Categories
Apps & Packages

Exploitation Tools (part 2)

In this article we continue to look at some tools available for the exploitation of vulnerabilities whilst performing Pentesting or Ethical Hacking.

In this second article we continue to look at Exploitation tools that are available for Pentesting and Ethical Hacking. We examine the last 5 of the choices in our Best Exploitation Tool poll to help understand what they do, their main features, some examples, and where to find out more about them.

Metasploit

…Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness; it empowers and arms defenders to always stay one step (or two) ahead of the game.

metasploit.com

MSF (Metasploit Framework) is available free for developers and security researchers whilst the Pro version is for penetration testers and IT security teams.

Both versions have access to 1500+ exploits whilst the Pro version has a web interface and automation capabilities. The free version uses a CLI (Command Line Interface) and has manual exploitation.

Example of ‘msfconsole’ (Metasploit Framework CLI) startup, loading an FTP exploit and setting the options.
Example of loading a SAMBA networking exploit, setting options and listing possible payloads.
Continuation of previous screen showing the remaining payloads and additional options for the loaded exploit.

For further details on Metasploit checkout the following resources:

Netsparker

Netsparker is a web vulnerability management solution that focuses on scalability, automation, and integration. Based on a leading-edge web vulnerability scanner, the Netsparker platform uses proprietary Proof-Based Scanning™ technology to identify and confirm vulnerabilities, confidently indicating results that are definitely not false positives. Netsparker is highly effective both integrated within the SDLC and as a stand-alone solution.

netsparker.com

There are 3 versions of this commercial product:

  • Netsparker Standard: Powerful yet user-friendly – the best web application security scanner for small and medium businesses.
  • Netsparker Team: The most accurate cloud-based scanner for medium to large organizations.
  • Netsparker Enterprise: The only web application scanner that scales to meet the needs of the largest organizations in the world.
Example of Global Dashboard in Netsparker Enterprise edition.
Example of Scan Activity pane.
Example of Viewing Issues in Netsparker Standard edition.

For further details on Netsparker checkout the following resources:

sqlmap

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

sqlmap.org

Features:

  • Full support for IBM DB2, MS Access, MS SQL Server, MySQL, Oracle, PostgreSQL, SAP MaxDB, SQLite, Sybase plus others.
  • 6 SQL injection techniques: boolean-blind, time-based blind, error-based, UNION query-based, stacked queries, and out-of-band.
  • Support to directly connect to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name.
  • Support to enumerate users, password hashes, privileges, roles, databases, tables and columns.
  • Automatic recognition of password hash formats and support for cracking them using a dictionary-based attack.

There are many other features as described here.

Example screen of ‘sqlmap’ courtesy of sqlmap.org

For further details on sqlmap checkout the following resources:

w3af

w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities.

w3af.org

Features:

  • Daemons – framework implements web & proxy servers.
  • Fast HTTP Client – offers proxy support, HTTP Basic & Digest authentication, UserAgent faking, custom request headers, cookie handling, HTTP response cache, DNS cache, and Multipart file upload.
  • Output Manager – output can be written to Console, files (Text, CSV, HTML & XML formats), and Email.
  • Fuzzing Engine – for injecting payloads into every part of the HTTP request.
  • Knowledge base – central location for storing and sharing vulnerabilities, information disclosures, and other valuable items between plugins.
  • Parsing – the framework tries to parse HTML to extract links & forms found during the crawl.
Example of Scan Config screen courtesy of w3af.org
Example of Log screen courtesy of w3af.org
Example of Exploit screen courtesy of w3af.org

For further details on w3af checkout the following resources:

WebGoat

Whilst this tool is not used to actually Penetration Test a target, it is a purposely vulnerable target to practice techniques and skills against.

WebGoat is a deliberately insecure application that allows interested developers just like you to test vulnerabilities commonly found in Java-based applications that use common and popular open source components.

WebGoat

WebGoat contains Lessons which currently include:

  • A1) Injection (into, advanced & mitigation)
  • A2) Broken Authentication
  • A3) Sensitive Data Exposure
  • A4) XML External Entities (XXE)
  • A5) Broken Access Control
  • A7) Cross-Site Scripting (XSS)
  • A8) Insecure Deserialization
  • A9) Vulnerable Components
  • A8:2013) Request Forgeries
Register screen for WebGoat.
Start of a Lesson within WebGoat.
Part of a Lesson within WebGoat.

For further details on WebGoat checkout the following resources:


If you have not yet voted in our poll then please check out the Best Exploitation Tool page.

If you have not read Part 1 of this article then please check it out.

If you have any questions or comments on the above please feel free to add them below.

Leave a Reply