Identify during the scanning and enumeration phase

Assignment Help Computer Engineering
Reference no: EM131214552

Exploits and Metasploit

Objective

Lab 4 is designed to provide you with hands-on, practical experience with exploiting vulnerabilities that we identify during the scanning and enumeration phase. Upon completion of lab 4, you will have an understanding of the following:

1. Nessus Refresher - we will revisit using Nessus to identify specific vulnerabilities

2. Metasploit - exploit the vulnerability that was identified with Nessus and use Meterpreter commands to gather information

Procedures

1. Nessus Refresher
  1. Power on the XP Security/Win7 VM along with the Win 2000 Server VM
  2. Re-run a Nessus scan looking for ONLY MS03-026. You will need to modify the scan policy and selected plug-ins to achieve this
  3. Screeshot your scan results and include in your submission

2. Exploiting MS03-026 - Manual
  1. Power on the BackTrack 5/Kali VM. Power off the XP Security VM for better performance.
  2. (In-class Students ONLY) Since the CDM lab does not allow internet connectivity to the VMs, you will need to download and transfer (via a USB drive) the exploit (oc- 192.dcom) from the COL site to the BackTrack 5 VM system. Or download the exploit from https://downloads.securityfocus.com/vulnerabilities/exploits/oc192-dcom.c
  3. (DL Students ONLY) The oc192-dcom.c file is on the desktop of the BT5R3-GNOME- VM-32 virtual machines in the new Gold snapshot
  4. To see the contents of the file, type cat oc192-dcom.c from the directory where the file resides (where did you put it?) and press enter
  5. Compile and run to view the options for the exploit. Include a screenshot of the complied exploit and output from running the exploit without any options

6. Run the exploit against the Windows 2000 system. Gather the following information about the server and include in your submission:
  1. The full version information
  2. The current network card/IP address settings on the server
  3. A list of the user accounts on the system
  4. The ARP table showing if any other systems have connected recently

3. Exploiting MS03-026 and Meterpreter Use - Metasploit
  1. Let's exploit the same vulnerability using Metasploit. On the BackTrack 5/Kali VM open a new terminal and type msfconsole and press enter
  2. Type search ms03-026 and press enter
  3. Figure out how to use this exploit and run it against the Windows 2000 Server, using Meterpreter as your payload (should be the default payload)
  4. Once connected via Meterpreter examine the options you have (i.e. stdapi, core, priv, etc.). Collect the same information as above in Part 2 Step 6 and include in your submission
  5. Figure out how to dump the password hashes off of the Windows 2000 Server, include a screenshot of the hashes in your submission. Q1. What accounts in this password hash dump would be of interest? Which ones would you likely skip/not crack?
  6. Q2. What process ID is Meterpreter running in? Gather the PID and then the service name. What account was running the exploited process? What is this process and what does it do in Windows? Run the command to identify the user context that Meterpreter is running in and include a screenshot in your submission. Q3. Given our current context, is token stealing possible - why or why not?
  7. Q4. If token stealing works from our current context, see if you can steal the token for the local admin account (hint: you'll need to look at the running processes and then steal the token of a process running in the user's context)
  8. Try to dump the hashes again. Q5. Why does it not work?
  9. Q6. Try to steal the token of the System account again by going back to the initial process by re-stealing the associated token. Why does it not work (i.e. what accounts have access to the tokens, specifically the impersonate delegate tokens)?
  10. Figure out how to get System level access again - there is a Meterpreter command that you can run that will put your Meterpreter session back in the context of the System account from a standard user account. Verify this by running the command that shows your current user context - include this work as a screenshot in your submission
  11. Q7. Which process ID did it migrate you to? Verify this by running the command that shows your current process ID after migration to the System account
  12. Now, steal the token associated with the winmgmt.exe process...attempt to dump the hashes again. It should work, include this as a screenshot in your submission file.

Note - the above questions and usage of Meterpreter is very important. You need to understand both how to exploit a system, and to understand the level of access you have

What you need to submit
To get credit for this lab you need to submit the following:
- A screenshot of the Nessus output, highlighting the MS03-026 vulnerability and all mentioned screenshot requirements listed in the lab instructions and answers to all questions in this lab assignment in a single file
- Note - it is helpful to the grader (me) if you put some level of explanation prior to each screenshot. Random screenshots that do not fulfill the requirement will receive zero credit. If you put "some" explanation at least the grader will know what you were trying to show and is more likely to issue partial credit.

Additional Exercises
The following items are additional exercises related to the lab. Feel free to explore these topics on your own.
- Spend time learning the ins and outs of Metasploit. Take a look at all the different payloads and meterpreter options and scripting. We will examine some of the more advanced features in Metasploit in a later module. In addition, this may come in handy for the capture the flag exercise at the conclusion of the course!
- We examined some of Meterpreter's options, look at the others as well. In addition, examine the other /post exploitation options...not all are available from Metrepreter.

Reference no: EM131214552

Questions Cloud

Calculate attenuation constant due to losses in the walls : Conductor (wall) losses. A rectangular waveguide is made of aluminum, which has conductivity of 3.6 x 107 S/m. The walls of the waveguide are thick and the internal dimensions are a = 25.4 mm and b = 38.1 mm. Assuming the waveguide is empty (free ..
Describe the primary characteristics of art of middle ages : Describe the primary characteristics of art of that period, how each of the following eras of art history reflected its time and why art changed from era to era.
Compute the product costs per unit assuming : Tiger Furnishings produces two models of cabinets for home theater components, the Basic and the Dominator. Data on operations and costs for March follow: Compute the product costs per unit assuming that Tiger Furnishings uses direct labor costs and ..
Review the balance sheet of the company : HI5001 Accounting for Business Decisions Group Assignment. Review the balance sheet of the company and indicate the amount of the following: Total current assets and Total non-current assets
Identify during the scanning and enumeration phase : Provide you with hands-on, practical experience with exploiting vulnerabilities that we identify during the scanning and enumeration phase.
David meets goliath-negotiating with wal-mart : Consider a situation where you are negotiating with Wal-Mart for your family farm's milk. Confronted with various hardball price challenges, what type of negotiation situation would you use: distributive or integrative and why?
Gross estate for federal estate tax purposes : John and Mary owned a home as tenants by the entirety. The home was purchased in 1995 for $100,000. John contributed $70,000 toward the purchase price and Mary contributed $30,000. When John died in 2015, the home was worth $300,000. $210,000 will be..
Unit that social computing : We have learned during this unit that social computing can help improve an organization's visibility and, as a result, increase revenue for the organization. For this assignment, choose a peer-reviewed article concerning the effect of social compu..
Priorities on projects usually change all the time : As we all know priorities on projects usually change all the time. Depending on how projects are managed, priorities are handled differently. In Agile approach, if a timebox (iteration) plan needs to be re-prioritized in a hurry, who do you think ..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd