Capstone Engagement
Assessment, Analysis, �and Hardening of a Vulnerable System
Table of Contents
This document contains the following sections:
01
02
03
04
Network Topology
Red Team: Security Assessment
Blue Team: Log Analysis and Attack Characterization
Hardening: Proposed Alarms and Mitigation Strategies
Network Topology
3
Network Topology
Network
Address Range: 1-255
Netmask: 225.255.255.0
Gateway: 192.168.1.1
Machines
IPv4: 192.168.1.1
OS: Windows/CPE
Hostname: 192.168.1.1
IPv4: 192.168.1.90
OS: Linux
Hostname: 192.168.1.90
IPv4: 192.168.1.100
OS: Linux
Hostname:192.168.1.100
IPv4: 192.168.1.105
OS: Linux
Hostname:192.168.1.105
Red Team
Security Assessment
5
Recon: Describing the Target
Nmap identified the following hosts on the network:
Hostname | IP Address | Role on Network |
192.168.1.1 | 192.168.1.1 | Virtual network |
192.168.1.90 | 192.168.1.90 | Attacker Machine |
192.168.1.100 | 192.168.1.100 | Elk Stack |
192.168.1.105 | 192.168.1.105 | Web Server |
Vulnerability Assessment
The assessment uncovered the following critical vulnerabilities in the target:
Vulnerability | Description | Impact |
Company Website About Us Page | There was excessive information available on the company website about its employees. | The amount of information provided makes social engineering very easy. |
Open Ports On Network | Port scans show open ports with lots of data about target machines. | This allowed attackers to gain lots of recon information about target. |
Employees storing hashes on the website. | Employees stored text files with hashes as well as step by step instructions on how to access web server | Attackers were able to very easily copy and break hashes to access file server and obtain sensitive files. |
PHP reverse shell | Uploaded an MSFvenom reverse shell script to target webserver. | This allowed attackers access to the server with meterpreter. |
Exploitation: Open port 80/tcp HTTP
Tools & Processes
01
02
Achievements
With this exploitation we find that Ashton has secret folder that needs username and password. That leads us to the next exploit.
03
Exploitation: Username and Password
Tools & Processes
From the last exploitation we hit a roadblock needing a password. With the reconnaissance we did before we know that port 80 open, path directory, username, and IP address. The tool we used is Hydra to brute force password.
01
02
Achievements
Attempt successful, allowed access to Ashton. From there we were able find Ryan’s hash
03
Exploitation: PHP Reverse Shell
Tools & Processes
Uploaded MSFVenom payload to WEBDAV with File Manager
01
02
Achievements
Successful call back from Web Server to attacker machine. Gained access to root user
03
Blue Team
Log Analysis and �Attack Characterization
11
Analysis: Identifying the Port Scan
Answer the following questions in bullet points under the screenshot if space allows. �Otherwise, add the answers to speaker notes.
Analysis: Finding the Request for the Hidden Directory
Answer the following questions in bullet points under the screenshot if space allows. �Otherwise, add the answers to speaker notes.
Analysis: Uncovering the Brute Force Attack
Answer the following questions in bullet points under the screenshot if space allows. �Otherwise, add the answers to speaker notes.
Analysis: Finding the WebDAV Connection
Answer the following questions in bullet points under the screenshot if space allows. �Otherwise, add the answers to speaker notes.
Blue Team
Proposed Alarms and �Mitigation Strategies
16
Mitigation: Blocking the Port Scan
What kind of alarm can be set to detect future port scans?
What threshold would you set to activate this alarm?
What configurations can be set on the host to mitigate port scans?
Describe the solution. If possible, provide required command lines.
System Hardening
Alarm
Mitigation: Finding the Request for the Hidden Directory
What kind of alarm can be set to detect future unauthorized access?
What threshold would you set to activate this alarm?
What configuration can be set on the host to block unwanted access?
Describe the solution. If possible, provide required command lines.
System Hardening
Alarm
Mitigation: Preventing Brute Force Attacks
What kind of alarm can be set to detect future brute force attacks?
What threshold would you set to activate this alarm?
What configuration can be set on the host to block brute force attacks?
Describe the solution. If possible, provide the required command line(s).
System Hardening
Alarm
Mitigation: Detecting the WebDAV Connection
What kind of alarm can be set to detect future access to this directory?
What threshold would you set to activate this alarm?
What configuration can be set on the host to control access?
Describe the solution. If possible, provide the required command line(s).
System Hardening
Alarm
Mitigation: Identifying Reverse Shell Uploads
What kind of alarm can be set to detect future file uploads?
What threshold would you set to activate this alarm?
What configuration can be set on the host to block file uploads?
Describe the solution. If possible, provide the required command line(s).
System Hardening
Alarm
22