Web Server Attack Tools are now familiar with the methodology that an attacker uses to hack an internet server. This section will introduce web server hacking took that an attacker may use within the web server hacking methodology described in the previous section. These tools extract critical information during the hacking process.
Web Server Attack Tool: Metasploit
The Metasploit Framework may be a penetration-testing toolkit, exploit development platform, and research tool that has hundreds of working remote exploits for a spread of platforms. It supports fully automated exploitation of web servers by abusing known vulnerabilities and leveraging weak passwords via Telnet, H, HTTP, and SNM.
The features of Metasploit that an attacker may use to perform web server attack
Metasploit Architecture
The Metasploit framework is an open-source exploitation framework that gives security researchers and pen testers a consistent model for the rapid development of exploits, payloads, encoders, NOP generators, and reconnaissance tools. The framework reuses large chunks of code that a user would need to otherwise copy or re-implement on a per-exploit basis. The framework is modular in architecture and encourages the reuse of code across various projects. The framework itself is broken down into a couple of different pieces, the most low-level being the framework core. The framework core is liable for implementing all of the specified interfaces that allow interaction with exploit modules, sessions, and plugins. It supports vulnerability research, exploits development, and therefore the creation of custom security tools.
Metasploit modules
1. Metasploit Exploit Module
It is the basic module in Metasploit used to encapsulate an exploit using which users target many platforms with a single exploit. This module comes with simplified meta-information fields. Using a Mixins feature users can also dynamically modify exploit behavior, brute force attacks, and attempt passive exploits.
Steps to exploit a system follow the Metasploit Framework :
– Configuring active exploit
– Verifying the exploit options
– Selecting a target
– Selecting the payload
– Launching the exploit
2. Metasplolt Payload Module
An exploit carries the payload in its backpack when it breaks into the system and then leaves the backpack there.
There are three types of payload modules provided by the Metasploit:
- Singles: It is self-contained and completely standalone
- Stagers: It sets up a network connection between the attacker and the victim
- Stages: It is downloaded by stagers modules
Metasploit Payload Module can upload and download files from the system, take screenshots, and collect password hashes. It can even take over the screen, mouse, and keyboard to regulate a foreign computer. The payload module establishes a communication channel between the Metasploit framework and therefore the victim host. It combines the arbitrary code that’s executed because the results of an exploit succeed. to generate payloads first select a payload using the command as shown within the screenshot below.
3. Metasploit Auxiliary Module
The Auxiliary Module of Metasploit is often wont to perform arbitrary, one-off actions like port scanning, DoS, and even fuzzing. It includes tools and modules that assess the security of the target, auxiliary modules like scanners, DOS Modules, fuzzes, and so on. To list all the available auxiliary modules in Metasploit, use shows the auxiliary command in Metasploit. All the other modules in Metasploit are auxiliary modules except modules used to exploit. The tool uses the auxiliary modules as an extension for a spread of purposes aside from exploitation. Auxiliary modules reside within the modules/auxiliary/ directory of the framework’s main directory. To run the auxiliary module, either use the run command or use the exploit command.
The basic definition of an auxiliary module is:
Metasploit NOPS Module
NOP modules generate no-operation instructions used for blocking out buffers. Use generate command to generate a NOP sled of arbitrary size and display it in a given format.
OPTIONS:
-b <opt>: The list of characters to avoid: 1\x00\xff’
-h: Help banner
-s <opt>: The comma-separated list of registers to save
-t <opt>: The output type: ruby, Perl, c, or raw
MSF nop(opty2)>
No comments:
Post a Comment