question : Suppose Jim is in a middle school band that is selling cookie dough. His mom sends emails to all the employees of her company (100 people), inviting them to stop by after work to place orders for the cookie do ...

Question suppose you have two arrays of 8-bit signed

Question : Suppose you have two arrays of 8-bit signed integers P[i] and Q[i] for 0 = i A pointer to the array P is passed in register X and a pointer to the array Q is passed in register Y. The number of elements in eac ...

Williamnbspis interested in knowingnbspwhether or not

William is interested in knowing  whether or not athletics from his team have lower satisfaction with their team on a survey than the known population average survey score of 19  and the known population survey standard ...

Explain how amazon and walmart companies use information

Explain how Amazon and Walmart companies use Information and Communication Technologies (ICT) in their competitive strategies. Highlight the differences in their use of ICT.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As