1.3 Target Systems

advertisement
BBT INC.
Vulnerability Assessment &Penetration Test Report
Eric Gibson Jr
Joseph Pavlik
Rajani Gunda
R.E.J.
4/26/2012
Table of Contents
1 - EXECUTIVE SUMMARY
1.1 - Project Objective
1.2 - Scope
1.3 - Target Systems
1.4 - Network Testing Methodology
1.5 - Tools
1.6 - Network Diagram
1.7 - Network Diagram (DNS Resolution)
1.8 - Network Vulnerability Assessment (Authenticated)
1.9 - Network Vulnerability Assessment (Unauthenticated)
3
3
4
4
5
5
6
7
8
8
2 - FINDINGS
2.1 - 70.61.60.122
2.1.1 - Target Analysis
2.1.2 - Vulnerabilities
2.2 - 70.61.60.125
2.2.1 - Target Analysis
2.2.2 - Vulnerabilities
2.3 - 70.61.60.123
2.3.1 - Target Analysis
2.3.2 - Vulnerabilities
2.4 - 70.61.60.124
2.4.1 - Target Analysis
2.4.2 - Vulnerabilities
2.5 - 70.61.60.126
2.5.1 - Target Analysis
2.5.2 - Vulnerabilities
9
9
10-11
10-11
12
12
13
13
14
14
3 - RECOMMENDATIONS
3.1 - Software
3.2 - 70.61.60.122
3.3 - 70.61.60.125
15
16
16-17
4 - CONCLUSION
18
5 - PENETRATION TESTING LOG
19-20
R.E.J. | BBT Penetration Test 2012
2
1.0 - Executive Summary
BBT, Inc. requested the services of R.E.J to conduct their bi-annual penetration testing.
This executive summary contains the results of the PENTEST that was performed
during the time period of April 5th 2012 through May 1st of 2012.
This report contains confidential information surrounding the amount of security risk
within the BBT, Inc. network infrastructure.
At the request of BBT Inc., R.E.J analysts have conducted authorized reconnaissance,
network mapping and vulnerability testing in an effort to report findings to BBT, Inc. The
results are intended to be an overall assessment of the conditions at the time of testing
and do not necessarily reflect current conditions.
1.1 Project Objective
The objective of BBT Inc.’s network assessment is to determine the overall security of
the network by analyzing all IPs given to R.E.J analysts. For testing, R.E.J analyst
performed a number of tests as authenticated users (with log-in supplied credentials),
as well as unauthenticated users.
R.E.J. | BBT Penetration Test 2012
3
1.2 Scope
Attack Systems
Description
IP Address
Target Environment
(include any 3rd party systems/networks – written permission must have been obtained in advance by the
target organization)
Description
IP Address(es)
Scan?
70.61.60.122-126
Yes
Assessment Type
Will any part of the assessment be performed against a live production
environment?
Assessment Timeline
List any black-out dates or times.
Is this a “black box” vulnerability scan
If not, what are the approved login credentials for an authenticated scan?
YES
May 1st 2012
April 3rd 2012
April 4rd 2012
NO - Greybox
Both (ask on April 17th)
Local Admin accounts
Testing Techniques
Ping sweep of network ranges
Dangerous/Unsafe checks allowed
Internal reconnaissance activities requested
External reconnaissance activities requested
YES
YES
YES
YES
Governance
What is the policy regarding viewing data (including
Notify of any sensitive information found.
potentially sensitive/confidential data)?
Will target organization personnel observe the testing
NO
team?
1.3 Target Systems
Target Environment
(include any 3rd party systems/networks – written permission must have been obtained in advance by the
target organization)
Description
IP Address(es)
Scan?
70.61.60.122
Yes
70.61.60.123
Yes
70.61.60.124
Yes
70.61.60.125
Yes
70.61.60.126
Yes
R.E.J. | BBT Penetration Test 2012
4
1.4 Network Testing Methodology





Conduct reconnaissance
Scanning & enumeration
Identify all points of access within the network infrastructure
Report findings
Present recommendations
The following diagram illustrates the process used for performing the network assessment:
1.5 Tools
Activity
Port Scanning & Footprinting
Web Application Enumeration
Vulnerability Assessment
Network Penetration Test
Vulnerability Research & Verification
Tool
Nmap, Netcat, google
Nessus, Qualys
HydraGTK, Metasploit, Cain & Abel, Medusa
www.metasploit.com, cve.miter.org, www.uscert.gov
R.E.J. | BBT Penetration Test 2012
5
1.6 Network Diagram
R.E.J. | BBT Penetration Test 2012
6
1.7
Network Diagram (DNS Resolution)
R.E.J. | BBT Penetration Test 2012
7
1.8 Network Vulnerability Assessment - Authenticated
Qualys Application Scan
 7 Application Vulnerabilities
1.9 Network Vulnerability Assessment - Unauthenticated
1.9 Network Vulnerability Assessment - Unauthenticated
Nessus Network Scan




1 Critical vulnerability was discovered
1 High vulnerability was discovered
3 Medium vulnerabilities were discovered
1 Low vulnerability was discovered
R.E.J. | BBT Penetration Test 2012
8
2.0 - FINDINGS
2.1 Target IP: 70.61.60.122
Operating System: Linux (Backtrack)
Total Open Ports: 9
Port
22
111
21
25
80
111
143
443
8080
Protocol
tcp
tcp
tcp
tcp
tcp
udp
tcp
tcp
tcp
Service Name
ssh
rpc-portmapper
ftp
smtp
www
rpc-portmapper
imap
https
www
Attacks Attempted
HydraGTK: Brute force attack used to gain access to the ssh server. This program uses a
password list to guess the username and password and manually tries
combinations to gain access to the machine. Our attempts were unsuccessful.
