SlideShare a Scribd company logo
1 of 35
METSPLOTABLE
Mirjam Nilsson
AGENDA
Introduction
Architecture Of Metasplotable
Modules Of Metasploitable
Few Demos using Metsploitable
Hacking Metsploitable using Kali Linux
INTRODUCTION
In cybersecurity, an intrusion occurs when an unauthorized
entity manages to enter your network or host.
That entity can be a threat actor deliberately infiltrating a
system with harmful intentions. For example, it might be:
• A malicious hacker doing network reconnaissance or
a [DDoS attack].
• A non-malicious but unauthorized entity that entered
the system unintentionally.
An IDS helps prevent both undesirable cases.
INTRODUCTION
DEFINITION:
An IDS is an indispensable part of network security. It is
introduced as a system for detecting intrusions that
attempt to compromise the main security goals,
confidentiality, integrity, and availability of a resource.
HOW DOES AN IDS WORK?
• An IDS monitors the traffic on a computer network to detect
any suspicious activity.
• It analyzes the data flowing through the network to look for
patterns and signs of abnormal behavior.
• The IDS compares the network activity to a set of
predefined rules or to the normal baseline to identify any
activity that might indicate an attack or intrusion.
• If the IDS detects something that matches one of these
rules or deviates from the normal baseline, it sends an alert
to the system administrator.
• The system administrator can then investigate the alert and
take action to prevent any damage or further intrusion.
ARCHITECTURE
DIFFERENT TYPES OF IDS:
Network-Based IDS (NIDS)
Choose a point on your network and examine all traffic on all devices
from that point.
Host-Based IDS (HIDS)
Examine traffic to and from independent devices within your network,
and leave all other devices alone.
Protocol-based IDS (PIDS)
monitors protocol layer traffic that is used by protocol to
communicate with each other
Application Protocol-based IDS (APIDS)
monitors application layer traffic that is used by applications to
communicate with each other.
Hybrid IDS
Combine some of the approaches listed above into a system
made just for you.
BENEFITS OF IDS:
• Detect several threats and alert your security staff, who can take
appropriate action.
• Detects DDoS Attacks.
• Helps Meet Regulatory Compliance Requirements.
• Detects Network Reconnaissance.
• Provides insights.
• Improves network performance
MODULES
DETECTION METHOD:
Pattern or signature-based intrusion detection
looks for network traffic or file patterns and compares them with
similar threat-related patterns in their database. The IDS generates
an alert once it finds a match (potential threat).
Anomaly-based intrusion detection
employs ML technology monitors network traffic and compares it
against an established baseline to determine what is considered
normal for the network concerning bandwidth, protocols, ports
and other devices.
policy-based detection
the IDS compares traffic or files against pre-configured security
policies, much like a firewall. Once the IDS finds that certain traffic
violates the policy, it generates an alert.
FEATURES:
• Real-time Monitoring
• Traffic Analysis
• Alert Generation
• Anomaly Detection
• Signature-Based Detection
• Log Analysis
• Incident Correlation
• Custom Rule Creation
• User-Friendly Interface
• Integration with Other Security Tools
• Data Encryption Analysis
FEW DEMOS
Sensors / Agents
collect data from network or host sources and send it to the analyzer
for analysis.
Management Server
collects data from sensors and agents, correlates and analyzes it,
and centralizes the management of multiple IDS sensors.
Analyzers
process the data captured by sensors and apply various detection
techniques to identify potential threats or anomalies.
Database Server
stores the event data recorded by IDS sensors and agents, as well
as the IDS's configuration data and the results of the analyzer's
analysis.
User Interface / IDS Console
provides a graphical or command-line interface for administrators to
configure, manage, and view the results of IDS operations.
Alerting and Response Mechanisms
generate alerts or trigger response actions when IDS detects
suspicious or malicious activities.
HACKING
METASPLOITABL
E
NMAP AND METASPLOITABLE
FRAMEWORK
Nmap allows you to scan your network and discover not only everything
connected to it, but also a wide variety of information about what's
connected, what services each host is operating, and so on.
Now we should scan the target machine in Kali Linux using Nmap.
-sV : This is a service version scan.
-p- : Scans all ports.
VSFTPD OPEN PORT
I'll start with the first open port (port 21 vsftpd).
By this command we are searching f or the service of the f irst open port that we've f ound.
VSFTPD OPEN PORT
I found one excellent module to exploit this port. W hich is module “1”
So I will write “use 1” command.
we should only specify RHOST which is the IP of our target machine.
N ow we are ready to expl oit the Metasploi table .
VSFTPD OPEN PORT
And BAM!!!
You can now run any command you want or do malicious things to
the target machine.
INTRODUCTION
At Contoso, we empower organizations to foster collaborative thinking to further
drive workplace innovation. By closing the loop and leveraging agile frameworks,
we help business grow organically and foster a consumer-first mindset.​
DEFINITION:
B2B MARKET SCENARIOS
Develop winning strategies to keep ahead
of the competition
​Capitalize on low-hanging fruit to identify a
ballpark value
​Visualize customer directed convergence​
CLOUD-BASED
OPPORTUNITIES
Iterative approaches to corporate strategy
​Establish a management framework from
the inside​
INTRODUCTION
At Contoso, we empower organizations to foster collaborative
thinking to further drive workplace innovation. By closing the
loop and leveraging agile frameworks, we help business grow
organically and foster a consumer-first mindset.​
AREAS OF GROWTH
CATEGORY 1 CATEGORY 2 CATEGORY 3 CATEGORY 4​
Q1 4.5 2.3 1.7 5​.0
Q2 3.2 5.1 4.4 3​.0
Q3 2.1 1.7 2.5 2.8
Q4 4.5 2.2 1.7 7.0
BUSINESS OPPORTUNITIES ARE
LIKE BUSES. THERE'S ALWAYS
ANOTHER ONE COMING.​
Richard Branson
MEET OUR TEAM
TAKUMA
HAYASHI
Pres ide nt
MIRJAM
NILSSON
Chief Executive
Of f icer
FLORA BERGGREN
Chief Operatio ns Of f icer
RAJESH
SANTOSHI
VP Mark eting
MEET OUR TEAM
GR AH AM B AR N ES
V P P r o d u c t
R OWAN M URPHY
S E O S t r a t e g i s t
ELIZABETH
M OORE
P r o d u c t D e s i g n e r
R OB IN K LINE
C o n t e n t D e v e l o p e r
TAK UM A H AYASH I
P r e s i d e n t
M IRJAM
N ILSSON
C h i e f E x e c u t i v e
O f f i c e r
FLORA B ERGGREN
C h i e f O p e r a t i o n s
O f f i c e r
R AJESH
SAN TOSHI
V P M a r k e t i n g
PLAN FOR PRODUCT LAUNCH
PLANNING
Synergize scalable
e-commerce
MARKETING
Disseminate
standardized
metrics
DESIGN
Coordinate e-
business
applications
STRATEGY
Foster holistically
superior
methodologies
LAUNCH
Deploy strategic
networks with
compelling e-
business needs
Q1 Synergize scalable e-commerce
Q2 Coordinate e-business applications
Q3 Deploy strategic networks with compelling e-business needs
Q4 Disseminate standardized metrics
TIMELINE
AREAS OF FOCUS
B2B MARKET SCENARIOS
Develop winning strategies to keep ahead
of the competition
​Capitalize on low-hanging fruit to identify a
ballpark value
​Visualize customer directed convergence​
CLOUD-BASED
OPPORTUNITIES
Iterative approaches to corporate strategy
​Establish a management framework from
the inside​
AREAS OF FOCUS
B2B MARKET SCENARIOS
Develop winning strategies to keep ahead
of the competition
​Capitalize on low-hanging fruit to identify a
ballpark value
​Visualize customer directed convergence​
CLOUD-BASED
OPPORTUNITIES
Iterative approaches to corporate strategy
​Establish a management framework from
the inside​
AREAS OF FOCUS
B2B MARKET SCENARIOS
Develop winning strategies to keep ahead of the
competition
​Capitalize on low-hanging fruit to identify a ballpark value
​Visualize customer directed convergence​
CLOUD-BASED OPPORTUNITIES
Iterative approaches to corporate strategy
​Establish a management framework from the inside​
HOW WE GET THERE
ROI
Envision multimedia-based
expertise and cross-media
growth strategies​
​Engage worldwide
methodologies with web-
enabled technologies​
NICHE MARKETS
Pursue scalable customer
service through sustainable
strategies​
Engage top-line web services
with cutting-edge deliverables​​​
SUPPLY CHAINS
Cultivate one-to-one customer
service with robust ideas​
Maximize timely deliverables
for real-time schemas​
SUMMARY
At Contoso, we believe in giving 110%. By using our next-
generation data architecture, we help organizations virtually
manage agile workflows. We thrive because of our market
knowledge and great team behind our product. As our CEO
says, "Efficiencies will come from proactively transforming how
we do business."​
THANK YOU
Mirjam Nilsson
mirjam@contoso.com
www.contoso.com

