Hands on Demonstration of Kali Linux, Metasploit Targeting and ...
Transcript of Hands on Demonstration of Kali Linux, Metasploit Targeting and ...
![Page 1: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/1.jpg)
Hands on Demonstration of Kali
Linux, Metasploit
Targeting and Attacking Building Control
Systems
November 18, 2015
Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems
Bob Talbot ICS/SCADA Security Solutions Manager [email protected] 540 270-6088
![Page 2: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/2.jpg)
AGENDA
Control System Exploitation Vectors
Finding & Exploiting Vulnerabilities
Attack Methodology
Tools
Demo
Wrap-up
![Page 3: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/3.jpg)
Control System Exploitation Vectors
![Page 4: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/4.jpg)
Finding Vulnerabilities
![Page 5: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/5.jpg)
Exploiting Vulnerabilities
![Page 6: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/6.jpg)
Attack Methodology
![Page 7: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/7.jpg)
Kali Linux
• Kali Linux is a free tool designed for forensics and penetration testing • Can be downloaded at: www.kali.org • Kali is a Debian-based linux distribution • -Can be run on a hard drive, live CD, or live USB • The distribution includes over 600 pen testing programs • Some of the most commonly used are: • -nmap—a port scanner (passive and active scanning) • -Wireshark—packet analyzer • -John the Ripper—password cracker • -Aircrack-ng—wireless LAN penetration testing suite • -Burp Suite—web application scanner • Also contains the Metasploit Framework—developing and executing
exploits
![Page 8: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/8.jpg)
Tools
![Page 9: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/9.jpg)
Network Mapper (nmap)
![Page 10: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/10.jpg)
Packet Analyzer (Wireshark/tcpdump)
![Page 11: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/11.jpg)
Demo
• BMS Attack
![Page 12: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/12.jpg)
Questions?
Commercial Cybersecurity Division 5885 Trinity Way
Centreville, VA 20120 www.parsons.com
![Page 13: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...](https://reader034.fdocuments.us/reader034/viewer/2022051200/586e02b01a28abab528b5286/html5/thumbnails/13.jpg)
Thank You Please visit www.parsons.com/cyber for more information or to request a demonstration.