Medusa:
Another brute force attack used to gain access to the ssh server. This program also
uses a password list to guess the username and password and manually tries
combinations to gain access to the machine. Our attempts were unsuccessful.
DoS Attack: We were able to find a Denial of Service Exploit that coincided with the version
of OpenSSH this server was running. This exploit was called “OpenSSH <= 4.3
p1 (Duplicate Block) Remote Denial of Service Exploit.” Our attempts were
questionable. We received a IP “cookie” but were unclear of the next steps.
Vulnerabilities
Port 22
Synopsis: The remote service offers an insecure cryptographic protocol.
Description: The remote SSH daemon supports connections made using the
version 1.33 and/or 1.5 of the SSH protocol.
Risk Factor: Medium
Port 22
Synopsis: The remote service uses the default username for authentication.
Description: The remote service utilizes the default username ‘root’ for
authentication. A remote user can login as the root user to the SSH server.
Risk Factor: Medium
R.E.J. | BBT Penetration Test 2012
9
2.2 Target IP: 70.61.60.125
Operating System: Windows
Total Open Ports: 4
Port
3389
5000
69
123
Protocol
tcp
tcp
udp
udp
Service Name
msrdp
www
tftp
ntp
Attacks Attempted
MS12-020:
We attempted to exploit the recently discovered vulnerability in Microsoft RDP
using RDPKill and a python script found in the Exploit Database. Exploit
appeared successful. We could not connect to the server after running the attack.
Server may have gone down or denied access to us at that point.
Vulnerabilities
Port 69
Synopsis: The remote host has probably been compromised. Description:
A TFTP server is running on this port. However, while trying to
fetch "/etc/passwd", we got an MS executable file. Many worms are known to
propagate through TFTP. This is probably a backdoor.
Port 3389
Risk Factor: Critical
Synopsis: The remote Windows host could allow arbitrary code execution.
Description: Arbitrary remote code vulnerability exists in the implementation
of the Remote Desktop Protocol (RDP) on the remote Windows host. The
vulnerability is due to the way that RDP accesses an object in memory that has
been improperly initialized or has been deleted. If RDP has been enabled on the
affected system, an unauthenticated, remote attacker could leverage this
vulnerability to cause the system to execute arbitrary code by sending a sequence
of specially crafted RDP packets to it. This plugin also checks for a denial of
service vulnerability in Microsoft Terminal Server.
Note that this script does not
detect the vulnerability if the 'Allow connections only from computers running
Remote Desktop with Network Level Authentication' setting is enabled or the
security layer is set to 'SSL (TLS 1.0)' on the remote host.
Risk Factor: High
Port 3389
Synopsis: It may be possible to get access to the remote host.
Description: The remote version of the Remote Desktop Protocol Server
(Terminal Service) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP
client makes no effort to validate the identity of the server when setting up
R.E.J. | BBT Penetration Test 2012
10
encryption. An attacker with the ability to intercept traffic from the RDP server
can establish encryption with the client and server without being detected. A
MiTM attack of this nature would allow the attacker to obtain any sensitive
information transmitted, including authentication credentials. This flaw exists
because the RDP server stores a hardcoded RSA private key in the mstlsapi.dll
library. Any local user with access to this file (on any Windows system) can
retrieve the key and use it for this attack.
Risk Factor: Medium
Port 3389
Port 3389
Synopsis: The remote host is using weak cryptography.
Description: The remote Terminal Services service is not configured to use
strong cryptography. Using weak cryptography with this service may allow an
attacker to eavesdrop on the communications more easily and obtain screenshots
and/or keystrokes.
Risk Factor: Medium
Synopsis: The remote host is not FIPS-140 compliant.
