Video - Using Metasploit to Launch a DOS Attack Against Windows XP

8 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$99.99
List Price:  $139.99
You save:  $40
€96.05
List Price:  €134.47
You save:  €38.42
£78.28
List Price:  £109.60
You save:  £31.31
CA$143.28
List Price:  CA$200.59
You save:  CA$57.31
A$160.13
List Price:  A$224.20
You save:  A$64.06
S$135.03
List Price:  S$189.05
You save:  S$54.02
HK$777
List Price:  HK$1,087.84
You save:  HK$310.83
CHF 88.49
List Price:  CHF 123.89
You save:  CHF 35.40
NOK kr1,126.80
List Price:  NOK kr1,577.57
You save:  NOK kr450.76
DKK kr717.22
List Price:  DKK kr1,004.14
You save:  DKK kr286.92
NZ$176.87
List Price:  NZ$247.63
You save:  NZ$70.75
د.إ367.26
List Price:  د.إ514.17
You save:  د.إ146.91
৳11,929.84
List Price:  ৳16,702.26
You save:  ৳4,772.41
₹8,538.94
List Price:  ₹11,954.85
You save:  ₹3,415.91
RM448.65
List Price:  RM628.13
You save:  RM179.48
₦154,544.52
List Price:  ₦216,368.52
You save:  ₦61,823.99
₨27,792.76
List Price:  ₨38,910.97
You save:  ₨11,118.21
฿3,416.65
List Price:  ฿4,783.45
You save:  ฿1,366.80
₺3,519.17
List Price:  ₺4,926.99
You save:  ₺1,407.81
B$637.56
List Price:  B$892.61
You save:  B$255.05
R1,874.85
List Price:  R2,624.87
You save:  R750.01
Лв188
List Price:  Лв263.20
You save:  Лв75.20
₩145,711.39
List Price:  ₩204,001.77
You save:  ₩58,290.38
₪364.90
List Price:  ₪510.87
You save:  ₪145.97
₱5,865.41
List Price:  ₱8,211.81
You save:  ₱2,346.40
¥15,715.92
List Price:  ¥22,002.92
You save:  ¥6,286.99
MX$2,016.21
List Price:  MX$2,822.78
You save:  MX$806.56
QR363.08
List Price:  QR508.32
You save:  QR145.24
P1,386.50
List Price:  P1,941.15
You save:  P554.65
KSh12,902.70
List Price:  KSh18,064.30
You save:  KSh5,161.60
E£5,082.90
List Price:  E£7,116.27
You save:  E£2,033.36
ብር12,710.92
List Price:  ብር17,795.80
You save:  ብር5,084.87
Kz91,190.88
List Price:  Kz127,670.88
You save:  Kz36,480
CLP$98,919.10
List Price:  CLP$138,490.70
You save:  CLP$39,571.60
CN¥729.82
List Price:  CN¥1,021.78
You save:  CN¥291.96
RD$6,081.12
List Price:  RD$8,513.82
You save:  RD$2,432.69
DA13,508.78
List Price:  DA18,912.83
You save:  DA5,404.05
FJ$231.84
List Price:  FJ$324.58
You save:  FJ$92.74
Q768.97
List Price:  Q1,076.59
You save:  Q307.62
GY$20,886.35
List Price:  GY$29,241.72
You save:  GY$8,355.37
ISK kr13,953.60
List Price:  ISK kr19,535.60
You save:  ISK kr5,582
DH1,006.73
List Price:  DH1,409.47
You save:  DH402.73
L1,841.91
List Price:  L2,578.75
You save:  L736.83
ден5,908.74
List Price:  ден8,272.47
You save:  ден2,363.73
MOP$798.63
List Price:  MOP$1,118.11
You save:  MOP$319.48
N$1,856.28
List Price:  N$2,598.86
You save:  N$742.58
C$3,673.45
List Price:  C$5,142.98
You save:  C$1,469.52
रु13,596.38
List Price:  रु19,035.48
You save:  रु5,439.09
S/371.74
List Price:  S/520.45
You save:  S/148.71
K405.18
List Price:  K567.27
You save:  K162.09
SAR375.47
List Price:  SAR525.68
You save:  SAR150.20
ZK2,762.82
List Price:  ZK3,868.06
You save:  ZK1,105.23
L478.38
List Price:  L669.75
You save:  L191.37
Kč2,417.95
List Price:  Kč3,385.23
You save:  Kč967.27
Ft39,478.73
List Price:  Ft55,271.81
You save:  Ft15,793.07
SEK kr1,088.11
List Price:  SEK kr1,523.40
You save:  SEK kr435.29
ARS$102,698.50
List Price:  ARS$143,782.01
You save:  ARS$41,083.50
Bs689.84
List Price:  Bs965.80
You save:  Bs275.96
COP$441,236.66
List Price:  COP$617,748.98
You save:  COP$176,512.31
₡50,688.88
List Price:  ₡70,966.47
You save:  ₡20,277.58
L2,536.46
List Price:  L3,551.14
You save:  L1,014.68
₲778,577.57
List Price:  ₲1,090,039.75
You save:  ₲311,462.17
$U4,443.67
List Price:  $U6,221.32
You save:  $U1,777.64
zł409.39
List Price:  zł573.17
You save:  zł163.77
Already have an account? Log In

Transcript

Greetings and initiate video presentation we're going to see how we go about using Metasploit to launch a DoS attack against a Windows XP machine. Meta sploit is an all around hacking suite of tools that comes with Cali landings. It is used by pen testers and hackers alike. This point comes with various exploits and payloads similar to commercial applications costing thousands of dollars. And an example of that would be Korean Pac. So as with every lab before we get too far along, let's make sure that we have network connectivity between our Kali machine and our target which is our XP host.

