Friday 31 May 2013

Saturday Metasploit-ing Update 1

Hi everyone!

So an hour and a half in. I have not made much progress. The reasons are varied, mostly lack of discipline to concentrate. However I  was installing Backtrack 5 R3, updating apt-get which took quite a while (at least it felt like it), and helped a friend with NPV for a Project management class I completed.

Now what I have learned so far is that I have S0o0o much to learn.

The different MSF's:

There are a few different ways to run Metasploit.

MSFconsole being the most common and as the tutorial says the most stable. So I spent a bit playing in the command line with it, seems easy enough to use, but obviously will need the detailed knowledge of all the payloads. The help command gives a list of commands that are helpful.
 
Actually here is an extract of the benefits I was going to copy and paste some bullet points, but for some reason it throws out my lines. So here is a link
MSFconsole

On a side note: I am not finding blogger that intuitive.

Msfconsole can be used in defanged mode. I am not very technical so it was google to the rescue. Unfortunately there was not much information (for the time I took) other than how to defang a snake. As you can see very relevant

Msfcli is a command line interface to the framework. I am yet to understand the difference between this and Msfconsole. If you do have a simple explanation please fill me in.

Exploits Active & Passive

The 2 differences were very simply for me to understand, having completed Webgoat and a Master in IT and all.

Active:
My understanding is that an active exploit is one you say end out, you initiate it, you do it all.

Passive:
To me is one that you setup and wait for a user to come by and activate it. Such as an email with a malicious link, whereby a user clicks this link and is taken to a website or something and then the exploit activates. So the exploit LISTENS for when to execute? Is that a basic enough explanation? Anyone care to expand.


Payloads: 

There are multiple payloads, and not being technical this for me was a stretch (such a noob!). Although once reading again and slowly it makes sense.

Single:
  Described on the Metasploitable documentation it is a payload that is completly standalone. I am not sure how others differ. An example it gave was adding a user to the target system or calc.exe

Stagers:

This is more complicated. These setup a connection between an attacker and a victim, these are hard to maintain. As a result these payloads have an order in which they execute, preferred to less preferred. My idea is the stage process is that when one fails it has a fallback.

Stages:
Stagers make sense once you understand a stage. These payload stages as stated by the Metasploit documentation provide advanced features with no size limits. This inclused VNC injection.

So in an attempt at a nutshell, a Single is a standalone, complete and whole. A stager carries stages that hold much more functionality. A stager holds multiple of these so it can fall back on them if needed.

But Payload stages also use middlestages, so perhaps this is a category of Stages.

It all gets so complicated so quickly!

Any questions or advice let me know!

I am trying not to just repeat the documentation!

Cheers
Haydn






 
 

Saturday Metasploit-ing

Hi All,

It is Saturday here, hope you are all enjoying your weekend, if it has started (I understand there may be different timelines for readers).

My Saturday plan for infosec is play with Metasploit using the vulnerable Virtual Machine(VM) Metasploitable. It can be found here. I am going to interact with it using Backtrack 5 R3 VM. I don't have to give a link to that, I am sure you can 'google' it :).

Metasploitable is currently downloading, it is 833mbs in size, so its not that big. Quite a good size to muck around with. I have had a shot with it before, more of a flick threw. I tend to flick through many topics and skip to the next one. This is not a great habit to get into, so I warn you, do not follow what I used to do.

This blog is an attempt to force myself to slow down and reflect on what I learn. So instead of saying yay I know what Metasploit does without understanding 'WHAT' it actually does, it will be a goal to post here what I learn.

The missus is studying, having exams in a few weeks its probably a good plan. So being a good partner I am not going to game (oh the tragedy!) and I am going to study instead! Wish me luck all

Comment your opinions on the blog, Metasploit etc, whatever drums around in your skill.

Update in 2 hours... If I can resist blogging again!

Regards,
Haydn

Wednesday 29 May 2013

Introduction 1st Blog - Read with sympathy

So my first blog. Hi you, the person reading, hope you are well. - A much more personal introduction than simply saying "hi everyone", did it work? If not leave a comment to let me know.

What to expect:
You should be expecting a blog around the inner workings of my mind, no Jedi tricks, just thoughts. Even though the force is much cooler, I do not have those skills, sorry folks! This blog is to keep track of my thoughts about information security and my training of Brazilian Jui Jitsu.

I am new to cyber security and wish to blog about what I learn, the troubles I go through and experiences I have. Hopefully my pain will encourage people to keep learning. If you have any tips throw them at me. No really, please do.

Brazillian Jui Jitsu (various spellings are around) is a sport I fell in love with when I gave it a shot around 8 months ago, October 2012. I am hoping to write about my experiences to help maintain what I learn. Being at a new full time job it is hard to attend as many classes as I'd like. Which is everyday all day! Ossss



About me:

I am Haydn, a cyber security enthusiast who has just gained a Risk graduate position. Great company, great reputation, so great for me. I am feeling very lucky. Risk is mainly focused on auditing, and I am focused on cyber security, so its a bit of a love hate relationship. We will see how it plans out!

As of 2013 I am currently 25. A late starter for beginning any new career, depending on how you look at things. We always wish we could go back. I have an undergraduate in Interactive media, similar to Multimedia just more focus on how the user uses things. A master of I.T is my most noteworthy degree, majored in Security, hence the love of security.

I currently live (hopefully this doesn't change in the future) with an amazing women, she is currently studying her final year in Bio-medical science and aiming to become a Doctor, Vet or something else with a high status. This girl also happens to be my partner, lucky me, I have her wage to fall back on! (just a joke honey!).

We have 2 beautiful dogs, by dogs I mean small horses, a 50kg Rottweiler and a 34kg German Shepherd X.  you think your small dogs in the bed are too big, wait until you have a Black horse decide to sleep in the middle of a bed, and a feral mut (because she is a Cross-Breed) sleep on the other side of you. Not the most comfortable, but would never want it any other way.


Rules for readers:

Feel free to read, it will always be free. Comment if you wish, they are welcome. Please do make comments relevant, I will reply when possible. If giving feedback which I encourage, please make it constructive, that way I can learn while not having my poor ego stripped away.

Hopefully it is not too long to read. But it is the intro and you can take your time reading it.

Thanks :)

Haydn