Capstone Engagement
Assessment, Analysis, �and Hardening of a Vulnerable System
Table of Contents
This document contains the following sections:
01
02
03
04
Network Topology
Red Team: Security Assessment
Blue Team: Log Analysis and Attack Characterization
Hardening: Proposed Alarms and Mitigation Strategies
Network Topology
3
Network Topology
Network
Address Range: 192.168.1.0/24
Netmask: 255.255.255.0
Gateway: 192.168.1.1
Machines
IPv4: 192.168.1.1
OS: Linux
Hostname: ML-RefVm-684427
IPv4: 192.168.1.105
OS: Linux
Hostname: server1
IPv4: 192.168.1.100
OS: Linux
Hostname: ELK
IPv4: 192.168.1.90
OS: Linux
Hostname: Kali
Red Team
Security Assessment
5
Recon: Describing the Target
Nmap identified the following hosts on the network:
Hostname | IP Address | Role on Network |
ML-RefVm-684427 | 192.168.1.1 | Hyper-V Manager Gateway (Virtual Machine) |
server1 | 192.168.1.105 | Capstone Web Server |
ELK | 192.168.1.100 | Web Monitoring for Capstone Web Server |
Kali | 192.168.1.90 | Attack Machine |
Vulnerability Assessment
The assessment uncovered the following critical vulnerabilities in the target:
Vulnerability | Description | Impact |
Sensitive Data Exposure - Directory Traversal | The hidden directory /secret_folder exposed through the website which is accessible by the public. | Directory traversal allows an attacker to access the unauthorized areas of the web server. |
Unauthorized File Upload | Users allowed to upload potentially dangerous file types directly onto the web server. | In this case PHP scripts were able to be uploaded onto the web server allowing the attacker to access the root directory. |
Remote Code Execution - LFI (Local File Inclusion) Vulnerability | PHP shell script able to be uploaded onto the web server and run through the public webpage. | This LFI vulnerability allowed attacker to open a reverse shell to gain access to the server and access sensitive information. |
Exploitation: Sensitive Data Exposure - Directory Traversal
Tools & Processes
01
02
Achievements
03
Exploitation: Unauthorized File Upload
Tools & Processes
01
02
Achievements
03
Exploitation: Remote Code Execution - LFI Vulnerability
Tools & Processes
01
02
Achievements
03
Blue Team
Log Analysis and �Attack Characterization
11
Analysis: Identifying the Port Scan
Analysis: Finding the Request for the Hidden Directory
Analysis: Uncovering the Brute Force Attack
Analysis: Finding the WebDAV Connection
Blue Team
Proposed Alarms and �Mitigation Strategies
16
Mitigation: Blocking the Port Scan
What kind of alarm can be set to detect future port scans?
What threshold would you set to activate these alarms?
What configurations can be set on the host to mitigate port scans?
System Hardening
Alarm
Mitigation: Finding the Request for the Hidden Directory
What kind of alarm can be set to detect future unauthorized access?
What threshold would you set to activate this alarm?
What configuration can be set on the host to block unwanted access?
System Hardening
Alarm
Mitigation: Preventing Brute Force Attacks
What kind of alarm can be set to detect future brute force attacks?
What threshold would you set to activate this alarm?
What configuration can be set on the host to block brute force attacks?
System Hardening
Alarm
Mitigation: Detecting the WebDAV Connection
What kind of alarm can be set to detect future access to this directory?
What threshold would you set to activate this alarm?
What configuration can be set on the host to control access?
System Hardening
Alarm
Mitigation: Identifying Reverse Shell Uploads
What kind of alarm can be set to detect future file uploads?
What threshold would you set to activate this alarm?
What configuration can be set on the host to block file uploads?
System Hardening
Alarm
22