You are on page 1of 7

METASPLOIT

FrameWork
Metasploit – Attack Vectors
• Many from which to choose:
– Operating systems
• Windows, Linux, Mac, Unix, Cisco, etc.
– Services
• Web, database, e-mail, FTP, etc.
• Extensible and configurable
Metasploit - Payloads
• Can be used to generate shellcode
– Framework comes with many useful payloads
• Spawn shell
• Run command
• Add privileged user
– Configurable
– Extensible
Metasploit Demo 1
• Example: the vulnerability that the
MSBlaster worm exploited
– http://www.securityfocus.com/bid/8205
• Let’s use Metasploit to:
– Choose the attack vector
– Choose the payload
– Run the exploit
– Interact with the compromised host
Metasploit Demo 2
• Example: a web browser vulnerability
• Let’s use Metasploit to:
– Choose the attack vector
– Choose the payload
– Run the exploit
– Interact with the compromised host
• Elevate privileges
• Setup persistence
• Capture passwords
Summary

• For many known vulnerabilities attackers


do not have to write their own exploit code
– “Canned” exploits
– The Metasploit Framework
• Choose and configure an attack vector
• Choose and configure a payload
• Interact with host
Title Lorem Ipsum dolor

LOREM IPSUM LOREM IPSUM LOREM IPSUM


DOLOR DOLOR DOLOR

You might also like