More Related Content

Similar to Metasploitable.pptx

Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyAlienVault
 
Microservices in the cloud at AutoScout24
Microservices in the cloud at AutoScout24Microservices in the cloud at AutoScout24
Microservices in the cloud at AutoScout24Christian Deger
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisIntroduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisCAST
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Mobodexter
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfمنیزہ ہاشمی
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsPriyanka Aash
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool ImplementationCheckmarx
 
Telecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_AllTelecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_AllAmbrose Nwadike
 
FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM
 

Similar to Metasploitable.pptx (20)

Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
security onion
security onionsecurity onion
security onion
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance Strategy
 
Select idps
Select idpsSelect idps
Select idps
 
Flow-ABriefExplanation
Flow-ABriefExplanationFlow-ABriefExplanation
Flow-ABriefExplanation
 
Microservices in the cloud at AutoScout24
Microservices in the cloud at AutoScout24Microservices in the cloud at AutoScout24
Microservices in the cloud at AutoScout24
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio AnalysisIntroduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
Introduction to CAST HIGHLIGHT - Rapid Application Portfolio Analysis
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
 
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdfImprove_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
Improve_Application_Availability_and_Performance_Sales_Crib_Sheet.pdf
 
Applying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data SetsApplying Auto-Data Classification Techniques for Large Data Sets
Applying Auto-Data Classification Techniques for Large Data Sets
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
Telecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_AllTelecom Advisory Services Profile 11042016_All
Telecom Advisory Services Profile 11042016_All
 
FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Metasploitable.pptx

  • 2. AGENDA Introduction Architecture Of Metasplotable Modules Of Metasploitable Few Demos using Metsploitable Hacking Metsploitable using Kali Linux
  • 3. INTRODUCTION In cybersecurity, an intrusion occurs when an unauthorized entity manages to enter your network or host. That entity can be a threat actor deliberately infiltrating a system with harmful intentions. For example, it might be: • A malicious hacker doing network reconnaissance or a [DDoS attack]. • A non-malicious but unauthorized entity that entered the system unintentionally. An IDS helps prevent both undesirable cases.
  • 5. DEFINITION: An IDS is an indispensable part of network security. It is introduced as a system for detecting intrusions that attempt to compromise the main security goals, confidentiality, integrity, and availability of a resource.
  • 6. HOW DOES AN IDS WORK? • An IDS monitors the traffic on a computer network to detect any suspicious activity. • It analyzes the data flowing through the network to look for patterns and signs of abnormal behavior. • The IDS compares the network activity to a set of predefined rules or to the normal baseline to identify any activity that might indicate an attack or intrusion. • If the IDS detects something that matches one of these rules or deviates from the normal baseline, it sends an alert to the system administrator. • The system administrator can then investigate the alert and take action to prevent any damage or further intrusion.
  • 8. DIFFERENT TYPES OF IDS: Network-Based IDS (NIDS) Choose a point on your network and examine all traffic on all devices from that point. Host-Based IDS (HIDS) Examine traffic to and from independent devices within your network, and leave all other devices alone. Protocol-based IDS (PIDS) monitors protocol layer traffic that is used by protocol to communicate with each other Application Protocol-based IDS (APIDS) monitors application layer traffic that is used by applications to communicate with each other. Hybrid IDS Combine some of the approaches listed above into a system made just for you.
  • 9. BENEFITS OF IDS: • Detect several threats and alert your security staff, who can take appropriate action. • Detects DDoS Attacks. • Helps Meet Regulatory Compliance Requirements. • Detects Network Reconnaissance. • Provides insights. • Improves network performance
  • 11. DETECTION METHOD: Pattern or signature-based intrusion detection looks for network traffic or file patterns and compares them with similar threat-related patterns in their database. The IDS generates an alert once it finds a match (potential threat). Anomaly-based intrusion detection employs ML technology monitors network traffic and compares it against an established baseline to determine what is considered normal for the network concerning bandwidth, protocols, ports and other devices. policy-based detection the IDS compares traffic or files against pre-configured security policies, much like a firewall. Once the IDS finds that certain traffic violates the policy, it generates an alert.
  • 12. FEATURES: • Real-time Monitoring • Traffic Analysis • Alert Generation • Anomaly Detection • Signature-Based Detection • Log Analysis • Incident Correlation • Custom Rule Creation • User-Friendly Interface • Integration with Other Security Tools • Data Encryption Analysis
  • 14. Sensors / Agents collect data from network or host sources and send it to the analyzer for analysis. Management Server collects data from sensors and agents, correlates and analyzes it, and centralizes the management of multiple IDS sensors. Analyzers process the data captured by sensors and apply various detection techniques to identify potential threats or anomalies. Database Server stores the event data recorded by IDS sensors and agents, as well as the IDS's configuration data and the results of the analyzer's analysis. User Interface / IDS Console provides a graphical or command-line interface for administrators to configure, manage, and view the results of IDS operations. Alerting and Response Mechanisms generate alerts or trigger response actions when IDS detects suspicious or malicious activities.
  • 15.
  • 17. NMAP AND METASPLOITABLE FRAMEWORK Nmap allows you to scan your network and discover not only everything connected to it, but also a wide variety of information about what's connected, what services each host is operating, and so on. Now we should scan the target machine in Kali Linux using Nmap. -sV : This is a service version scan. -p- : Scans all ports.
  • 18. VSFTPD OPEN PORT I'll start with the first open port (port 21 vsftpd). By this command we are searching f or the service of the f irst open port that we've f ound.
  • 19. VSFTPD OPEN PORT I found one excellent module to exploit this port. W hich is module “1” So I will write “use 1” command. we should only specify RHOST which is the IP of our target machine. N ow we are ready to expl oit the Metasploi table .
  • 20. VSFTPD OPEN PORT And BAM!!! You can now run any command you want or do malicious things to the target machine.
  • 21. INTRODUCTION At Contoso, we empower organizations to foster collaborative thinking to further drive workplace innovation. By closing the loop and leveraging agile frameworks, we help business grow organically and foster a consumer-first mindset.​
  • 22. DEFINITION: B2B MARKET SCENARIOS Develop winning strategies to keep ahead of the competition ​Capitalize on low-hanging fruit to identify a ballpark value ​Visualize customer directed convergence​ CLOUD-BASED OPPORTUNITIES Iterative approaches to corporate strategy ​Establish a management framework from the inside​
  • 23. INTRODUCTION At Contoso, we empower organizations to foster collaborative thinking to further drive workplace innovation. By closing the loop and leveraging agile frameworks, we help business grow organically and foster a consumer-first mindset.​
  • 24. AREAS OF GROWTH CATEGORY 1 CATEGORY 2 CATEGORY 3 CATEGORY 4​ Q1 4.5 2.3 1.7 5​.0 Q2 3.2 5.1 4.4 3​.0 Q3 2.1 1.7 2.5 2.8 Q4 4.5 2.2 1.7 7.0
  • 25. BUSINESS OPPORTUNITIES ARE LIKE BUSES. THERE'S ALWAYS ANOTHER ONE COMING.​ Richard Branson
  • 26. MEET OUR TEAM TAKUMA HAYASHI Pres ide nt MIRJAM NILSSON Chief Executive Of f icer FLORA BERGGREN Chief Operatio ns Of f icer RAJESH SANTOSHI VP Mark eting
  • 27. MEET OUR TEAM GR AH AM B AR N ES V P P r o d u c t R OWAN M URPHY S E O S t r a t e g i s t ELIZABETH M OORE P r o d u c t D e s i g n e r R OB IN K LINE C o n t e n t D e v e l o p e r TAK UM A H AYASH I P r e s i d e n t M IRJAM N ILSSON C h i e f E x e c u t i v e O f f i c e r FLORA B ERGGREN C h i e f O p e r a t i o n s O f f i c e r R AJESH SAN TOSHI V P M a r k e t i n g
  • 28. PLAN FOR PRODUCT LAUNCH PLANNING Synergize scalable e-commerce MARKETING Disseminate standardized metrics DESIGN Coordinate e- business applications STRATEGY Foster holistically superior methodologies LAUNCH Deploy strategic networks with compelling e- business needs
  • 29. Q1 Synergize scalable e-commerce Q2 Coordinate e-business applications Q3 Deploy strategic networks with compelling e-business needs Q4 Disseminate standardized metrics TIMELINE
  • 30. AREAS OF FOCUS B2B MARKET SCENARIOS Develop winning strategies to keep ahead of the competition ​Capitalize on low-hanging fruit to identify a ballpark value ​Visualize customer directed convergence​ CLOUD-BASED OPPORTUNITIES Iterative approaches to corporate strategy ​Establish a management framework from the inside​
  • 31. AREAS OF FOCUS B2B MARKET SCENARIOS Develop winning strategies to keep ahead of the competition ​Capitalize on low-hanging fruit to identify a ballpark value ​Visualize customer directed convergence​ CLOUD-BASED OPPORTUNITIES Iterative approaches to corporate strategy ​Establish a management framework from the inside​
  • 32. AREAS OF FOCUS B2B MARKET SCENARIOS Develop winning strategies to keep ahead of the competition ​Capitalize on low-hanging fruit to identify a ballpark value ​Visualize customer directed convergence​ CLOUD-BASED OPPORTUNITIES Iterative approaches to corporate strategy ​Establish a management framework from the inside​
  • 33. HOW WE GET THERE ROI Envision multimedia-based expertise and cross-media growth strategies​ ​Engage worldwide methodologies with web- enabled technologies​ NICHE MARKETS Pursue scalable customer service through sustainable strategies​ Engage top-line web services with cutting-edge deliverables​​​ SUPPLY CHAINS Cultivate one-to-one customer service with robust ideas​ Maximize timely deliverables for real-time schemas​
  • 34. SUMMARY At Contoso, we believe in giving 110%. By using our next- generation data architecture, we help organizations virtually manage agile workflows. We thrive because of our market knowledge and great team behind our product. As our CEO says, "Efficiencies will come from proactively transforming how we do business."​