19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

222<br />

Part IV: Hacking Operating Systems<br />

Figure 11-18:<br />

Remote<br />

command<br />

prompt<br />

on target<br />

system<br />

obtained by<br />

exploiting<br />

a missing<br />

patch<br />

vulnerability.<br />

If you choose to add a user account during this phase, be sure to remove<br />

it when you finish. Otherwise, you can create another vulnerability on the<br />

system — especially if the account has a weak password. Chapter 3 covers<br />

related issues, such as the need for a contract when performing your testing.<br />

You want to make sure you’ve covered yourself.<br />

All in all, this is ethical hacking at its finest!<br />

Three unique versions of Metasploit are available from Rapid7. The free edition<br />

outlined in the preceding steps is called Metasploit Community. It may<br />

be all you need if an occasional screenshot of remote access or similar is sufficient<br />

for your testing purposes. There’s also Metasploit Express which adds<br />

features such as password auditing and evidence collection. Finally, there’s a<br />

full-blown commercial version called Metasploit Pro for the serious security<br />

professional. Metasploit Pro adds features for social engineering, web application<br />

scanning, and detailed reporting.<br />

Metasploit Pro’s Overview screen is shown in Figure 11-19. Note the workflow<br />

features in the tabs across the top including Analysis, Sessions, Campaigns,<br />

Web Apps, and Reports. It’s a well-thought-out interface that takes the pain<br />

out of traditional security scanning, exploitation, and reporting, which is<br />

especially useful for the less technical IT professional.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!