Capstone Engagement
Assessment, Analysis, �and Hardening of a Vulnerable System
Table of Contents
This document contains the following sections:
01
02
03
04
Network Topology
Red Team: Security Assessment
Blue Team: Log Analysis and Attack Characterization
Hardening: Proposed Alarms and Mitigation Strategies
Network Topology
3
Network Topology
Network
Address Range: 192.168.1.0/24
Netmask: 255.255.255.0
Gateway: 192.168.1.1
Machines
IPv4: 192.168.1.90
OS: Linux
Hostname: Kali
IPv4: 192.168.1.100
OS: Linux
Hostname: ELK
IPv4: 192.168.1.105
OS: Linux
Hostname: Capstone
[Insert Here]
Use draw.io to create a diagram of the network.
Add your diagram to this slide and fill out the data in the sidebar.
Red Team
Security Assessment
5
Recon: Describing the Target
Nmap identified the following hosts on the network:
Hostname | IP Address | Role on Network |
Capstone | 192.168.1.105 | User who was attacked from the Hacker(Kali: 192.168.1.90) |
ELK Server | 192.168.1.100 | The VM that was receiving the log Data from the Target VM (Capstone: 192.168.1.105) |
Kali | 192.168.1.90 | For this experiment, The Kali machine will be the attacking VM. |
| | |
Vulnerability Assessment
The assessment uncovered the following critical vulnerabilities in the target:
Vulnerability | Description | Impact |
Use the CVE number if it exists. Otherwise, use the common name. | Describe the vulnerability. | Describe what this vulnerability allows the attacker to do. |
Brute Force Attack | The attacker was able to use Hydra command to Brute Force and retrieve Ashton’s password. The password let the attacker go on to his next step to target the VM. | Being able to be Brute Force with ease allows the attacker to gain credentials which in return can give the hacker any access to gain confidentiality. |
Cryptographic Failure | In this instance, the attacker was able to see the secret_folder and connect_to_corp folder because it wasn’t protected, allowing the webdav credentials to be compromised. | Since these folders were not protected, it allows the attacker an easier way to crack credentials and move on to the next phase of the plan. |
Reverse Shell upload exploit. | The attacker was able to implement a reverse shell into the WebDAV from the stolen credentials of an employee. Thus caused a hang on the server, allowing the hacker to find an capture the text from the flag.txt file | The reverse shell exploit allows hackers to open ports to the target machine and enabling a complete takeover of the machine. |
Exploitation: [Brute Force Attack]
Tools & Processes
I was able to exploit the Target VM using brute force. Since we were exposed to the possibility of using the secret_folder(1).
We were able to break into one of the employee’s accounts. We had three employee’s information. Hannah, Ashton, and Ryan (2,3,4).
After unzipping the rockyou.txt file in the attacker machine. I was able to run the hydra command (hydra -l ashton -P /usr/share/wordlists/rockyou.txt -s 80 -f -vV 192.168.1.105 http-get /company_folders/secret_folder). (5)
This command let me use Ashton as one of our employee’s username and find the password to his account.
This lets to me login into his account and access the secret_folder
01
02
Achievements
This exploit let me login to website with Ashton’s credentials.
This helped me (Attacker) move onto my next step in viewing the secret_folder directory and going through with my plan (6).
After viewing the directory, I was able to view the connect_to_corp_server file (7). This eventually leads me to my next step which is to login into the web_dav.
03
Exploitation: [Cryptographic Failures]
Tools & Processes
Cryptographic Failures was a big exploitation in this project because without it, it would have made my job (attacker) much harder.
The simple job of protecting the secret_folder directory wasn’t accomplished leading me to eventually login to the web_dav, send a hang with reverse_shell and eventually find the flag.txt file.
It is a common exploitation.
I was able to access the secret_folder directory because all the files on the website mentioned about it (1). Next, in order to access it, I brute forced one of the employee’s account (Ashton)(2) because he had accessed to it. After brute forcing, I was able to go to the secret_folder directory and view the connect_to_corp_server file(3), which helped me to eventually login to the web_dav and plant my reverse_shell
01
02
Achievements
This exploit helped me achieve my end goal of finding the flag.txt file. The mention of the secret_folder in every file, led me to believe there is something important. I tried accessing it from the web but I needed credentials. After viewing the context of a certain file about Ashton. I knew I needed to brute force with his credentials. After brute forcing, I was able to view the secre_folder directory(4) and move forward to the next step of my plan.
03
Exploitation: [Reverse Shell Upload Exploit]
Tools & Processes
In order to start this process, we received the credentials for Ryan, who had the access to upload our needed reverse shell payload.
Through our attacking machine (Kali), I saved my command (1) into a shell.php file.
Then I launched msf console, and ran these commands (2)
The Shell payload file was placed in my root directory so I moved it to my WebDav directory (3,4,5)
Next I logged into the site as seen on our Front-End, where I was able to enter Ryan’s credentials (6)
After I logged into the webdav, and clicked on the shell.php file (7)
Then I was able to find the flag.txt file (8,9)
01
02
Achievements
Since I ran the reverse shell, the upload was able to send a hang onto the device because it was able to open ports on the user device, in which it allowed to the hacker to access the files located on the user device.
03
Blue Team
Log Analysis and �Attack Characterization
11
Analysis: Identifying the Port Scan
[Insert Here]
Include a screenshot of Kibana logs depicting the port scan.
Analysis: Finding the Request for the Hidden Directory
[Insert Here]
Include a screenshot of Kibana logs depicting the request for the hidden directory.
Analysis: Uncovering the Brute Force Attack
[Insert Here]
Include a screenshot of Kibana logs depicting the brute force attack.
Analysis: Finding the WebDAV Connection
[Insert Here]
Add a screenshot of Kibana logs depicting the WebDAV connection.
Blue Team
Proposed Alarms and �Mitigation Strategies
16
Mitigation: Blocking the Port Scan
What kind of alarm can be set to detect future port scans?
What threshold would you set to activate this alarm?
What configurations can be set on the host to mitigate port scans?
System Hardening
Alarm
Mitigation: Finding the Request for the Hidden Directory
What kind of alarm can be set to detect future unauthorized access?
What threshold would you set to activate this alarm?
What configuration can be set on the host to block unwanted access?
System Hardening
Alarm
Mitigation: Preventing Brute Force Attacks
What kind of alarm can be set to detect future brute force attacks?
What threshold would you set to activate this alarm?
What configuration can be set on the host to block brute force attacks?
System Hardening
Alarm
Mitigation: Detecting the WebDAV Connection
What kind of alarm can be set to detect future access to this directory?
What threshold would you set to activate this alarm?
What configuration can be set on the host to control access?
System Hardening
Alarm
Mitigation: Identifying Reverse Shell Uploads
What kind of alarm can be set to detect future file uploads?
What threshold would you set to activate this alarm?
What configuration can be set on the host to block file uploads?
System Hardening
Alarm
22