Final Engagement
Attack, Defense & Analysis of a Vulnerable Network
1
Table of Contents
This document contains the following resources:
Network Topology
Critical Vulnerabilities
Alerts Implemented
Hardening
2
Network Topology
& Critical Vulnerabilities
3
Network Topology
Network
Address Range:192.168.1.0/24
Machines
IPv4: 192.168.1.90
OS: Kali Linux
Hostname: Kali
IPv4: 192.168.1.110
OS: Linux
Hostname: Target 1
IPv4: 192.168.1.115
OS: Linux
Hostname: Target 2
IPv4: 192.168.1.100
OS: Linux
Hostname: ELK
Critical Vulnerabilities: Target 1
Our assessment uncovered the following critical vulnerabilities in Target 1.
5
Vulnerability | Description | Impact |
WP scan to enumerate users | WP scan is a tool to exploit vulnerable Wordpress servers, specifically enumerating users by sending requests and seeing the responses to infer which users accounts are registered | Gaining the usernames and from there able to brute force their passwords |
Weak password for WP logins | Common passwords can be brute forced using hydra and used to gain unauthorized access | Gained unauthorized access on Target 1 |
Running python with sudo privileges | Python module is ran with sudo privileges can be exploited by users with no sudo access | Escalate user to root |
Alerts Implemented
6
Excessive HTTP Errors
Summarize the following:
7
HTTP Request Size Monitor
Summarize the following:
8
CPU Usage Monitor
Summarize the following:
9
Hardening
10
Hardening Against WordPress Vulnerabilty on Target 1
11
Hardening Against DDOS on Target 1
DDOS Hardening on Linux:
1.check for connections from common subnets
2.install netstat if needed
3.find connections from the /24 subnet
4.list all IP addresses
5. netstat calculate # of connections
6. Once you find IP engaging in DDOS
7. Or entire subnet
12
Hardening Against Virus or Malware on Target 1
Malware Hardening:
13
Hardening Against Virus or Malware on Target 1
Malware Hardening:
14