aivolved report
aivolved report
Submitted By :
1. Adithya V
2. Amruth RB
3. Bhagavathy Raj V
4. BM Anand
5. Hemanth KS
6. Swastik Shetty
7. Vishal Kerur
Role:
As a group, our assigned the role of work was on exploiting android, devices using
Metasploit Framework with the help of Kali Linux
Project Overview:
Our job as a group of interns was to try to exploit android devices but as we were
progressing, we were also assigned the task to try to access a windows machine and a
Linux machine
Responsibilities:
Developing and implementing Metasploit framework for accessing the target’s
device
Working with modules like auxiliary, encoders, exploits, nops, payloads post
Goal:
The goal is to enhance understanding and proficiency in exploit development,
enabling security professionals to effectively assess them
1. Vulnerability Assessment:
Identify and assess vulnerabilities in computer systems and networks to
understand potential points of exploitation.
2. Exploit Development:
Develop, test, and deploy exploits for known vulnerabilities. This helps
security professionals understand the impact of vulnerabilities and assists
in creating mitigation strategies.
3. Penetration Testing:
Conduct simulated attacks on systems and networks to evaluate their
security posture. This involves attempting to exploit vulnerabilities in a
controlled environment to identify weaknesses.
4. Education and Training:
Serve as an educational tool for learning about penetration testing, ethical
hacking, and cybersecurity.
Abstract: Metasploit is the world’s leading open-source penetrating framework used
by security engineers as a penetration testing system and a development platform that
allows to create security tools and exploits. The framework makes hacking simple for
both attackers and defenders.
The various tools, libraries, user interfaces, and modules of Metasploit allow a user to
configure an exploit module, pair with a payload, point at a target, and launch at the
target system. Metasploit’s large and extensive database houses hundreds of exploits
and several payload options.
The project focuses on providing methods and features for automating the exploit
development using the functions and tools available in the popular Metasploit
framework. Metasploit is a powerful and widely used penetration testing tool that
identifies and exploits vulnerabilities in target systems.
Use case and Purpose: With the wide range of applications and open-source
availability that Metasploit offers, the framework is used by professionals in
development, security, and operations to hackers.
Metasploit Uses and Benefits: Metasploit provides you with varied use cases, and its
benefits include:
Easy Switching Between Payloads – the set payload command allows easy,
quick access to switch payloads. It becomes easy to change the meterpreter or
shell-based access into a specific operation.
Cleaner Exits – Metasploit allows a clean exit from the target system it has
compromised.
There are two types of shells in Metasploit — for attacking or interacting with the
target system.
Bind Shell - here, the target machine opens up a listener on the victim
machine, and then the attacker connects to the listener to get a remote shell.
This type of shell is risky because anyone can connect to the shell and run the
command.
Reverse Shell - here, the headset runs on the attacker, and the target system
is connected to the attacker using a shell. Reverse shells can solve problems
that are caused by bind shells.
Metasploit Commands
Some basic commands of Metasploit are msfconsole, banner, search, connect, cd,
back, grep, jobs, kill, load, info, show options, set, check, edit, use, exploit, exit, help,
and others.
Requirements
Metasploit is a popular open-source penetration testing framework that helps security
professionals and ethical hackers identify and exploit vulnerabilities in systems. To
effectively use Metasploit, you need to ensure that your system meets certain
specifications.
Methodology
Requirements:
1. A computer or laptop with Kali Linux installed or a virtual machine like VMware
or Oracle Virtual Box if the host OS is windows
2. A stable WIFI network
3. Install Metasploit Framework if not found (it will be pre-installed in Kali Linux)
4. An android device or a windows machine
Information Gathered
Here are some data sources for collecting information regarding Metasploit:
1. Official Sources:
Metasploit Framework Documentation: The official documentation for Metasploit is a
comprehensive resource that covers everything from installation and configuration to
using the framework's various modules and features.
Metasploit Blog: The Metasploit blog is a great way to stay up-to-date on the
latest news and developments related to the framework.
Metasploit Community Forums: The Metasploit community forums are a
valuable resource for getting help and advice from other Metasploit users.
2. Third-Party Sources:
Online Courses: There are a number of online courses available that teach you
how to use Metasploit. These courses can be a great way to learn the framework
at your own pace.
Security Blogs and Websites: Many security blogs and websites publish articles
and tutorials about Metasploit.
Modules
4. Then type “cd Desktop” for installing the apk file in the Desktop directory
6. You have successfully created an android apk with the necessary payload to
gain access of the target device
7. For setting up the host and target device and to set up listeners and monitor the
environment we need a medium for it. In this case we are using msfconsole.
11.We tell it that we'd like to use the generic payload handler, ie the “multi-
handler” module
12. We need to tell the multi-handler what IP address to listen on – this will
correspond to the LHOST value we set in our msfvenom command “set
LHOST 192.168.0.3”
13. For setting up the listener port we need to type “set LHOST 4444”
15. Then open a second terminal for setting up the server ,for accessing the file
through it , type this command for using apache server, “service apache2
start”, click enter
16. For check the status of the server ,type “service apache status”
1. You can share the created apk file by various ways for accessing the target’s
phone for example, sharing the apk file via WhatsApp, or sharing it via usb
transfer, or via Bluetooth or nearby share.
2. Keep the msfconsole up and running and type “run” for accessing the phone
4. Once accepted a meterpreter session will get generated for accessing the target
phone by various commands
Tutorial for accessing the target’s camera, microphone and file system
These are the commands required for navigating into files and folders in the
phone
Output
The problems we faced during the development