504.4 Flashcards
Metasploit Framework
A flexible collection of tools to attack, exploit, and harvest data from targets
Exploit
Takes advantage of a flaw in a target program
Payload
Makes the target do something the attacker wants
Auxiliary Modules
Performs all kinds of tasks, including port scans, vulnerability scans, DOS tools and fuzzers to find flaws
Bind Shell to Arbitrary Port
This opens a command shell listener on any tcp port of the attackers choosing
Reverse Shell
This payload shovels a shell back to the attacker on a TCP port. The attacker will likely have
a Netcat listener waiting to receive the shell.
Windows VNC Server DLL Inject
This payload allows the attacker to remotely control the GUI of the victim machine, using the Virtual Network Computing (VNC) tool, sent as a payload. VNC runs inside the victim process so it doesn’t need to be installed on the victim machine. Instead, it is inserted as a DLL inside the vulnerable process.
Create local admin user
This payload creates a new user in the administrators group with a name and password specified by the attacker.
Drive By Attacks
AKA Client side attacks, target normal web browsing activity allowing an attacker to gain access to a client device
Watering Hole Attack
Same technique as Drive By Attacks except it involves a targeting element against a specific vertical industry or other organization such as the Gov, political party, etc
Code-Executing Microsoft Office Files
Execute code in a microsoft-office file. Requires macro support file type
MsfVenom
A tool that is included in the Metasploit Framework that takes any Metasploit payload and
converts it to a standalone file
System Resource Usage Monitor (SRUM)
Built-in windows service, maintains a 30 day historical record of system activity including programs executed, wifi networks joined, network use statistics by executable, system energy usage and more.
SRUM-Dumo
Utility that extracts the data from the SRUDB.dat file and HKLM\SOFTWARE registry key, writing the data to an accessible spreadsheet. Can operate on a live workstation or read from an offline archive.
Command Stacking
The use of command separators to run multiple commands in one line