Final Engagement
Attack, Defense & Analysis of a Vulnerable Network
1
Group: Conor, Josh, Diamond, Austin, Natasha, and Fahrad
Table of Contents
This document contains the following resources:
Network Topology & Critical Vulnerabilities
Exploits Used
Methods Used to Avoid Detection
2
01
02
03
Network Topology
& Critical Vulnerabilities
3
3
Network Topology
4
Network |
Address Range: 192.168.1.0/24 Netmask: 255.255.255.0 Gateway: 192.168.1.1 |
Machines | |||
IPv4: 192.168.1.90 OS: Debian Kali 5.4.0 Hostname: Kali | IPv4: 192.168.1.105 OS: Ubuntu 18.04.1 LTS Hostname: Capstone | IPv4: 192.168.1.100 OS: Ubuntu 18.04.4 LTS Hostname: ELK | IPv4: 192.168.1.115 OS: Debian GNU/Linux 8 Hostname: Target1 |
Critical Vulnerabilities: Target 1
Our assessment uncovered the following critical vulnerabilities in Target 1.
5
Vulnerability | Description | Impact |
Port Scanning/User Enumeration | Used nmap to discover machiners on the network. Used WPscan to access a list of usernames on target1. | Allows attackers to gain access to list of usernames on the web server |
Brute Force/Weak Passwords | Was able to guess Michael’s password | Allows attackers to login to the web server |
Hydra SSH Attack | Used hydra to crack password | Allows attackers to crack passwords |
Privilege Escalation | Escalated Steven to root by using a sudo Python command | Allows attackers to escalate a normal user to root |
Exploits Used
6
Exploitation: User Enumeration
- wpscan --url http://192.168.1.110/wordpress --enumerate u
7
Exploitation: Brute Force/Weak Passwords
Summarize the following:
8
The following commands should be followed in this sequence to obtain root access to the user Michael:
Exploitation: Hydra SSH Attack
9
Exploitation: Privilege Escalation
Summarize the following:
sudo python -c ‘import pty;pty.spawn(“/bin/bash”)’
Commands:
10
Avoiding Detection
11
11
Stealth Exploitation of User Enumeration
Monitoring Overview
Mitigating Detection
There is a more stealthy alternative wpscan command which can avoid triggering alerts
Command: “wpscan --stealthy --url http://192.168.1.110/wordpress u
Social engineering such as using authority or urgency to have a user disclose their info.
12
Stealth Exploitation of Brute Force/Weak Passwords
Monitoring Overview
Mitigating Detection
We could have achieved the same results by guessing the password. As the password is a weak password being the same as the users username. (Username: micheal, Password: michael)
Alternatively we could have sent a Phishing Email to trick michael into giving us his password.
13
Stealth Exploitation of Open Port Scanning
Monitoring Overview
& HTTP Request Size Monitor
WHEN count() GROUPED OVER top 5 'http.response.status_code'
& WHEN sum() of http.request.bytes OVER all documents
codes within 5 minutes while HTTP Request Size Monitor is above
3500 requests within 1 minute
Mitigating Detection
multiple types of scan to run that are more stealthy such as NULL scan, FIN, and X-MAS scan
14
Maintaining Access
15
Persistent backdoor.
Backdoor Overview:
16
17
END OF REPORT