Identify during the scanning and enumeration phase

Assignment Help Computer Engineering
Reference no: EM131214552

Exploits and Metasploit

Objective

Lab 4 is designed to provide you with hands-on, practical experience with exploiting vulnerabilities that we identify during the scanning and enumeration phase. Upon completion of lab 4, you will have an understanding of the following:

1. Nessus Refresher - we will revisit using Nessus to identify specific vulnerabilities

2. Metasploit - exploit the vulnerability that was identified with Nessus and use Meterpreter commands to gather information

Procedures

1. Nessus Refresher
  1. Power on the XP Security/Win7 VM along with the Win 2000 Server VM
  2. Re-run a Nessus scan looking for ONLY MS03-026. You will need to modify the scan policy and selected plug-ins to achieve this
  3. Screeshot your scan results and include in your submission

2. Exploiting MS03-026 - Manual
  1. Power on the BackTrack 5/Kali VM. Power off the XP Security VM for better performance.
  2. (In-class Students ONLY) Since the CDM lab does not allow internet connectivity to the VMs, you will need to download and transfer (via a USB drive) the exploit (oc- 192.dcom) from the COL site to the BackTrack 5 VM system. Or download the exploit from https://downloads.securityfocus.com/vulnerabilities/exploits/oc192-dcom.c
  3. (DL Students ONLY) The oc192-dcom.c file is on the desktop of the BT5R3-GNOME- VM-32 virtual machines in the new Gold snapshot
  4. To see the contents of the file, type cat oc192-dcom.c from the directory where the file resides (where did you put it?) and press enter
  5. Compile and run to view the options for the exploit. Include a screenshot of the complied exploit and output from running the exploit without any options

6. Run the exploit against the Windows 2000 system. Gather the following information about the server and include in your submission:
  1. The full version information
  2. The current network card/IP address settings on the server
  3. A list of the user accounts on the system
  4. The ARP table showing if any other systems have connected recently

3. Exploiting MS03-026 and Meterpreter Use - Metasploit
  1. Let's exploit the same vulnerability using Metasploit. On the BackTrack 5/Kali VM open a new terminal and type msfconsole and press enter
  2. Type search ms03-026 and press enter
  3. Figure out how to use this exploit and run it against the Windows 2000 Server, using Meterpreter as your payload (should be the default payload)
  4. Once connected via Meterpreter examine the options you have (i.e. stdapi, core, priv, etc.). Collect the same information as above in Part 2 Step 6 and include in your submission
  5. Figure out how to dump the password hashes off of the Windows 2000 Server, include a screenshot of the hashes in your submission. Q1. What accounts in this password hash dump would be of interest? Which ones would you likely skip/not crack?
  6. Q2. What process ID is Meterpreter running in? Gather the PID and then the service name. What account was running the exploited process? What is this process and what does it do in Windows? Run the command to identify the user context that Meterpreter is running in and include a screenshot in your submission. Q3. Given our current context, is token stealing possible - why or why not?
  7. Q4. If token stealing works from our current context, see if you can steal the token for the local admin account (hint: you'll need to look at the running processes and then steal the token of a process running in the user's context)
  8. Try to dump the hashes again. Q5. Why does it not work?
  9. Q6. Try to steal the token of the System account again by going back to the initial process by re-stealing the associated token. Why does it not work (i.e. what accounts have access to the tokens, specifically the impersonate delegate tokens)?
  10. Figure out how to get System level access again - there is a Meterpreter command that you can run that will put your Meterpreter session back in the context of the System account from a standard user account. Verify this by running the command that shows your current user context - include this work as a screenshot in your submission
  11. Q7. Which process ID did it migrate you to? Verify this by running the command that shows your current process ID after migration to the System account
  12. Now, steal the token associated with the winmgmt.exe process...attempt to dump the hashes again. It should work, include this as a screenshot in your submission file.

Note - the above questions and usage of Meterpreter is very important. You need to understand both how to exploit a system, and to understand the level of access you have

What you need to submit
To get credit for this lab you need to submit the following:
- A screenshot of the Nessus output, highlighting the MS03-026 vulnerability and all mentioned screenshot requirements listed in the lab instructions and answers to all questions in this lab assignment in a single file
- Note - it is helpful to the grader (me) if you put some level of explanation prior to each screenshot. Random screenshots that do not fulfill the requirement will receive zero credit. If you put "some" explanation at least the grader will know what you were trying to show and is more likely to issue partial credit.

