who am i ? H D Moore <hdm [at] metasploit.com> Metasploit - - PowerPoint PPT Presentation

who am i
SMART_READER_LITE
LIVE PREVIEW

who am i ? H D Moore <hdm [at] metasploit.com> Metasploit - - PowerPoint PPT Presentation

METASPLOIT FOSDEM 2007 who am i ? H D Moore <hdm [at] metasploit.com> Metasploit project Core developer and project lead BreakingPoint Systems Director of Security Research FOSDEM 2007 why listen ? A great tool you can use today


slide-1
SLIDE 1

FOSDEM 2007

METASPLOIT

slide-2
SLIDE 2

FOSDEM 2007

who am i ?

H D Moore <hdm [at] metasploit.com>

Metasploit project

Core developer and project lead BreakingPoint Systems Director of Security Research

slide-3
SLIDE 3

FOSDEM 2007

why listen ?

  • A great tool you can use today
  • The BSD-licensed Rex library
  • Latest in exploit technology
slide-4
SLIDE 4

FOSDEM 2007

metasploit framework

  • An exploit development platform
  • Security researchers
  • Penetration testers
  • Security vendors
  • Script kiddies
slide-5
SLIDE 5

FOSDEM 2007

metasploit history

  • Version 1.0 (2003-2004)
  • Perl, 15 exploits, curses UI
  • Version 2.7 (2003-2006)
  • Perl, 150+ exploits, 3 Uis
  • Version 3.0 (2007+)
slide-6
SLIDE 6

FOSDEM 2007

metasploit 3.0

  • 100,000 lines of Ruby
  • 53,000 lines of C/C++
  • 8000 lines of ASM
  • 350 unique modules
  • 2 years to develop
slide-7
SLIDE 7

FOSDEM 2007

why ruby ?

  • Clean, easy, and fun
  • Awesome OO model
  • Green threading
  • Platform support
slide-8
SLIDE 8

FOSDEM 2007

architecture

Rex MSF Core MSF Base Payloads Exploits Encoders Nops Aux

MODULES LIBRARIES INTERFACES

Console CLI Web GUI

PLUGINS TOOLS

slide-9
SLIDE 9

FOSDEM 2007

the Rex library

  • Text manipulation
  • CPU instructions
  • Fancy sockets
  • File formats
  • Protocols
  • SMB, DCERPC, SUNRPC, HTTP
slide-10
SLIDE 10

FOSDEM 2007

metasploit modules

  • Simple Ruby classes
  • Dynamically loaded
  • Rich meta-information
  • Expose type-specific methods
slide-11
SLIDE 11

FOSDEM 2007

metasploit exploits

  • Modules inherit Msf::Exploit
  • Heavy use of Ruby mixins
  • TCP, UDP, SMB, HTTP
  • Active, Passive, Brute force
  • WiFi, Pcap, Bluetooth
slide-12
SLIDE 12

FOSDEM 2007

exploit example

connect print_status("Trying target #{target.name}...") buf = Rex::Text.rand_text_english(1816) seh = generate_seh_payload(target.ret) buf[1008, seh.length] = seh send_cmd( ['USER', buf] , false) handler disconnect

slide-13
SLIDE 13

FOSDEM 2007

metasploit payloads

  • Modules inherit Msf::Payload
  • Singles, Stagers, Stages
  • Remote command shells
  • In-memory DLL injection
  • “CMD” payload types
  • “PHP” payload types
slide-14
SLIDE 14

FOSDEM 2007

windows payloads

  • Standardized calling convention
  • Tiny paylods via ordinal resolution
  • DLL injection payloads
  • In-memory VNC server
  • PassiveX payload stager
  • The Meterpreter...
slide-15
SLIDE 15

FOSDEM 2007

the meterpreter

  • Dynamically extensible payload
  • Custom network protocol
  • The basic “stdapi” extension
  • ps, kill, ls, rm, mkdir, rmdir
  • upload, download, execute
  • migrate, interact, load, scripting
slide-16
SLIDE 16

FOSDEM 2007

metasploit auxiliaries

  • Modules inherit Msf::Auxiliary
  • Anything not an “exploit”
  • Discovery and fingerprinting
  • Network protocol “fuzzers”
  • Denial of service methods
  • Administrative access exploits
slide-17
SLIDE 17

FOSDEM 2007

user interfaces

  • msfconsole
  • msfcli
  • msfweb
  • msfgui
slide-18
SLIDE 18

FOSDEM 2007

events

  • Registered subscriber model
  • Trigger on common actions
  • Exploit launched
  • Session creation
  • Job creation
  • User command
slide-19
SLIDE 19

FOSDEM 2007

plugins

  • Hook events, extend objects
  • Examples
  • Socket filtering and logging
  • Database support
  • Exploit automation
  • Telnet console
slide-20
SLIDE 20

FOSDEM 2007

summary

  • An advanced exploit toolkit
  • Simple to use and extend
  • 3.0 stable release is SOON

http://framework.metasploit.com/

slide-21
SLIDE 21

FOSDEM 2007

Demos !