Description: The encryption setting used by the remote Terminal Services service
is not FIPS-140 compliant.
Risk Factor: Low
Software Vulnerabilities (Authenticated Scan)
Windows Firewall – Disabled
Windows XP Professional Service Pack 1 - Support retired
Internet Explorer 6.0.2800.1106 – Insecure Version
Adobe Flash Player 10.0.22.87 – Insecure Version
Adobe Reader 9.3.0.148 – Insecure Version
Windows Media Player 9.0.0.2980 – Insecure Version
Apple QuickTime 6.5.1.0 – Insecure Version
R.E.J. | BBT Penetration Test 2012
11
2.3 Target IP: 70.61.60.123
Operating System: N/A
Total Open Ports: 5
Port
25
80
143
443
8080
Protocol
tcp
tcp
tcp
tcp
tcp
Service Name
smtp
http
imap
https
www
Vulnerabilities
N/A
R.E.J. | BBT Penetration Test 2012
12
2.4 Target IP: 70.61.60.124
Operating System: N/A
Total Open Ports: 6
Port
21
25
80
143
443
110
Protocol
tcp
tcp
tcp
tcp
tcp
tcp
Service Name
ftp
smtp
http
imap
https
pop3
Vulnerabilities
N/A
R.E.J. | BBT Penetration Test 2012
13
2.5 Target IP: 70.61.60.126
Operating System: N/A
Total Open Ports: 7
Port
21
25
80
110
143
443
8080
Protocol
tcp
tcp
tcp
tcp
tcp
tcp
tcp
Service Name
ftp
smtp
http
pop3
imap
https
http
Attacks Attempted
VNC: At one point during our reconnaissance, we found that a port running VNC was
open. However, after returning to the server we could not get consistent nMap
scans because the server appeared to go down several times. Need to
investigate more at a future time to establish which VNC service was running.
We have several exploits waiting to run pending more information.
Vulnerabilities
N/A
R.E.J. | BBT Penetration Test 2012
14
3.0 - RECOMMENDATIONS
Software Recommendations
During target analysis of host 70.61.60.126, there were a number of applications that
pose a risk to the machine and could make it possible for an attacker to compromise the
host via the insecure application. Below is a list of the unsecure applications complete
with recommendations on how to resolve each issue.
Windows Firewall – Disabled
Enable the Windows firewall on the host machine.
Windows XP Professional Service Pack 1 - Support retired
Install Windows 7 and perform all MS required updates.
Internet Explorer 6.0.2800.1106 – Insecure Version
Upgrade IE browser to latest compatible version which is 9.0
Adobe Flash Player 10.0.22.87 – Insecure Version
Upgrade to the latest Flash Player version which is 11.2
Adobe Reader 9.3.0.148 – Insecure Version
Upgrade to latest Adobe Reader X version 10.1.2
Windows Media Player 9.0.0.2980 – Insecure Version
Upgrade to latest Windows Media Player which is version 12.0
Apple QuickTime 6.5.1.0 – Insecure Version
Upgrade to latest QuickTime version which is 7.7.1
R.E.J. | BBT Penetration Test 2012
15
Host-Specific Recommendations
Target IP: 70.61.60.122
Port- 22: Medium
Attack: The remote service offers an insecure and cryptographic protocol.
Recommendation: Disable compatibility with version 1 of the protocol.
Port- 22: Medium
Attack: The remote service utilizes the default username ‘root’ for authentication. A
remote user can login as the root user to the SSH server.
Recommendation: Many brute force attacks use the ‘root’ username to try and gain
access to the target host machine. Disable remote login as the root user. Before
disabling this option, you may want to setup another account with root privileges.
Target IP: 70.61.60.125
Port-69: Critical
Attack: The remote host is compromised. TFTP Backdoor detection.
Recommendation: TFTP uses UDP on port 69, and since TFTP is insecure and should
never be used across the internet anyway that’s compelling reason to block egressing
UDP traffic on that port.
Port- 3389: High
Attack: The remote windows host could allow arbitrary code execution.
Recommendation: Apply appropriate patches provided by Microsoft to vulnerable
systems immediately after appropriate testing. Block the TCP port 3389 at the network
perimeter.
Disable the Terminal Services, Remote Desktop, Remote Assistance, and Windows
Small Business Server 2003 Remote Web Workplace features if not required.
Enable Network Level authentication on systems running supported version of
Windows, Vista, Windows 7, Windows Server 2008 and Windows Server 2008 and
Windows Server R2.
Port-3389:Medium
Attack: The remote host is using weak cryptography. Terminal Services Encryption level
is medium.
Recommendation: Administrator of windows 2000 servers and Windows XP servers who
have enabled the Remote desktop should apply the Patch. Block port 3389 at the
firewall would be protected against this attack.
