The sys admin's daily grind – Metasploitable
Gone to the Dogs
If you mess around with a pen-testing tool on your own network, you might survive the consequences, but chances are you'll take the prize for outstanding recklessness. Charly has some advice: Use Metasploitable, perhaps the most broken Linux ever.
You've probably heard of the Darwin Awards [1]. This hilarious prize goes to people who improve the quality of the human gene pool by removing their own genes in an outstandingly stupid way. Because of this, almost all Darwin Awards are awarded posthumously – the few exceptions are unappetizing and don't make good family reading material [2].
My favorite award went to two gentlemen who took their off-road vehicle onto a frozen lake to indulge in a spot of dynamite fishing. One of the men set fire to an explosive charge and threw it far away. The men were a bit shocked when their dog cleverly retrieved the dangerous stick.
Given this emergency, they pulled out guns to stop the dog, which promptly hid under the SUV for safety. Needless to say, the dynamite detonated, the car sank, and the blast blew away the clever owners. They lost consciousness and were later found frozen to death. Pity about the dog – respect for the forensic scientist who reconstructed the sequence.
Bad luck stories can also be found on the web. Every administrator can probably relate to a tale of pen-testing tools running amok and suddenly shooting down the main production – preferably instigated by a trainee who wanted to see exactly what this or that metasploit could do.
Attacking your own network is really not necessary because there is an adventure playground waiting out there for you to romp around in safely. It goes by the name Metasploitable, and I think the name says it all. The Linux image is available online [3] and can be started in VMware or VirtualBox. After doing this, you have a huge range of vulnerabilities to attack.
Vulnerabilities En Masse
Some vulnerabilities are only of archaeological interest, such as the broken R services rlogin
and rsh
, which older readers will remember. Younger readers may only be familiar with SSH and that, too, is a disaster on Metasploitable – not to mention the weak to non-existent default passwords of all kinds of services.
Another group of vulnerabilities involves trojaned services, of which Metasploitable offers a fair number. They arise when someone hacks the download repository of a popular program and replaces the software with malware or a backdoored version. If you install this version on the server, you can soon look forward to unexpected visitors.
An example is the popular FTP daemon, vsftpd
. It was once replaced with a version that opened a root shell on port 6200 if users logged on with a smiley after the username (Figure 1).
So, if your trainees want to play pen-tester, give them Metasploitable and disconnect them from the LAN switch. They will be so fascinated with the options that they will not have any time at all for dynamite fishing.
Infos
- Darwin Awards: http://darwinawards.com
- "The Thing Ring," a castration story: http://darwinawards.com/darwin/darwin2014-05.html
- Metasploitable: http://sourceforge.net/projects/metasploitable/
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.
-
ZorinOS 17.1 Released, Includes Improved Windows App Support
If you need or desire to run Windows applications on Linux, there's one distribution intent on making that easier for you and its new release further improves that feature.
-
Linux Market Share Surpasses 4% for the First Time
Look out Windows and macOS, Linux is on the rise and has even topped ChromeOS to become the fourth most widely used OS around the globe.
-
KDE’s Plasma 6 Officially Available
KDE’s Plasma 6.0 "Megarelease" has happened, and it's brimming with new features, polish, and performance.
-
Latest Version of Tails Unleashed
Tails 6.0 is based on Debian 12 and includes GNOME 43.
-
KDE Announces New Slimbook V with Plenty of Power and KDE’s Plasma 6
If you're a fan of KDE Plasma, you'll be thrilled to hear they've announced a new Slimbook with an AMD CPU and the latest version of KDE Plasma desktop.
-
Monthly Sponsorship Includes Early Access to elementary OS 8
If you want to get a glimpse of what's in the pipeline for elementary OS 8, just set up a monthly sponsorship to help fund its continued existence.
-
DebConf24 to be Held in South Korea
Busan will be the location of the latest DebConf running July 28 through August 4
-
Fedora Unleashes Atomic Desktops
Fedora has combined its solid distribution with rpm-ostree system to make it possible to deliver a new family of Fedora spins, called Fedora Atomic Desktops.
-
Bootloader Vulnerability Affects Nearly All Linux Distributions
The developers of shim have released a version to fix numerous security flaws, including one that could enable remote control execution of malicious code under certain circumstances.