003 Penetration Testing Report
003 Penetration Testing Report
Version: 1.0
Date: 07/08/2014
Prepared by: Eduonix
Classification: Confidential
Document History and Distribution
1. Version History
2. Distribution
CONTENTS
1. INTRODUCTION ........................................................................... ОШИБКА! ЗАКЛАДКА НЕ ОПРЕДЕЛЕНА.
2. TEST ITEMS ............................................................................................................................................................2
3. APPROACH................................................................................................................................................................2
4. ENVIRONMENTAL REQUIREMENTS ..........................................................................................................................2
10. REPORT APPROVALS ...............................................................................................................................................3
i
Software Test Plan
1. SUMMARY
Eudonix has been contracted to perform a penetration test against company X’s inter-company
networks and external web presence. It was determined that their internal network had
minimal possible external access due to strict firewall rules and private networks being non-
internet connected.
1.1 Objectives
The test was conducted in a manner that replicated an attack by a malicious
party attempting to;
All tests were performed within the governance outlined in NIST SP800, ideally
the results of this test will be used to guide company X through future
improvements. All tests were performed with strict acceptance by company X.
While conducting the review, a vulnerability was found in the OpenVPN version
running on one of the companies external servers. After exploiting this
vulnerability, we were able to footprint the entire connected internal network,
as well as gain access to a NFS share holding confidential documents.
We were able to escalate to root privileges on an adjoining wordpress server
used to serve the company intranet. This would place the entire network under
the control of the attackers.
External presence
Entire internal network
1
2. TEST ITEMS
Test plan
VA plan
VA execution
3. APPROACH
Vulnerability analysis was previously conducted on this system, the results of which were taken
into consideration when selecting attack vectors for the target system.
3.1 Resources
Network plan, provided by company X (IP-PLAN.XLS)
3.2 Schedule
Pending completion of tests, schedule is due to end on 13/08/2014, starting on
08/08/2014
4. ENVIRONMENTAL REQUIREMENTS
(Test environment must be segregated from any live system, because of the nature of the
tests they may be intrusive and cause network disruption without warning. Therefore we
cannot guarantee uptime of any service in the same environment during this time.
4.1 Hardware
Rasperry Pi – Acting as proxy
4.2 Software
Kali
Metasploit
Nessus
2
Software Test Plan
4.3 Security
Security will be performed in isolation, requires metasploit framework
community edition.
4.5 Publications
Software test plan
Software test coverage report
Software Pentest report
Software test case raw data
3
There are three areas that need to be addressed as a result of the internal scan:
system hardening, patch management, and user account management. Each one of these areas
should be first addressed at the Corporate Security Policy. Before
procedures can be defined to address the corporate security policies, high-level
solutions will be defined that address each of the three findings. Solution sets will
then be listed and mapped to each finding area.