Section 0. Background Information |
- Metasploitable
- Metasploitable is an intentionally vulnerable Linux virtual machine.
- This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques.
- http://www.offensive-security.com/metasploit-unleashed/Metasploitable
- Pre-Requisite Lab
- Metasploitable : Lesson 1: Downloading and Configuring
- NESSUS: Lesson 3: Scan with Nessus on BackTrack 5
- What is Nessus?
- Tenable Network Security provides enterprise-class solutions for continuous monitoring and visibility of vulnerabilities, configurations, user activity and system events that impact security and compliance.
- Nessus features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture
- Lab Notes
- In this lab we will do the following:
- Run Internal Nessus Scan against the Metasploitable VM
- Review Nessus Report
- Download Nessus Report
- In this lab we will do the following:
- Legal Disclaimer - Bài lab chỉ dùng cho mục đích học tập
Section 1. Start Up the Metasploitable VM |
- Start Up VMWare Player
- Instructions:
- Click the Start Button
- Type Vmplayer in the search box
- Click on Vmplayer
- Instructions:
- Open a Virtual Machine
- Instructions:
- Click on Open a Virtual Machine
- Instructions:
- Open the Metasploitable VM
- Instructions:
- Navigate to where the Metasploitable VM is located
- Click on on the Metasploitable VM
- Click on the Open Button
- Instructions:
- Edit the Metasploitable VM
- Instructions:
- Select Metasploitable2-Linux VM
- Click Edit virtual machine settings
- Instructions:
- Edit the Metasploitable VM
- Instructions:
- Click on "Network Adapter NAT"
- Select the radio button "Bridged: Connected directly to the physical network"
- Click on the OK button
- Warning:
- By changing from NAT to Bridged opens the VM and network up to potential attacks.
- To maintain a safe network, you could (1) skip this section and only use the host-only network, (2) unplug your router from the internet, (3) use an ACL to not allow traffic into your network, etc.
- Instructions:
- Play the Metasploitable VM
- Instructions:
- Click on the Metasploitable VM
- Click on Play virtual machine
- Instructions:
Section 2. Determine Metasploitable IP Address |
- Logging into Metasploitable
- Instructions
- Username: msfadmin
- Password: msfadmin or whatever you changed it to in lesson 1.
- Instructions
- Change the msfadmin password
- Instructions:
- ifconfig -a
- Note(FYI):
- This is the IP Address of the Victim Machine.
- My IP Address is 192.168.1.106.
- Record your IP Address.
- Instructions:
Section 4. Start Up the BackTrack5R1 VM |
- Start Up VMWare Player
- Instructions:
- Click the Start Button
- Type Vmplayer in the search box
- Click on Vmplayer
- Instructions:
- Open a Virtual Machine
- Instructions:
- Click on Open a Virtual Machine
- Instructions:
- Open the BackTrack5R1 VM
- Instructions:
- Navigate to where the BackTrack5R1 VM is located
- Click on on the BackTrack5R1 VM
- Click on the Open Button
- Instructions:
- Edit the BackTrack5R1 VM
- Instructions:
- Select BackTrack5R1 VM
- Click Edit virtual machine settings
- Instructions:
- Edit Virtual Machine Settings
- Instructions:
- Click on Network Adapter
- Click on the Bridged Radio button
- Click on the OK Button
- Instructions:
- Play the BackTrack5R1 VM
- Instructions:
- Click on the BackTrack5R1 VM
- Click on Play virtual machine
- Instructions:
- Login to BackTrack
- Instructions:
- Login: root
- Password: toor or <whatever you changed it to>.
- Instructions:
- Bring up the GNOME
- Instructions:
- Type startx
- Instructions:
- Start up a terminal window
- Instructions:
- Click on the Terminal Window
- Instructions:
- Obtain the IP Address
- Instructions:
- ifconfig -a
- Note(FYI):
- My IP address 192.168.1.111
- In your case, it will probably be different.
- This is the machine that will be use to attack the victim machine (Metasploitable).
- Instructions:
Section 5. Start Up NESSUS |
- Start Nessus Service
- Instructions:
- /etc/init.d/nessusd start
- ps -eaf | grep nessus | grep -v grep
- ps -eaf: Show me all processes
- | grep nessus: Only show me nessus processes.
- | grep -v grep: Do not show my actual grep process.
- Instructions:
Section 5. Login To NESSUS |
- Start Firefox
- Instructions:
- Start Firefox
- Instructions:
- Login to Nessus
- Instructions:
- Place the following URL in the Firefox Browser.
- Username: <Supply Your Username>
- Password: <Supply Your Password>
- Click Log In
- Instructions:
- Nessus HomeFeed Message
- Instructions:
- Click the OK Button
- Instructions:
Section 6. Scan Metasploitable (Victim) with NESSUS |
- Create Scan
- Instructions:
- Click on Scans
- Click on Add
- Instructions:
- Configure Scan
- Instructions:
- Name: Metasploitable - Internal
- Type: Run Now
- Policy: Internal Network Scan
- Scan Targets: 192.168.1.106
- Click the Launch Button
- Note(FYI):
- Replace 192.168.1.106 with the Metasploitable IP Address obtained from (Section 2, Step 2).
- Instructions:
- View Scan
- Instructions:
- Click on the Status Cell
- Instructions:
- View High Severity Alerts
- Instructions:
- Click on the red number under the High Column
- Note(FYI):
- Wait until the progress bar reaches 100% before clicking on the high alert.
- Instructions:
- View CIFS Alerts
- Instructions:
- For the CIFS row, click on the number under the high alert column
- Instructions:
- View Samba Alert
- Instructions:
- Click on the Samba Alert
- Instructions:
- View Samba Report
- Note(FYI):
- Read through the alert report.
- Notice at the very bottom of the report, NESSUS is kind enough to tell you which exploit tool to use.
- Note(FYI):
Section 7. Download Nessus Report |
- Download Report
- Instructions: (See Picture)
- Click on the Metaploitable - Internal Tab
- Click on Download Report Button
- Instructions: (See Picture)
- Select Download Report Type
- Instructions: (See Picture)
- Download Format: Detailed HTML Report (by finding)
- Click on Submit Button
- Instructions: (See Picture)
Section 8. Proof of Lab |
- Proof of Lab
- Instructions:
- cd /opt/nessus/var/nessus/users/admin/files
- grep -i samba *results
- date
- echo "Your Name"
- Put in your actual name in place of "Your Name"
- e.g., echo "John Gray"
- Proof of Lab Instructions
- Press the <Ctrl> and <Alt> key at the same time.
- Press the <PrtScn> key.
- Paste into a word document
- Upload to website Www.AnToanThongTin.Edu.VN
- Instructions:
Không có nhận xét nào:
Đăng nhận xét