metasploit, use at your own risk

21
1 Metasploit Metasploit Use at Your Own Risk Use at Your Own Risk Jasakom Seminar I, 26 Mei 2007 Poins Square, Jakarta judul Presented by Thomas Gregory Jasakom Moderator

Upload: digital-echidna

Post on 05-Dec-2014

6.466 views

Category:

Documents


1 download

DESCRIPTION

Seminar Jasakom I, 26 Juni 2007 Sesi Pertama - Metasploit, Use at your own risk.

TRANSCRIPT

Page 1: Metasploit, Use at your own risk

1

Meta sploitMeta sploitUse at Your Own RiskUse at Your Own RiskJasakom Seminar I, 26 Mei 2007

Poins Square, Jakarta

judul

Presented by Thomas GregoryJasakom Moderator

Page 2: Metasploit, Use at your own risk

2

sebelum mulai

■ perkenalan

■ tujuan dari seminar

■ disclaimer bukan seorang professional.

berdasarkan pembelajaran dan pemahaman.

Page 3: Metasploit, Use at your own risk

3

agenda

■ background security is fun !

apa itu metasploit

■ fungsi metasploit

■ keunggulan metasploit

■ demo

■ questions

Page 4: Metasploit, Use at your own risk

4

background

■ security is fun ! securitylife

➔ secara tidak sadar, hidup kita diselimuti security

vulnerability➔ ribuan celah keamanan tiap tahunnya

hacking➔ defacing, carding, exploit, dos,dll

hardening➔ menyusun strategi pertahanan

improving➔ meningkatkan kualitas dari kelemahan

Page 5: Metasploit, Use at your own risk

5

background

■ apa itu metasploit

■ the group professional grup

tukang riset..riset..dan riset !

mempelajari setiap bahasa pemrograman

■ the tool tool yang berguna untuk kebutuhan riset, pentest,

pencari bug

open source tool

“The Best a Haxor Can Get”

Page 6: Metasploit, Use at your own risk

6

fungsi metasploit

■ metasploit (sebenarnya) untuk riset dan penelitian eksploitasi keamanan

memahami cara kerja serangan

penetration testing

testing IPS/IDS

demo atau presentasi

legal hacking event

■ metasploit (ternyata juga) untuk ilegal hacking

Page 7: Metasploit, Use at your own risk

7

keunggulan metasploit

■ kompatibilitas

■ user interface

■ exploits

■ payloads

■ auxiliary

Page 8: Metasploit, Use at your own risk

8

kompatibilitas

■ linux, bsd, windows, mac osx, solaris, hpux, irix

■ native windows support

■ berjalan sukses di embedded linux/bsd

nokia 770, nokia N800

zaurus

Page 9: Metasploit, Use at your own risk

9

user interface

■ msfconsole tampilan konsole interaktif

■ msfweb tampilan web yang dinamis

■ msfcli eksploitasi perintah interaktif

■ msfpayload membuat executeable payload

■ msfgui (masih pengembangan) tunjuk, klak-klik, exploit

Page 10: Metasploit, Use at your own risk

10

user interface

Metasploit Framework 2.x

Page 11: Metasploit, Use at your own risk

11

user interface

Metasploit Framework 3.0

Page 12: Metasploit, Use at your own risk

12

exploits

■ ratusan orang merilis exploitnya sendiri ingin jadi yang pertama

semuanya punya “gayanya” masing-masing

semuanya merasa “gayanya” yang terbaik

■ exploit pada dasarnya konfigurasi dan membuat payload

mengirim ke aplikasi yang memiliki kelemahan

menunggu payload mengeksekusi

berinteraksi dengan payload

Page 13: Metasploit, Use at your own risk

13

exploits

■ metasploit framework 1.0 (2003-2004)

15 exploits, 1 user interface

■ metasploit framework 2.7 (2003-2006)

150+ exploits, 3 user interface

■ metasploit 3.0 (2007+)

192 (akan terus bertambah) exploits, 5 user interface

Page 14: Metasploit, Use at your own risk

14

exploits

■ links

http://www.milw0rm.com

http://securityfocus.com

http://securitydot.net/exploits.php

http://packetstormsecurity.org/

Page 15: Metasploit, Use at your own risk

15

exploits

Page 16: Metasploit, Use at your own risk

16

payloads

■ cara berkomunikasi reverse forward findtag HTTP (PassiveX)

■ tipe payload upexec shell adduser meterpreter

■ platform/payload/komunikasi windows/meterpreter/reverse_http linux/x86/shell/find_tag

Page 17: Metasploit, Use at your own risk

17

meterpreter

■ meterpreter? super payload untuk windows

gabungan perintah yang diinjeksi➔ ls, edit, upload, download

➔ ps, kill, execute, open

➔ route, ipconfig, portfwd

➔ eventlog, registry, threads

hashdump➔ meterpreter > use priv

kill antivirus, firewall, reboot, dll

Page 18: Metasploit, Use at your own risk

18

meterpreter

meterpreter hash dumpmeterpreter hash dump

Page 19: Metasploit, Use at your own risk

19

auxiliary

■ security tool --> module

■ fungsi selain exploits

scanner, info, dos, discovery

audit, brute force, fuzzing

Page 20: Metasploit, Use at your own risk

20

demo

DEMODEMO

Page 21: Metasploit, Use at your own risk

21

questions

Qu estio ns?Qu estio ns?