TAILIEUCHUNG - Lecture Penetration testing: Attack

Lecture "Penetration testing: Attack" provide students with knowledge about: Exploitation; Password attack; Client-side exploitation; Social engineering; . Please refer to the detailed content of the lecture! | ATTACK Contents Exploitation Password attack Client-side exploitation Social engineering 1. Exploitation In the exploitation phase of the pentest we run exploits against the vulnerabilities we have discovered to gain access to target systems. Metasploit Payloads payloads payloads allow us to tell an exploited system to do things on our behalf Two popular types of shells Bind shells the target machine opens up a communication port or a listener on the victim machine and waits for an incoming connection Metasploit Payloads Reverse shells A reverse shell is a type of shell in which the target machine communicates back to the attacking machine. The attacking machine has a listener port on which it receives the connection Types of payload Staged Payload setup a network connection between the attacker and victim and are designed to be small and reliable. Staged payloads allow us to use complex payloads without requiring a lot of space in memory Eg windows shell reverse_tcp Types of payload Inline Payloads single A single payload containing the exploit and full shell code for the selected task. Eg windows shell_reverse_tcp Types of payload Meterpreter It is loaded directly into the memory of an exploited process using a technique known as reflective dll injection. It runs inside the memory of the host process. Meterpreter also uses Transport Layer Security TLS encryption for communication between it and Metasploit 2. Password attack Online Password attacks we can use scripts to automatically attempt to log in to services and find valid credentials. We ll use tools designed for automating online password attacks or guessing passwords until the server responds with a successful login. These tools use a technique called brute forcing Password attack Wordlists Before you can use a tool to guess passwords you need a list of credentials to try. If you don t know the name of the user account you want to crack or you just want to crack as many accounts as possible you can .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.