Homework: Penetration Test Engagement In this activity, you will play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO’s workstation....

1 answer below »

Homework: Penetration Test Engagement


In this activity, you will play the role of an independent penetration tester hired by GoodCorp Inc. to perform security tests against their CEO’s workstation.




  • The CEO claims to have passwords that are long and complex and therefore unhackable.




  • You are tasked with gaining access to the CEO's computer and using a Meterpreter session to search for two files that contain the strings
    recipe
    and
    seceretfile.




  • The deliverable for this engagement will be in the form of a report labeled
    Report.docx.





Setup



  • Before you begin, we'll need to start the Icecast server to emulate the CEO's computer.

    • Log onto the DVW10 machine (credentials
      IEUser:Passw0rd!) and wait for the Icecast application to popup.

    • Then click
      Start Server.





Reminders




  • A penetration tester's job is not just to gain access and find a file. Pentesters need to find all vulnerabilities, and document and report them to the client. It's quite possible that the CEO's workstation has multiple vulnerabilities.




  • If a specific exploit doesn't work, that doesn't necessarily mean that the target service isn't vulnerable. It's possible that something could be wrong with the exploit script itself. Remember, not all exploit scripts are right for every situation.





Scope




  • The scope of this engagement is limited to the CEO's workstation only. You are not permitted to scan any other IP addresses or exploit anything other than the CEO's IP address.




  • The CEO has a busy schedule and cannot have the computer offline for an extended period of time. Therefore, denial of service and brute force attacks are prohibited.




  • After you gain access to the CEO’s computer, you may read and access any file, but you cannot delete them. Nor are you allowed to make any configurations changes to the computer.




  • Since you've already been provided access to the network, OSINT won't be necessary.





Lab Environment


For this week's homework, please use the following VM setup:



  • Attacking machine: Kali Linux
    root:toor

  • Target machine: DVW10
    IEUser:Passw0rd!



NOTE: You will need to login to the
DVW10
VM and start the
icecast
service prior to beginning this activity using the following procedure:



  • After logging into DVW10, type "icecast" in the Cortana search box and hit
    Enter.

  • The icecast application will launch.

  • Click on
    Start Server.

  • You are now ready to being the activity.



Deliverable


Once you complete this assignment, submit your findings in the following document:



  • Report.docx



Instructions


You've been provided full access to the network and are getting ping responses from the CEO’s workstation.




  1. Perform a service and version scan using Nmap to determine which services are up and running:




    • Run the Nmap command that performs a service and version scan against the target.



      Answer:







  2. From the previous step, we see that the Icecast service is running. Let's start by attacking that service. Search for any Icecast exploits:




    • Run the SearchSploit commands to show available Icecast exploits.



      Answer:







  3. Now that we know which exploits are available to us, let's start Metasploit:




    • Run the command that starts Metasploit:



      Answer:







  4. Search for the Icecast module and load it for use.




    • Run the command to search for the Icecast module:



      Answer:





    • Run the command to use the Icecast module:



      Note:
      Instead of copying the entire path to the module, you can use the number in front of it.



      Answer:







  5. Set the
    RHOST
    to the target machine.




    • Run the command that sets the
      RHOST:



      Answer:







  6. Run the Icecast exploit.




    • Run the command that runs the Icecast exploit.



      Answer:





    • Run the command that performs a search for the
      secretfile.txt
      on the target.



      Answer:







  7. You should now have a Meterpreter session open.




    • Run the command to performs a search for the
      recipe.txt
      on the target:



      Answer:






    • Bonus: Run the command that exfiltrates the
      recipe*.txt
      file:



      Answer:







  8. You can also use Meterpreter's local exploit suggester to find possible exploits.




    • Note:
      The exploit suggester is just that: a suggestion. Keep in mind that the listed suggestions may not include all available exploits.





Bonus


A. Run a Meterpreter post script that enumerates all logged on users.



Answer:



B. Open a Meterpreter shell and gather system information for the target.



Answer:



C. Run the command that displays the target's computer system information:



Answer:


Answered 161 days AfterAug 06, 2021

Answer To: Homework: Penetration Test Engagement In this activity, you will play the role of an independent...

Karthi answered on Jan 15 2022
108 Votes
1.0 High-Level Summary
GoodSecurity was tasked with performing an internal penetration test on GoodCorp’s CEO, Hans Gruber. An internal penetration test is a dedicated attack against internally connec
ted systems. The focus of this test is to perform attacks, similar to those of a hacker and attempt to infiltrate Hans’ computer and determine if it is at risk. GoodSecurity’s overall objective was to exploit any vulnerable software and find the secret recipe file on Hans’ computer, while reporting the findings back to GoodCorp.
When performing the internal penetration test, there were several alarming vulnerabilities that were
identified on Hans’ desktop. When performing the attacks, GoodSecurity was able to gain access to his machine and find the secret recipe file by exploit two programs that had major vulnerabilities. The details of the attack can be found in the ‘Findings’ category.
2.0 Findings
Machine IP:
192.168.0.20
Hostname:
MSEDGEWIN10
Vulnerability Exploited:
exploit/windows/http/icecast_header
Vulnerability Explanation:
The icecast_header module is a buffer overflow attack.
This attack occurs when the Icecast program version 2.0.1 and earlier is executed which allows an attacker to send excessive HTTP headers (at least 32) causing a buffer overflow. This gives an attacker access privilege to execute any code on the remote web server.
Severity:
The severity of this Icecast vulnerability is very high. As mentioned previously, not only can an attacker execute arbitrary code, they can maneuver within the network, elevate their privileges to execute code or processes. Another vulnerability is a denial of service (DoS) attack which can cause a network to crash.
NOTE: We have found two other possible vulnerabilities that should be looked into.
The ‘ikeext_service’ exploit which affects the Windows Dynamic link library (DLL) specifically the IKEEXT (IKE and AuthIP IPsec Keying Modules) that allows an attacker to add malicious code into an application.
The...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here