Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014



Similar documents
Security Management. Keeping the IT Security Administrator Busy

Topics in Network Security

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CRYPTUS DIPLOMA IN IT SECURITY

Enumerating and Breaking VoIP

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

NETWORK AND INTERNET SECURITY POLICY STATEMENT

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Build Your Own Security Lab

Protecting Your Organisation from Targeted Cyber Intrusion

Penetration Testing Report Client: Business Solutions June 15 th 2015

Exploiting Transparent User Identification Systems

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

1. Why is the customer having the penetration test performed against their environment?

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

13 Ways Through A Firewall

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Top 20 Critical Security Controls

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

DiamondStream Data Security Policy Summary

Kerem Kocaer 2010/04/14

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

The Trivial Cisco IP Phones Compromise

Fighting Advanced Threats

Threat Events: Software Attacks (cont.)

Cyber Essentials. Test Specification

CYBERTRON NETWORK SOLUTIONS

Top tips for improved network security

Global Security Report 2011

Acano solution. Security Considerations. August E

13 Ways Through A Firewall What you don t know will hurt you

SecurityMetrics Vision whitepaper

THE OPEN UNIVERSITY OF TANZANIA

Experiences from Educating Practitioners in Vulnerability Analysis

SAST, DAST and Vulnerability Assessments, = 4

!!!!!!!!!!!!!!!!!!!!!!

Guidance Regarding Skype and Other P2P VoIP Solutions

BlackBerry 10.3 Work and Personal Corporate

The Real State of WiFi Security in the Connected Home August 25, 2015

Policy Document. Communications and Operation Management Policy

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Data Access Request Service

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

The Self-Hack Audit Stephen James Payoff

Information Security. Training

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

An Introduction to Network Vulnerability Testing

Configuring WildFire. Version 1.0 PAN-OS Johan Loos.

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

WHITE PAPER. An Introduction to Network- Vulnerability Testing

Preparing Your Personal Computer to Connect to the VPN

INFORMATION SECURITY TRAINING CATALOG (2015)

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

The Key to Secure Online Financial Transactions


Potential Targets - Field Devices

Penetration Test Report

How To Protect Your Online Banking From Fraud

WiFi Security Assessments

Blue Jeans Network Security Features

60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Penetration Testing. Presented by

T E C H N I C A L S A L E S S O L U T I O N

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

How To Audit Health And Care Professions Council Security Arrangements

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Chapter 1 The Principles of Auditing 1

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Wireless Encryption Protection

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

NETWORK PENETRATION TESTING

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Criteria for web application security check. Version

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Internet Banking System Web Application Penetration Test Report

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

2016 TÜBİTAK BİLGEM Cyber Security Institute

Exam Questions SY0-401

INFORMATION SECURITY TRAINING CATALOG (2016)

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Windows Attack - Gain Enterprise Admin Privileges in 5 Minutes

That Point of Sale is a PoS

Transcription:

1. Executive Summary Penetration Testing Report Client: xxxxxx Date: 19 th April 2014 On the 19th of April, a security assessment was carried out on the internal networks of xxxxxx, with the permission of the system administrator, Mr xxxxxx. This test was designed to get a view of the overall security of the network, and to identify areas for improvement. The test was carried out with full view over the network, in order to identify all possible attack vectors. There were multiple vulnerabilities discovered, which together would enable a malicious attacker to obtain sensitive information concerning cadets, and potentially gain access to the MOD WESTMINSTER system. These vulnerabilities have been drawn together below to illustrate a potential attacker s route into this system. Obtain WiFi Password via WPS Vulnerability & Connect to network Setup Man-in-themiddle attack to listen for passwords Retrieve all data from open Management and Training SMB Shares Crack weak Kerberos passwords Intercept email passwords Install malware on target machine Exfiltrate sensitive information /WESTMINSTER Login

2. Contents 1. Executive Summary... 1 2. Contents... 2 3. Testing Methodology... 3 3.1. Legal & NDA... 3 3.2. Methodology... 3 3.3. Scope... 3 3.4. Client Data Destruction Policy... 3 4. Vulnerabilities Discovered... 4 4.1. SMB Shares open on SERVERA CRITICAL... 4 4.2. WPS Enabled on Wireless Router CRITICAL... 4 4.3. Weak Passwords - HIGH... 4 4.4. Vulnerability to Targeted Attack MEDIUM... 5 5. Network Security Overview... 6 5.1. Network Enumeration... 6 5.2. Website... 6 6. Project Staff... 7 7. Appendices... 7 7.1. Nmap Scan results... 7 7.2. Nessus Scan Results... 7

3. Testing Methodology 3.1. Legal & NDA This test was carried out with the express permission of xxxxxxx at xxxxxxx, following a previously agreed upon testing procedure. In this instance, a waiver form was not signed before testing commenced, due to the nonintrusive nature of the testing. 3.2. Methodology This test was carried out as a White-Box security assessment. In this mode of testing, the tester(s) have complete visibility and prior awareness of all devices on a target network. Rather than attempting to mimic an attacker, the focus is on determining the security vulnerabilities present in the network. 3.3. Scope All devices connected to the CLIENT network were in-scope, including the hosted xxxxxxx website. 3.4. Client Data Destruction Policy Any data retained for use in generating this report has been destroyed by secure deletion. As there was/is no material above UK SECRET on the network, this fulfils the data destruction requirements.

