Network Exploitation

Students will use Metasploit to exploit the eternal blue exploit. The exploit is used against system running certain versions of Windows with file and print sharing enabled. One of the serious ramifications of the exploit is system access on the compromised machine. Patching and updating systems can prevent this type of compromise demonstrated in this lab.

Overview

Network exploitation is the process of using exploits to attack vulnerabilities in remote systems. In this lab, you will attack remote system with vulnerabilities. You will be able to gain system access to these computers’ operating system (running Microsoft Windows) and run various commands, wreaking havoc on the victim machines. The best way to prevent network exploitation is to regularly patch and update the systems and to ensure you have anti-virus software installed and all the anti-virus definitions are up-to-date.

OUTCOMES


In this lab, you will learn to:

  1. Scan a network for vulnerabilities
  2. Compromise a system
  3. Perform post-installation tasks

Key terms and descriptions

Kali Linux
An Advanced Penetration Testing Linux distribution designed for digital forensics and penetration testing, ethical hacking, and network security assessments.
zenmap
A GUI front end for nmap; will allow you to scan for open ports and services.
Metasploit
A framework that contains exploits for various information systems.
nmap
A port scanner which will indicate whether ports are open or closed on a remote system.
ARP Scan
An ARP scan will determine which hosts are responding on the network you scan.