Port -3389: Medium
Attack: It may be possible to get access to the remote host.
Recommendation: Force the use of SSL as a transport layer for this service if supported,
or/and select the Allow connections only from computers running Remote Desktop with
Network Level Authentication setting if it is available.
R.E.J. | BBT Penetration Test 2012
16
Port -3389: Low
Attack: The remote host is not FIPS-140 compliant.
Recommendation: Change RDP encryption level:
to 4 FIPS compliant.
R.E.J. | BBT Penetration Test 2012
17
4.0 - Conclusion
Outlined above you will see several security issues that could have devastating impacts
for your company, if exploited. A few of the risks are critical and severe; these should be
addressed in a timely manner. Other risks are not as severe, but should be looked into
none the less. If the issues are confronted, your company should see a substantial
increase in security.
That said, an organization’s information and confidentiality is imparity to its success and
survival. Several policies should to put into place to maintain your company’s data
integrity and security. Security flaws will continue to develop as exploits are discovered.
With this, your company should continue to make improvements and policies to address
future issues.
We have enjoyed working with BBT evaluate your information technology security. If
there should be any questions or you require further information, please contact any of
the agents that worked with your company.
R.E.J. | BBT Penetration Test 2012
18
5.0 – Penetration Testing Log
Target
Date
Attempt
result
Other Information
Analyst
70.61.60.122
70.61.60.123
70.61.60.124
5-Apr Nessus Scan
5-Apr Nessus Scan
5-Apr Nessus Scan
Host Up
Host Down
Host Down
9 Ports up Vulnerabilities found
5 Ports up
6 Ports up
EGJ
EGJ
EGJ
70.61.60.125
5-Apr Nessus Scan
Host Up
4 Ports up Vulnerabilities found
EGJ
70.61.60.126
70.61.60.122
70.61.60.123
70.61.60.124
70.61.60.125
70.61.60.126
5-Apr
5-Apr
5-Apr
5-Apr
5-Apr
5-Apr
Host Up
Host Up
Host Down
Host Down
Host Up
Host Up
70.61.60.122
Nessus Scan
Nmap Scan
Nmap Scan
Nmap Scan
Nmap Scan
Nmap Scan
HydraGTK Brute
10-Apr Force Attack
70.61.60.122
70.61.60.123
70.61.60.124
10-Apr Nessus Scan
10-Apr Nessus Scan
10-Apr Nessus Scan
Host Up
Host Down
Host Down
70.61.60.125
10-Apr Nessus Scan
Host Up
70.61.60.126
70.61.60.122
70.61.60.123
70.61.60.124
70.61.60.125
70.61.60.126
10-Apr
10-Apr
10-Apr
10-Apr
10-Apr
10-Apr
Host Up
Host Up
Host Down
Host Down
Host Up
Host Up
7 Ports up Vulnerabilities found
9 Ports up
5 Ports up
6 Ports up
4 Ports up
7 Ports up
need to put together a
better password list file
9 Ports up Vulnerabilities found
5 Ports up
6 Ports up
4 Ports up Vulnerabilities found
7 Ports up Vulnerabilities found
9 Ports up
5 Ports up
6 Ports up
4 Ports up
7 Ports up
70.61.60.122
17-Apr RDPKill Exploit
Successful
Can no longer connect
to server
70.61.60.122
70.61.60.125
70.61.60.125
70.61.60.122
70.61.60.122
70.61.60.123
70.61.60.124
17-Apr
17-Apr
24-Apr
24-Apr
24-Apr
24-Apr
24-Apr
Nessus Scan
Nmap Scan
Nmap Scan
Nmap Scan
Nmap Scan
Nmap Scan
Medusa Brute Force
Attack
Qualys Scan
Cain & Abel Exploit
DoS Exploit
Nessus Scan
Nessus Scan
Nessus Scan
R.E.J. | BBT Penetration Test 2012
Unsuccessful
Unsuccessful
Successful
Unsuccessful
Unsuccessful
Successful
Successful
Successful
Used new password list
7 Vulnerabilities found
Next steps unknown
Final scan - 9 ports up
Final scan - 5 ports up
Final scan - 6 ports up
EGJ
EGJ
EGJ
EGJ
EGJ
EGJ
EGJ, JP, RG
RG
RG
RG
RG
RG
RG
RG
RG
EGJ
EGJ
JP
EGJ
EGJ
JP
JP
EGJ, RG
EGJ, RG
EGJ, RG
19
70.61.60.125
70.61.60.126
24-Apr Nessus Scan
24-Apr Nessus Scan
R.E.J. | BBT Penetration Test 2012
Successful
Successful
Final scan - 4 ports up
Final scan - 7 ports up
EGJ, RG
EGJ, RG
20
Download