SlideShare ist ein Scribd-Unternehmen logo
1 von 67
Downloaden Sie, um offline zu lesen
New Shiny in the
Metasploit Framework
Derbycon 2015 Edition
1
James Lee
@egyp7
Metasploit Developer
Community Manager
# whoami
2
First some numbers
3
Rapid7 has 71 Public
Repositories
4
Repos You Probably Care About
metasploit-framework
metasploit-payloads
metasploit-omnibus
5
Repos You Might Find Interesting
6
github-connector
ssh-badkeys
7
Over 1200
Pull Requests landed
8
Over 7500
commits
git log --since '2014-09-26' --oneline | wc -l
9
git log --since '2014-09-26' --format='%aE' | sort -u
Almost 200
unique authors
10
11
358
new modules
12
Modules
13
20 Local Priv Escalation
14
Local exploit suggester
15
16
exploit/unix/webapp/wp_admin_shell_upload
Anti-Virus Products
17
18
auxiliary/gather/mcafee_epo_xxe
19
exploit/linux/http/symantec_web_gateway_restore
20
exploit/windows/browser/malwarebytes_update_exec
21
js-beautifier
exploit/multi/fileformat/js_unpacker_eval_injection
Browser Exploitation
22
21 browser exploits
23
24
25
26
27
SOHO Routers
28
29
Credentials
30
Service
31
Cred
Cred
Cred
Old and Busted
Core
Private
Public
Realm
Blank Username
SNMP Community
NTLM Hash
SMB Domain
Postgres DB
Username
Password
SSH Key
Non-replayable Hash
32
Core
Service
33
Login
Login
Login Service
Java Serialization
34
Java Serialization with RMI, JMX
35
auxiliary/gather/java_rmi_registry
exploits/multi/misc/java_jmx_server
exploits/multi/misc/java_rmi_server
SMB
36
Kerberos
Partial implementation
● Enough to exploit MS14-068
37
SMB Server
38
Partial implementation
● Serve a single file
● Enough to exploit most DLL hijacks
Payload Improvements
39
Interactive Powershell
Can upgrade to meterpreter
Mostly compatible with existing Post API
Powershell Session Type
40
Unicode support
Meterpreter handles unicode in filesystems
● Still have to have support in your terminal
41
UUID Tracking
Embed Universally Unique ID in payloads
● Makes a payload identifiable
● Track which EXE got this session
Generate unique machine ID for each session
● Makes a machine identifiable
● Track whether we’ve popped this box before
42
Paranoid Mode
Set a real TLS cert for payload handlers
● Verify it from Meterpreter side
● Bail if we’re being MitM’d
Whitelist UUIDs in the handler
● Don’t start sessions for
things that aren’t a payload
43
Meterpreter Transport Reliability
44
Runtime Transport Control
reverse_tcp vs reverse_http vs reverse_https
Bind
● tcp://:8000/
IPv6
● tcp6://fe80::82e6:50ff:fe08:2e50:8000?en0
HTTP(S)
● https://1.2.3.4/<generated URI>
45
Configurable timeouts
● Session
● Communication
● Retry total
● Retry wait
46
Stageless Meterpreter
Skip staging and put
everything in one
payload
47
48
NTDS.dit
Domain controllers store accounts
Multi-GB file for large orgs
Downloading giant files sucks
49
NTDS.dit Solution
50
windows/gather/credentials/domain_hashdump
Uses a C extension to parse on target
Send back a few at a time
Infrastructure
51
Ruby 2.1.6
52
53
54
Omnibus
Random
55
56
Removed Replacement
msfpayload
msfvenom
msfencode
msfcli msfconsole
Workspace in Your Prompt
57
Tab-completing LHOST
58
Questions?
59
Images Returned in
Google results for this
Presentation
60
62
63
64
65
66
67

Weitere ähnliche Inhalte

Andere mochten auch

План и стратегия медиапроекта
План и стратегия медиапроектаПлан и стратегия медиапроекта
План и стратегия медиапроектаСофья Митрошина
 
разрешение на осуществление
разрешение на осуществлениеразрешение на осуществление
разрешение на осуществлениеЕлена Исакова
 
Апелляционное определение суда по обжалованию запрета страницы РосКомСвободы ...
Апелляционное определение суда по обжалованию запрета страницы РосКомСвободы ...Апелляционное определение суда по обжалованию запрета страницы РосКомСвободы ...
Апелляционное определение суда по обжалованию запрета страницы РосКомСвободы ...Artem Kozlyuk
 
Apa itu sistem penapis air 7 star dari K-Link
Apa itu sistem penapis air 7 star dari K-LinkApa itu sistem penapis air 7 star dari K-Link
Apa itu sistem penapis air 7 star dari K-LinkKhairul kaz
 
