csn10107 lab03.pdf - Lab 3: Introduction to Metasploit Aim:...

Doc Preview
Pages 14
Identified Q&As 7
Solutions available
Total views 56
Lab 3: Introduction to Metasploit | Bill , NaghmehLab 3: Introduction to Metasploit Aim: The airm of this lab is to develop and execute exploits against a remote machine and test its vulnerabilities using Metasploit. Quick tool introduction: Metasploit framework is an open source penetration tool used for developing and executing exploit code against a remote target machine. The framework has the world’s largest database of public and tested exploits. In simple words, Metasploit can be used to test the vulnerability of computer systems in order to protect them and on the other hand it can also be used to break into remote systems. It’s a powerful tool used for penetration testing. A demo of this lab is here:Network Allocation: A Activities: Complete Lab 3:vulnerability analysis and penetration testing using Metasploit. Learning activities: At the end of this lab, you should understand: How to develop, install and execute an exploit to make a target machine communicate back to the attacking machine using reverse shell. How to develop an exploit which installs a VNC server connection on a target machine which can then be connected to. How to develop, install and execute an exploit using Meterpreter. References : Agarwal, M., & Singh, A. (2013). Metasploit penetration testing cookbook. Packt Publishing Ltd. Bacudio, A. G., Yuan, X., Chu, B. T. B., & Jones, M. (2011). An overview of penetrationtesting. InternationalJournalofNetworkSecurity&Its Applications, 3(6), 19.
Lab 3: Introduction to Metasploit | Bill , NaghmehLab Overview Our challenge is to setupa perimeter networkwith aKali VMand aWindows 2003 VMon theDMZ(Figure 1) andUbuntuonPrivate. For this you will be allocated your own network (group_01, group_02, and so on) based on your student matriculation number. You can access VMs on (vsoc.napier.ac.uk >>vSphere Web Client (Flash)) using your login credentials. Table 1 outlines your challenges and how you might achieve them. Looking at Figure 1 you need to configure yourUbuntu private. Also, yourKali DMZand yourWindows DMZ should be sitting in the same domain, having an IP address and being able to ping each other. You need to configure pfSense firewall for this using your browser onUbuntu private. Figure 1:Lab architecture Table 1:Your challenges summary checklist ChallengeDescriptionHow will I do this?Completed? 1You should be able to develop, installand execute an exploit to make a target machine (Windows2003-DMZ) communicate back to the attacking machine (Kali-DMZ) using reverse shell Install reverse shell
Lab 3: Introduction to Metasploit | Bill , Naghmeh2You should be able to develop, installand execute an exploit which remotely controls the target machine (from Kali- DMZ to Windows-DMZ) Install VNC 3You should be able to develop, installand execute in-memory DLL injection stager extended over the network at runtime (from Kali-DMZ to Windows- DMZ) Install Meterpreter Setting up the network
Course Hero Badge

Want to read all 14 pages?

Previewing 4 of 14 pages Upload your study docs or become a member.
Course Hero Badge

Want to read all 14 pages?

Previewing 4 of 14 pages Upload your study docs or become a member.
Course Hero Badge

End of preview

Want to read all 14 pages? Upload your study docs or become a member.