14Sakshi2005/AP_Cybersecurity_5

GitHub: 14Sakshi2005/AP_Cybersecurity_5

一个在Metasploitable上利用Samba漏洞的完整渗透与事件响应教学实验。

Stars: 0 | Forks: 0

# Capstone Project: Samba Exploitation & Incident Response Simulation ![Status](https://img.shields.io/badge/Status-Completed-green) ![Platform](https://img.shields.io/badge/Platform-Kali%20Linux-blue) ![Tool](https://img-shields/badge/Tool-Metasploit-red) ![VM](https://img-shields/badge/Target-Metasploitable-orange) ![Focus](https://img-shields/badge/Security-Pentesting-critical) ## 概述 This project demonstrates a controlled security assessment of a vulnerable system using Metasploit Framework. The objective was to identify, exploit, and analyze a known Samba vulnerability in a test environment and simulate a real-world incident response scenario. Target system used: Metasploitable (intentionally vulnerable VM) ## 使用的工具 - Metasploit Framework - Nmap - Netcat payloads - Metasploitable VM - Kali Linux ## 目标 - Perform vulnerability exploitation in a controlled environment - Gain remote shell access - Analyze system compromise - Simulate incident response lifecycle ## 网络架构 Attacker Machine (Kali Linux) ↓ Metasploit Framework Attack ↓ Target Machine (Metasploitable) ## 利用总结 ### 1. 使用的利用 exploit/multi/samba/usermap_script ### 2. 载荷 cmd/unix/reverse ### 3. 目标 Metasploitable VM ## 攻击过程 1. Identified target IP using network scanning 2. Confirmed Samba service running on ports 139 and 445 3. Launched Metasploit Framework 4. Selected Samba exploit module 5. Configured: - RHOSTS = Target IP - LHOST = Attacker IP (Kali) - Payload = reverse shell 6. Executed exploit successfully 7. Gained remote shell access ## 🖧 攻击流程图 ``` flowchart TD A[Attacker Machine - Kali Linux] --> B[Metasploit Framework] B --> C[Exploit: Samba usermap_script] C --> D[Target: Metasploitable VM] D --> E[Remote Shell Access Gained] E --> F[Post Exploitation Commands] F --> G[Incident Response Simulation] G --> H[Mitigation & Cleanup] ``` ## 攻击后活动 Executed system reconnaissance commands: - whoami - id - hostname - ps aux Verified successful compromise of target system. ## 事件响应模拟 ### 检测 - Unauthorized remote shell access detected ### 分析 - Exploitation via vulnerable Samba service ### 遏制 - Terminated malicious shell session - Identified attacker connection ### 根除 - Stopped vulnerable service (smbd) - Recommended patching Samba ## 缓解策略 - Disable unused services - Patch Samba vulnerabilities - Restrict SMB ports via firewall - Implement intrusion detection systems - Regular vulnerability scanning ## 📸 证据 | Step | Screenshot | |----------------------|-----------------------------------| | Exploit Execution | 1_ifconfig | | Session Opened | 3_Sus_Log_Entries | | Post Exploitation | 2_ShellAccess | ## 关键学习成果 - Understanding SMB vulnerabilities - Real-world exploitation workflow - Metasploit usage - Incident response lifecycle - System compromise analysis
标签:Capstone 项目, CIDR输入, CISA项目, CTI, Go语言工具, HTTP工具, Metasploitable, Netcat, Nmap, Samba 漏洞, 云存储安全, 反取证, 可控环境, 威胁模拟, 安全评估, 编程工具, 网络安全实验, 网络扫描, 虚拟驱动器, 远程代码执行