Red Team Engagement
Attack, Defense & Analysis of a Vulnerable Network
Table of Contents
Network Topology & Critical Vulnerabilities
This presentation contains the following resources:
Exploits Used
Methods Used to Avoid Detection
01
02
03
Network Topology & Critical Vulnerabilities
This section will assess the network topology used in this engagement followed by the critical vulnerabilities found on the Target 1 Virtual Machine when attacked using a Kali Linux Virtual Machine.
Network Topology
Network
Address Range:
192.168.1.0/24
Netmask:
Gateway: 192.168.1.1
Machines
IPv4: 192.168.1.90
OS: Debian Kali 5.4.0
Hostname: Kali
IPv4:192.168.1.110
OS: Debian GNU/Linux 8
Hostname: Target 1
IPv4: 192.168.1.105
OS: Ubuntu 18.04
Hostname: Capstone
IPv4: 192.168.1.100
OS: Ubuntu 18.04
Hostname: ELK
Critical Vulnerabilities on Target 1:
Vulnerability | Description | Impact |
WordPress User Enumeration | Utilized enumeration to gather user information for the web server | Allowed attacker to gather usernames to gain access to the web server |
Weak Passwords | Was able to find passwords using John the Ripper and simple guessing to gain access to user logins | Allowed attacker to gain access to protected web directories |
Unsalted User Password Hash | An unsalted user password hash makes it easier for a malicious actor to crack a users password. | Allows attackers to unhash passwords for easy password cracking |
Misconfiguration of User Privileges | Used Stevens sudo access to escalate from Steven to root | Allowed privilege escalation to root |
Screenshots of Critical Vulnerabilities:
Exploits Used
This section will demonstrate the methods taken to execute the exploits on the Target 1 Virtual Machine.
Exploitation: WordPress Enumeration
Summarize the following:
wpscan --url http://192.168.1.110/wordpress --enumerate u to enumerate the users on the web server.
Exploitation: Weak Passwords
Summarize the following:
Exploitation: Unsalted User Password Hash
Summarize the following:
Exploitation: Misconfiguration of User Privileges
Summarize the following:
Methods Used to Avoid Detection
This section will detail the alerts placed in Kibana and what methods can be used to attack the machine while mitigating detection.
Stealth Exploitation of WordPress User Enumeration
Mitigating Detection
Monitoring Overview
WHEN sum() OF http.request.bytes OVER all documents IS ABOVE 3500 FOR THE LAST 1 minute
Stealth Exploitation of SSH
Monitoring Overview
WHEN count() GROUPED OVER top 5 ‘http.response.status_code’ IS ABOVE 400 FOR THE LAST 5 minutes.
Mitigating Detection
Stealth Exploitation of Directory Exploration
Monitoring Overview
When max() OF system.process.cpu.total.pct OVER all documents IS ABOVE 0.5 FOR THE LAST 5 minutes
Mitigating Detection
The End
Austin Baxter, Ben Horsley, Lauren Williams, Steph Hoffman, & Tom Kuhn