4. Vulnerabilities Discovered 4.1. SMB Shares open on SERVERA CRITICAL Whilst enumerating the network shares, it was discovered that a number of network shares on the SERVERA Domain Controller (192.168.1.119) were world accessible. This means that any device with network access was able to read and write to these shares. The shares included the Training Officer and Management shares. Both of these shares contained highly sensitive personal information of both xxxxxxx and staff, in addition to sensitive financial information. Due to the low technical complexity of the attack, and the serious nature of compromise, this has been rated Critical. Mitigation: Limit access to sensitive SMB Shares 4.2. WPS Enabled on Wireless Router CRITICAL A survey of the wireless networks was conducted using the aircrack-ng suite of 802.11 assessment tools. The Sea Cadets wireless network was found to use WPA2 Encryption, with a complex password. However, it also had the WPS (Wi-fi protected Setup) mode enabled. This mode allows devices to be given the wireless password when a button on the router is pressed at the same time as one on the device to be paired. However, there is a vulnerability in the system which allows the WPA2 network password to be obtained (and changed) by a malicious attacker. This would then grant the attacker access to the network. 1 This attack has a moderate technical complexity, but very serious consequences. It is therefore rated Critical. Mitigation: Disable WPS on the router management interface 4.3. Weak Passwords - HIGH Each workstation on the network uses the Kerberos authentication method to log onto the primary domain controller. This allows users to log onto different workstations, but keep their documents and settings. With network access obtained, a man in the middle attack was conducted between a workstation and the domain controller using the tool Cain. This allows the attacker to sit between both endpoints of a connection, and listen to all of the traffic that passes over it. The system administrator then logged a user onto the workstation, and the resulting password hash was then sniffed. 1 http://www.us-cert.gov/ncas/alerts/ta12-006a

Figure 1 - Intercepted Password hashes The current configuration uses a SHA-1 Kerberos hashing implementation, which greatly slows the rate at which passwords can be discovered However, the password in this instance was password. This was guessed by the tool John the Ripper within 0.306 seconds. Due to the very serious nature of this compromise, this attack is rated High. Mitigation: Use more complex passwords and install ARP monitoring tools 4.4. Vulnerability to Targeted Attack MEDIUM A common attack method in use by advanced threats is the use of phishing emails. These emails are sent to recipients containing some form of malware, or malicious attachment. When this is downloaded or run, the resulting infected workstation is then used to steal intellectual property, financial data or sensitive information. This scenario was tested through use of the xxxxxxx email address. A set of malicious emails was sent, and then different configurations of anti-virus tried. As the xxxxxxx generally has a low threat profile, serious by-pass of the anti-virus protection was not attempted. However, the anti-virus can be disabled by the user. This means that malicious payloads can be run by the user (accidentally or otherwise). This led to successful compromise of the administrator endpoint, leading to compromise of sensitive personal information of cadets. This attack could also be leveraged from inside the organisation (e.g. a cadet running a malicious program on the network). The implant used for this attack was capable of monitoring all keystrokes on the workstation, intercepting passwords for logins, and even capturing microphone audio. Figure 2 - Compromised administrator workstation Mitigation: User training on dangerous emails, ensure Anti-Virus is always enabled.

Network Security Overview 4.5. Network Enumeration The Devices on the network were enumerated using the scanning tool NMap. This generated a list of devices, and their open ports. This was then given to the vulnerability scanning tool Nessus, which determined whether or not there were vulnerable versions of software running on the devices. There were no serious vulnerabilities discovered in this manner. The IP Addresses, and their functions, are listed below. I.P. Address Hardware Device Device Function 192.168.1.1 Netgear Router Primary Traffic Router 192.168.1.3 D-Link Router Wireless access point 192.168.1.33 AsusTek Desktop (Windows) Office/Admin computer 192.168.1.36 HP Desktop (Windows) Office/Admin computer 192.168.1.119 HP Server (Windows) - SERVERA Domain Controller / web Server 192.168.1.120 HP Server (Windows) - SERVERB Backup Domain Controller / Server 4.6. Website The website in use currently (xxxxxxxxxxxxxxx) is hosted on a server run on the main internal network. Ordinarily, this might provide a security risk, allowing attackers to gain access to the internal network via the internet. However, the website consists only of static HTML pages, and the web server software is currently up to date. In this configuration, there is very little risk.

5. Project Staff This section details all of the personnel who were employed on the project, their clearances and qualifications. Project Lead: Joseph Greenwood Security Clearance: xxxxxxxxxx Certifications: CREST Registered Tester, 7Safe CSIS/CMI/CFIP, Security+. 6. Appendices 6.1. Nmap Scan results 6.2. Nessus Scan Results