ITU - Measuring the Information Society Report - 2015
ITU - Measuring the Information Society Report - 2015ITU - Measuring the Information Society Report - 2015
ITU - Measuring the Information Society Report - 2015Artem Kozlyuk
 
Desarrollo profesional docente para un currículum por competencias
Desarrollo profesional docente para un currículum por competenciasDesarrollo profesional docente para un currículum por competencias
Desarrollo profesional docente para un currículum por competenciasVladimir Estrada
 
промежуточная аттестация 3 кл.декабрь
промежуточная аттестация 3 кл.декабрьпромежуточная аттестация 3 кл.декабрь
промежуточная аттестация 3 кл.декабрьЕлена Исакова
 
Visitas a los Museos como unidad didáctica
Visitas a los Museos como unidad didácticaVisitas a los Museos como unidad didáctica
Visitas a los Museos como unidad didácticaEl Arcón de Clio
 

Andere mochten auch (12)

План и стратегия медиапроекта
План и стратегия медиапроектаПлан и стратегия медиапроекта
План и стратегия медиапроекта
 
разрешение на осуществление
разрешение на осуществлениеразрешение на осуществление
разрешение на осуществление
 
Апелляционное определение суда по обжалованию запрета страницы РосКомСвободы ...
Апелляционное определение суда по обжалованию запрета страницы РосКомСвободы ...Апелляционное определение суда по обжалованию запрета страницы РосКомСвободы ...
Апелляционное определение суда по обжалованию запрета страницы РосКомСвободы ...
 
Apa itu sistem penapis air 7 star dari K-Link
Apa itu sistem penapis air 7 star dari K-LinkApa itu sistem penapis air 7 star dari K-Link
Apa itu sistem penapis air 7 star dari K-Link
 
ITU - Measuring the Information Society Report - 2015
ITU - Measuring the Information Society Report - 2015ITU - Measuring the Information Society Report - 2015
ITU - Measuring the Information Society Report - 2015
 
Desarrollo profesional docente para un currículum por competencias
Desarrollo profesional docente para un currículum por competenciasDesarrollo profesional docente para un currículum por competencias
Desarrollo profesional docente para un currículum por competencias
 
Software
SoftwareSoftware
Software
 
бисероплетение зоря
бисероплетение зорябисероплетение зоря
бисероплетение зоря
 
промежуточная аттестация 3 кл.декабрь
промежуточная аттестация 3 кл.декабрьпромежуточная аттестация 3 кл.декабрь
промежуточная аттестация 3 кл.декабрь
 
Form 7 1
Form 7 1Form 7 1
Form 7 1
 
El Cordobazo
El CordobazoEl Cordobazo
El Cordobazo
 
Visitas a los Museos como unidad didáctica
Visitas a los Museos como unidad didácticaVisitas a los Museos como unidad didáctica
Visitas a los Museos como unidad didáctica
 

Ähnlich wie Shiny

The State of the Metasploit Framework.pdf
The State of the Metasploit Framework.pdfThe State of the Metasploit Framework.pdf
The State of the Metasploit Framework.pdfegypt
 
Gerrit linuxtag2011
Gerrit linuxtag2011Gerrit linuxtag2011
Gerrit linuxtag2011thkoch
 
Continuous Delivery di una WebApp - by example
Continuous Delivery di una WebApp - by exampleContinuous Delivery di una WebApp - by example
Continuous Delivery di una WebApp - by exampleFabio Mora
 
Continuous Delivery di una webapp by example - Fabio Mora - Codemotion Roma 2015
Continuous Delivery di una webapp by example - Fabio Mora - Codemotion Roma 2015Continuous Delivery di una webapp by example - Fabio Mora - Codemotion Roma 2015
Continuous Delivery di una webapp by example - Fabio Mora - Codemotion Roma 2015Codemotion
 
Becoming a Plumber: Building Deployment Pipelines - All Day DevOps
Becoming a Plumber: Building Deployment Pipelines - All Day DevOpsBecoming a Plumber: Building Deployment Pipelines - All Day DevOps
Becoming a Plumber: Building Deployment Pipelines - All Day DevOpsDaniel Barker
 
Gerrit Analytics applied to Android source code
Gerrit Analytics applied to Android source codeGerrit Analytics applied to Android source code
Gerrit Analytics applied to Android source codeLuca Milanesio
 
Is your code ready for PHP 7 ?
Is your code ready for PHP 7 ?Is your code ready for PHP 7 ?
Is your code ready for PHP 7 ?Wim Godden
 
