Perimeter
9/9/2011
04:52 PM
John H. Sawyer
John H. Sawyer
Commentary
50%
50%

Metasploit Gets Covert Forensics And PXE Boot Attack Capabilities

New Metasploit modules released during the Vegas security conferences add cool, new features, like covert forensics and PXE boot pwnage

Black Hat USA and DefCon bring a wealth of knowledge, new tools, and updates to old favorites. One thing that is often disappointing is that tools are released and nothing ever happens to further development. I attended several Metasploit-related talks, but I think it was during HD Moore's talk at BSides Las Vegas where I heard it said that if it makes it into Metasploit, it has to be maintained. That's great news because there have been some awesome, independently developed Metasploit modules released in Vegas that have since been included within the Metasploit Framework.

There were three presentations that included the release of Metasploit modules that I was particularly interested in. I've written about one of them, vSploit, before, so I'll just point to the previous post here. The other two were "Covert Post-Exploitation Forensics With Metasploit" and "Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With PXEsploit."

The first was a presentation by Wesley McGrew (slides and code here) on leveraging Metasploit for covert forensic work once a system has been compromised and is running the Metasploit Meterpreter payload. Wes wrote three post-exploit modules designed to enumerate the drives on a remote Windows system, image a drive, and mount a hard drive over the network in a read-only state to run forensic tools against.

There are a slew of possibilities from both a penetration tester's and a forensic investigator's perspective. Need to determine covertly whether a file is or was on a hard drive? Deploy Meterpreter via the psexec module and go digging using standard forensic tools like the Sleuthkit, FTK, or EnCase. Similarly, start digging for deleted files that might contain passwords or sensitive data that is normally encrypted but decrypted on the filesystem when opened.

The other presentation that I was really excited to see was from Matt "scriptjunkie" Weeks on his PXEsploit modules (slides and demos heres). PXEsploit takes advantage of computer systems (i.e., desktops, servers, laptops) with PXE booting enabled. PXE is great for deploying operating systems over the network, but it's also great for owning unsuspecting organizations as Matt has shown with his new modules.

One of the things that I really like about Matt's work is that it is not limited to attacks where you have only local network access as one might expect. He has written one module to handle the attack if you're sitting in your target's network, and he has also written another that is a post-exploit module that runs through a compromised system running Meterpeter. Imagine owning one computer through a social engineering attack using a client-side exploit only to pivot through and own the rest of the network using PXEsploit.

All of the modules mentioned above are in the Metasploit Framework, so run "msfupdate" or "svn update" to make sure you have them. I definitely recommend testing them and seeing how they might fit into your testing. If you're a defender, then it's a good idea to look so you can better defend against them.

In case you've never used Metasploit or have limited experience with it, I highly recommend the No Starch Press book "Metasploit: The Penetration Tester's Guide." It's a great book to get people started, has examples to walk through, and includes more advanced topics for experienced users.

John Sawyer is a Senior Security Analyst with InGuardians. The views and opinions expressed in this blog are his own and do not represent the views and opinions of his employer. He can be reached at johnhsawyer@gmail.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-2086
Published: 2015-02-26
Cross-site scripting (XSS) vulnerability in the live preview in the Panopoly Magic module before 7.x-1.17 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via a pane title.

CVE-2015-2087
Published: 2015-02-26
Unrestricted file upload vulnerability in the Avatar Uploader module before 6.x-1.3 for Drupal allows remote authenticated users to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via unspecified vectors.

CVE-2015-2088
Published: 2015-02-26
Cross-site scripting (XSS) vulnerability in unspecified administration pages in the Term Queue module before 6.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via unknown vectors.

CVE-2015-2089
Published: 2015-02-26
Multiple cross-site request forgery (CSRF) vulnerabilities in the CrossSlide jQuery (crossslide-jquery-plugin-for-wordpress) plugin 2.0.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings or conduct cross-site scripting (...

CVE-2015-2090
Published: 2015-02-26
SQL injection vulnerability in the ajax_survey function in settings.php in the WordPress Survey and Poll plugin 1.1.7 for Wordpress allows remote attackers to execute arbitrary SQL commands via the survey_id parameter in an ajax_survey action to wp-admin/admin-ajax.php.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.