+ All Categories
Home > Documents > Metasploit – Embedded PDF Exploit

Metasploit – Embedded PDF Exploit

Date post: 13-Jan-2016
Category:
Upload: dash
View: 160 times
Download: 3 times
Share this document with a friend
Description:
Metasploit – Embedded PDF Exploit. Presented by: Jesse Lucas. Tools / Assumptions. Attacker – BackTrack 4.2. Victim – Windows XP. File and Printer Sharing Adobe Reader 8.0 – 9.0. Metasploit Framework 3.0 PDF file for embedding. Exploit Concept. Attacker embeds exploit in a PDF file - PowerPoint PPT Presentation
Popular Tags:
27
Metasploit – Embedded PDF Exploit Presented by: Jesse Lucas
Transcript
Page 1: Metasploit  –  Embedded PDF Exploit

Metasploit – Embedded PDF Exploit

Metasploit – Embedded PDF Exploit

Presented by: Jesse LucasPresented by: Jesse Lucas

Page 2: Metasploit  –  Embedded PDF Exploit

Tools / AssumptionsTools / Assumptions

Attacker – BackTrack 4.2

• Metasploit Framework 3.0• PDF file for embedding

Victim – Windows XP

• File and Printer Sharing• Adobe Reader 8.0 – 9.0

Page 3: Metasploit  –  Embedded PDF Exploit

Exploit ConceptExploit Concept

• Attacker embeds exploit in a PDF file

• Victim opens the PDF file– Unknowingly saves and runs exploit

• Attacker takes control of victim machine

Page 4: Metasploit  –  Embedded PDF Exploit
Page 5: Metasploit  –  Embedded PDF Exploit
Page 6: Metasploit  –  Embedded PDF Exploit
Page 7: Metasploit  –  Embedded PDF Exploit

Exploit DemosExploit Demos

• Live Demo

• Offline Demo

Page 8: Metasploit  –  Embedded PDF Exploit

Start BackTrakStart BackTrak

Page 9: Metasploit  –  Embedded PDF Exploit

Open 2 TerminalsOpen 2 Terminals

Page 10: Metasploit  –  Embedded PDF Exploit

Open msfconsole in both TerminalsOpen msfconsole in both Terminals

Page 11: Metasploit  –  Embedded PDF Exploit

Setup ExploitSetup Exploit

Page 12: Metasploit  –  Embedded PDF Exploit

Setup Exploit HandlerSetup Exploit Handler

Page 13: Metasploit  –  Embedded PDF Exploit

Wait for Victim to Open PDFWait for Victim to Open PDF

Page 14: Metasploit  –  Embedded PDF Exploit

Prey on their IgnorancePrey on their Ignorance

Page 15: Metasploit  –  Embedded PDF Exploit

Victim is now a VictimVictim is now a Victim

Page 16: Metasploit  –  Embedded PDF Exploit

Attacker now has AccessAttacker now has Access

Page 17: Metasploit  –  Embedded PDF Exploit

Example of ControlExample of Control

Page 18: Metasploit  –  Embedded PDF Exploit

Example of Control (cont)Example of Control (cont)

Page 19: Metasploit  –  Embedded PDF Exploit

Setup Exploit 2Setup Exploit 2

Page 20: Metasploit  –  Embedded PDF Exploit

Setup Handler 2Setup Handler 2

Page 21: Metasploit  –  Embedded PDF Exploit

Wait for Victim to OpenWait for Victim to Open

Page 22: Metasploit  –  Embedded PDF Exploit

Prey on Victim’s IgnorancePrey on Victim’s Ignorance

Page 23: Metasploit  –  Embedded PDF Exploit

Ta Da! Attacker has a VNC Session

Ta Da! Attacker has a VNC Session

Page 24: Metasploit  –  Embedded PDF Exploit

Example of ControlExample of Control

Page 25: Metasploit  –  Embedded PDF Exploit

Example of Control (cont)Example of Control (cont)

Page 26: Metasploit  –  Embedded PDF Exploit

Prevent the AttackPrevent the Attack

• DO NOT open files from people you don’t know

• DO NOT allow firewall exceptions for applications you don’t know

• KEEP popular programs up to date

• DISABLE File and Printer Sharing if you aren’t using it

Page 27: Metasploit  –  Embedded PDF Exploit

Questions?Questions?


Recommended