How to Design a Program Repair Bot? Insights from the Repairnator Project
How to Design a Program Repair Bot? Insights from the Repairnator ProjectHow to Design a Program Repair Bot? Insights from the Repairnator Project
How to Design a Program Repair Bot? Insights from the Repairnator ProjectSimon Urli
 
Ruby and Rails Packaging to Production
Ruby and Rails Packaging to ProductionRuby and Rails Packaging to Production
Ruby and Rails Packaging to ProductionFabio Kung
 
RIPEstat Public demo 21 February 2012
RIPEstat Public demo 21 February 2012RIPEstat Public demo 21 February 2012
RIPEstat Public demo 21 February 2012RIPE NCC
 
Developing MIPS Exploits to Hack Routers
Developing MIPS Exploits to Hack RoutersDeveloping MIPS Exploits to Hack Routers
Developing MIPS Exploits to Hack RoutersBGA Cyber Security
 
CyberCentral Summit 2018 in Prague
CyberCentral Summit 2018 in PragueCyberCentral Summit 2018 in Prague
CyberCentral Summit 2018 in PragueAlexander Leonov
 
Dipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application DevelopmentDipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application DevelopmentMatthew Farina
 
Becoming a Plumber: Building Deployment Pipelines - RevConf
Becoming a Plumber: Building Deployment Pipelines - RevConfBecoming a Plumber: Building Deployment Pipelines - RevConf
Becoming a Plumber: Building Deployment Pipelines - RevConfDaniel Barker
 
Workshop MSF4J - Getting Started with Microservices and Java
Workshop MSF4J - Getting Started with Microservices and JavaWorkshop MSF4J - Getting Started with Microservices and Java
Workshop MSF4J - Getting Started with Microservices and JavaEdgar Silva
 
Discover the Linux on z Systems Effect
Discover the Linux on z Systems EffectDiscover the Linux on z Systems Effect
Discover the Linux on z Systems EffectIBM
 
"Full Stack Web Developer" or "Delphi (and RDBMS) Developer"?
"Full Stack Web Developer" or "Delphi (and RDBMS) Developer"?"Full Stack Web Developer" or "Delphi (and RDBMS) Developer"?
"Full Stack Web Developer" or "Delphi (and RDBMS) Developer"?David Lipschitz
 
ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019Alexander Master
 

Ähnlich wie Shiny (20)

The State of the Metasploit Framework.pdf
The State of the Metasploit Framework.pdfThe State of the Metasploit Framework.pdf
The State of the Metasploit Framework.pdf
 
Gerrit linuxtag2011
Gerrit linuxtag2011Gerrit linuxtag2011
Gerrit linuxtag2011
 
Continuous Delivery di una WebApp - by example
Continuous Delivery di una WebApp - by exampleContinuous Delivery di una WebApp - by example
Continuous Delivery di una WebApp - by example
 
Continuous Delivery di una webapp by example - Fabio Mora - Codemotion Roma 2015
Continuous Delivery di una webapp by example - Fabio Mora - Codemotion Roma 2015Continuous Delivery di una webapp by example - Fabio Mora - Codemotion Roma 2015
Continuous Delivery di una webapp by example - Fabio Mora - Codemotion Roma 2015
 
Becoming a Plumber: Building Deployment Pipelines - All Day DevOps
Becoming a Plumber: Building Deployment Pipelines - All Day DevOpsBecoming a Plumber: Building Deployment Pipelines - All Day DevOps
Becoming a Plumber: Building Deployment Pipelines - All Day DevOps
 
Gerrit Analytics applied to Android source code
Gerrit Analytics applied to Android source codeGerrit Analytics applied to Android source code
Gerrit Analytics applied to Android source code
 
Is your code ready for PHP 7 ?
Is your code ready for PHP 7 ?Is your code ready for PHP 7 ?
Is your code ready for PHP 7 ?
 
How to Design a Program Repair Bot? Insights from the Repairnator Project
How to Design a Program Repair Bot? Insights from the Repairnator ProjectHow to Design a Program Repair Bot? Insights from the Repairnator Project
How to Design a Program Repair Bot? Insights from the Repairnator Project
 
Ruby and Rails Packaging to Production
Ruby and Rails Packaging to ProductionRuby and Rails Packaging to Production
Ruby and Rails Packaging to Production
 
RIPEstat Public demo 21 February 2012
RIPEstat Public demo 21 February 2012RIPEstat Public demo 21 February 2012
RIPEstat Public demo 21 February 2012
 
Developing MIPS Exploits to Hack Routers
Developing MIPS Exploits to Hack RoutersDeveloping MIPS Exploits to Hack Routers
Developing MIPS Exploits to Hack Routers
 
CyberCentral Summit 2018 in Prague
CyberCentral Summit 2018 in PragueCyberCentral Summit 2018 in Prague
CyberCentral Summit 2018 in Prague
 
Dipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application DevelopmentDipping Your Toes Into Cloud Native Application Development
Dipping Your Toes Into Cloud Native Application Development
 
Introduction to Docker
Introduction to DockerIntroduction to Docker
Introduction to Docker
 
Becoming a Plumber: Building Deployment Pipelines - RevConf
Becoming a Plumber: Building Deployment Pipelines - RevConfBecoming a Plumber: Building Deployment Pipelines - RevConf
Becoming a Plumber: Building Deployment Pipelines - RevConf
 
Workshop MSF4J - Getting Started with Microservices and Java
Workshop MSF4J - Getting Started with Microservices and JavaWorkshop MSF4J - Getting Started with Microservices and Java
Workshop MSF4J - Getting Started with Microservices and Java
 
Discover the Linux on z Systems Effect
Discover the Linux on z Systems EffectDiscover the Linux on z Systems Effect
Discover the Linux on z Systems Effect
 
"Full Stack Web Developer" or "Delphi (and RDBMS) Developer"?
"Full Stack Web Developer" or "Delphi (and RDBMS) Developer"?"Full Stack Web Developer" or "Delphi (and RDBMS) Developer"?
"Full Stack Web Developer" or "Delphi (and RDBMS) Developer"?
 
ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019
 
BPMS1
BPMS1BPMS1
BPMS1
 

Mehr von egypt

Privilege Escalation with Metasploit
Privilege Escalation with MetasploitPrivilege Escalation with Metasploit
Privilege Escalation with Metasploitegypt
 
New Shiny in the Metasploit Framework
New Shiny in the Metasploit FrameworkNew Shiny in the Metasploit Framework
New Shiny in the Metasploit Frameworkegypt
 
Open Source, Security, and Open Source Security.pdf
Open Source, Security, and Open Source Security.pdfOpen Source, Security, and Open Source Security.pdf
Open Source, Security, and Open Source Security.pdfegypt
 
Authenticated Code Execution by Design.pptx
Authenticated Code Execution by Design.pptxAuthenticated Code Execution by Design.pptx
Authenticated Code Execution by Design.pptxegypt
 
One-Liners to Rule Them All
One-Liners to Rule Them AllOne-Liners to Rule Them All
One-Liners to Rule Them Allegypt
 
Offensive Security with Metasploit
Offensive Security with MetasploitOffensive Security with Metasploit
Offensive Security with Metasploitegypt
 
already-0wned
already-0wnedalready-0wned
already-0wnedegypt
 
Post Metasploitation
Post MetasploitationPost Metasploitation
Post Metasploitationegypt
 
State of the Framework Address: Recent Developments in the Metasploit Framework
State of the Framework Address: Recent Developments in the Metasploit FrameworkState of the Framework Address: Recent Developments in the Metasploit Framework
State of the Framework Address: Recent Developments in the Metasploit Frameworkegypt
 
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit FrameworkUnmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Frameworkegypt
 
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...egypt
 

Mehr von egypt (11)

Privilege Escalation with Metasploit
Privilege Escalation with MetasploitPrivilege Escalation with Metasploit
Privilege Escalation with Metasploit
 
New Shiny in the Metasploit Framework
New Shiny in the Metasploit FrameworkNew Shiny in the Metasploit Framework
New Shiny in the Metasploit Framework
 
Open Source, Security, and Open Source Security.pdf
Open Source, Security, and Open Source Security.pdfOpen Source, Security, and Open Source Security.pdf
Open Source, Security, and Open Source Security.pdf
 
Authenticated Code Execution by Design.pptx
Authenticated Code Execution by Design.pptxAuthenticated Code Execution by Design.pptx
Authenticated Code Execution by Design.pptx
 
One-Liners to Rule Them All
One-Liners to Rule Them AllOne-Liners to Rule Them All
One-Liners to Rule Them All
 
Offensive Security with Metasploit
Offensive Security with MetasploitOffensive Security with Metasploit
Offensive Security with Metasploit
 
already-0wned
already-0wnedalready-0wned
already-0wned
 
Post Metasploitation
Post MetasploitationPost Metasploitation
Post Metasploitation
 
State of the Framework Address: Recent Developments in the Metasploit Framework
State of the Framework Address: Recent Developments in the Metasploit FrameworkState of the Framework Address: Recent Developments in the Metasploit Framework
State of the Framework Address: Recent Developments in the Metasploit Framework
 
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit FrameworkUnmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
Unmanned Aerial Vehicles: Exploit Automation with the Metasploit Framework
 
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...
Using Guided Missiles in Drive-bys: Automatic Browser Fingerprinting and Expl...
 

Shiny