Additional Exercises
The following items are additional exercises related to the lab. Feel free to explore these topics on your own.
- Spend time learning the ins and outs of Metasploit. Take a look at all the different payloads and meterpreter options and scripting. We will examine some of the more advanced features in Metasploit in a later module. In addition, this may come in handy for the capture the flag exercise at the conclusion of the course!
- We examined some of Meterpreter's options, look at the others as well. In addition, examine the other /post exploitation options...not all are available from Metrepreter.

Reference no: EM131214552

Questions Cloud

Calculate attenuation constant due to losses in the walls : Conductor (wall) losses. A rectangular waveguide is made of aluminum, which has conductivity of 3.6 x 107 S/m. The walls of the waveguide are thick and the internal dimensions are a = 25.4 mm and b = 38.1 mm. Assuming the waveguide is empty (free ..
Describe the primary characteristics of art of middle ages : Describe the primary characteristics of art of that period, how each of the following eras of art history reflected its time and why art changed from era to era.
Compute the product costs per unit assuming : Tiger Furnishings produces two models of cabinets for home theater components, the Basic and the Dominator. Data on operations and costs for March follow: Compute the product costs per unit assuming that Tiger Furnishings uses direct labor costs and ..
Review the balance sheet of the company : HI5001 Accounting for Business Decisions Group Assignment. Review the balance sheet of the company and indicate the amount of the following: Total current assets and Total non-current assets
Identify during the scanning and enumeration phase : Provide you with hands-on, practical experience with exploiting vulnerabilities that we identify during the scanning and enumeration phase.
David meets goliath-negotiating with wal-mart : Consider a situation where you are negotiating with Wal-Mart for your family farm's milk. Confronted with various hardball price challenges, what type of negotiation situation would you use: distributive or integrative and why?
Gross estate for federal estate tax purposes : John and Mary owned a home as tenants by the entirety. The home was purchased in 1995 for $100,000. John contributed $70,000 toward the purchase price and Mary contributed $30,000. When John died in 2015, the home was worth $300,000. $210,000 will be..
Unit that social computing : We have learned during this unit that social computing can help improve an organization's visibility and, as a result, increase revenue for the organization. For this assignment, choose a peer-reviewed article concerning the effect of social compu..
Priorities on projects usually change all the time : As we all know priorities on projects usually change all the time. Depending on how projects are managed, priorities are handled differently. In Agile approach, if a timebox (iteration) plan needs to be re-prioritized in a hurry, who do you think ..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Fnd out two blogs which describe web site design trends

question 1 find two blogs that discuss web site design trends. on each site find blog entries on a specific

  Some it department policies are designed to prevent

some it department policies are designed to prevent behaviors by it staff. while some depend upon the employee

  Create a sql query that returns the names of the students

Write down a SQL query that returns the names of the students (lname, fname), and the major of the major with most students. If more than one major is tied for most students, then list all the names of the students from both majors (as well as the..

  Identify threats and vulnerabilities in an it infrastructure

To complete Lab 1, please access and complete the lab activities under Topic 1: Identifying Threats and Vulnerabilities in an IT Infrastructure.

  Determine the successor to the throne of france

Define the predicate Successor(Year) giving the solution as the first successor to the crown for the year specified.

  Display comments and identified source codes

Write and manually assemble the following programs. All memory addresses include the starting and ending addreses. display comments and identified source codes.

  Computer graphics make a comparison between vector graphics

make a comparison between vector graphics and raster graphics display system and justify your

  Economic life of technology product

Explain what do you understand by the economic life of a technology product. Discuss how does economic life of the technology product is compared with the technology life and product life?

  Research various decision-making process options

Research various decision-making process options and the advantages and disadvantages of each. Select a decision-making process, or design your own process using your research as a guide.

  Make program that creates a tab delimited file

Write down a C++ program that creates a tab delimited file that can be opened by a spreadsheet to graph the altitude and velocity of a balloon as a function of time from the time of release through 48 hrs.

  You are a network support technician for a college

explain why each step is necessary. Suppose that your troubleshooting methodology leads you to determine that the problems was caused by a malfunctioning gateway. Suggest ways in which the problem could have been prevented.

  Why the whodunit system design had a great start

The Whodunit system design had a great start, and providing more detail is the next appropriate step in the design process. Collaboration diagrams help give this additional detail, and they will be the focus of this assignment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd