Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

13
Hands on Demonstration of Kali Linux, Metasploit Targeting and Attacking Building Control Systems November 18, 2015 Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems Bob Talbot ICS/SCADA Security Solutions Manager [email protected] 540 270-6088

Transcript of Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Page 1: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Hands on Demonstration of Kali

Linux, Metasploit

Targeting and Attacking Building Control

Systems

November 18, 2015

Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems

Bob Talbot ICS/SCADA Security Solutions Manager [email protected] 540 270-6088

Page 2: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

AGENDA

Control System Exploitation Vectors

Finding & Exploiting Vulnerabilities

Attack Methodology

Tools

Demo

Wrap-up

Page 3: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Control System Exploitation Vectors

Page 4: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Finding Vulnerabilities

Page 5: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Exploiting Vulnerabilities

Page 6: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Attack Methodology

Page 7: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Kali Linux

• Kali Linux is a free tool designed for forensics and penetration testing • Can be downloaded at: www.kali.org • Kali is a Debian-based linux distribution • -Can be run on a hard drive, live CD, or live USB • The distribution includes over 600 pen testing programs • Some of the most commonly used are: • -nmap—a port scanner (passive and active scanning) • -Wireshark—packet analyzer • -John the Ripper—password cracker • -Aircrack-ng—wireless LAN penetration testing suite • -Burp Suite—web application scanner • Also contains the Metasploit Framework—developing and executing

exploits

Page 8: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Tools

Page 9: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Network Mapper (nmap)

Page 10: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Packet Analyzer (Wireshark/tcpdump)

Page 11: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Demo

• BMS Attack

Page 12: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Questions?

Commercial Cybersecurity Division 5885 Trinity Way

Centreville, VA 20120 www.parsons.com

Page 13: Hands on Demonstration of Kali Linux, Metasploit Targeting and ...

Thank You Please visit www.parsons.com/cyber for more information or to request a demonstration.