So I verified that I do have an IP address assigned to my Ethernet zero adapter on my Kali machine, and that IP address is 192 dot 168 dot 145 dot one three. Now this is my IP address not yours. Your IP address will differ. Let's go on over to my Windows XP machine and let's check out the IP address assigned to it. The IP address assigned to my Windows XP machine is 192 dot 168 dot 145 dot 131. Alright, so now let's go back over to Kali.

And we're going to ping that IP address. If both of these machines are on the same network sharing the same network ID, they should be able to see each other and his ping should be successful. And I get back nothing but positive responses. So I can do a Ctrl C, break that sequence. And now we're ready to continue on with the lab. A couple of caveats that we have to take care of before we get too far along.

One of those is make sure that your Windows Firewall on the Windows XP machine is disabled. Secondly, make sure that RDP is enabled on the remote target. So mine says that no firewall is turned on. And if I click on my start button, I right Click on my computer, I go to properties, and I go to remote, you'll see that the box is checked to allow users to connect remotely to this computer. We're good to go. On my Kali machine, I have typing the command clear on my terminal.

And that's going to give me a clean terminal to start work with. And we are now ready to begin the lab. So for grins and giggles, we can treat this as if this was the first time I've ever seen this network. And I need to find out what machines are running on this network and what their operating systems are. I also like to find out what services or ports are currently open on those machines. So I can type in 192 dot 168 dot 145 dot zero, forward slash 24 to scan the entire network, or in this case, since I already know that my Windows XP has the host IP a 131.

We can preclude all that and we can just get to the lab itself. And do the N map space dash small letter S, capital V and the IP address of the host, I want to scan, which is 131. So I'm going to go ahead and hit Enter. And in just a moment, the results of the scan will come back to me. So if I had done the network, scan every machine on the network that was available and connected to the same network, I would have got results back telling me what the operating system was, what the ports were and what services were running along with your IP address. Now, in this case, we know that this is an XP machine.

And we can confirm that because when I use this S, capital V switch within map, it looks for the OS. It tries to identify the OS and it comes back and it tells you what it believes the operating system is it doesn't always work, but a lot of times it does. And map also provides me with the ports and the services. that are currently running on this remote target. This is going to allow me to determine what exploits I can run. So currently I have a couple of ports that I'm interested in.

The first one is this SMB service that is running on port 445. The other one is RDP, which is using Port 3389. Again, I've cleared my terminal screen so that I have a clean working area. And now I'm going to go ahead and launch meta sploit we're going to do that by typing in m s f posle. And in just a moment, meta sploit will start up to see all the exploits that are currently available up inside of meta sploit. I can type in show exploits, and it'll bring up an entire list of all the exploits that are available to me.

Notice that all of these exploits are also rated by how successful they are. You either get a normal an average or a great but in this case I have a particular exploit that I want to find out I can try to scroll through all of these hundreds of exploit looking for this particular one, but I can also use the search feature. So I can type in search. And the information that describes the exploit in this case is the Microsoft Security bulletin 12 dash zero to zero. And if I hit Enter in just a moment, it's going to do a search and come up with this particular exploit. This module exploits the Microsoft 12 dash zero to zero RDP vulnerability which allows for remote code execution when an attacker sends a sequence of specifically crafted RDP packets to an infected system.

By default, the remote desktop protocol RDP is not enabled on any Windows operating system. So systems that do not have RDP enabled are not at risk. So to see the effects of this denial of service attack on this Windows XP target We need to have the Windows XP open because it's going to happen very quickly. So what I've done here is I have stacked my two operating systems Kali and Windows XP side by side. And I did this by going down to my taskbar, and right clicking and then I chose, I said, Show windows stack that brings both of them into the one monitors side by side, we're now ready to begin this denial of service attack. Now to do this, what I'm going to do is I'm going to copy this particular exploit right here, I'm gonna say copy.

I'm gonna go down here, and I'm going to type in you. And now I'm just going to right click, and I'm going to paste. Once that's done, all I have to do is hit Enter, and you'll notice that my prompt changes to let me know that I'm now using that exploit. This is a very simple exploit. So to see the options that I must configure, I can just type in show options. And you'll see that it says, the remote host must be configured remote Port 3389 is already set for us.

So I'm going to go ahead and set the remote host IP address for this particular exploit. So this is a good time to confirm that this is the IP address of your target. There's nothing wrong with going over and finding the IP address for this particular machine. Because we only want to do this once. We don't want to be banging our head on the keyboard three or four times because we type in the wrong IP address. I'm ready now to hit Enter.

And lets me know that the remote host IP address has been set. We're now ready to bring down our Windows XP machine using this denial of service attack. To do this, I'm just going to go ahead and run the exploit by using the exploit command. I'm going to go ahead and hit enter. Now you have to keep your eyes on the Windows XP target because this happens very quickly. And the Windows XP machine rebooted.

In this short video presentation, you got to see how easy it was to create a denial of service attack onto a Windows XP target using the meta sploit framework. That concludes this short video presentation. If you have any questions or concerns about the contents of this video or the lab, please do not hesitate to reach out and contact your instructor and I'll see you in my next video.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.