Assignment 8
Assignment 8
This report documents the network enumeration conducted on the system with IP address 192.168.11.135
using SMBClient. The enumeration aims to identify shared resources (directories, files, etc.), user accounts,
and any potential risks associated with exposed resources. The system being analyzed is part of a
workgroup named WORKGROUP, and the enumeration was conducted using the guest account. Additionally,
an analysis of vulnerabilities in network protocols will be performed using Wireshark to detect potential
security weaknesses.
Potential Risks:
• Sensitive Configuration Data: Access to directories like etc and var might expose critical
system configurations, including network settings, passwords, or application configurations.
• Web Server Root Access: The apache and tomcat shares provide access to the web server
root directories, which could allow reading or modification of web content or configuration
files, potentially exposing vulnerabilities.
• General Shared Resources: Misconfigured file permissions or weak guest access can
result in sensitive data being exposed, especially in directories like var, usr, and owaspbwa.
• 3. Protocol Vulnerability Analysis Using Wireshark
Wireshark was used to capture and analyze SMB traffic to assess the security of the protocol in use.
This section highlights the vulnerabilities associated with the SMB protocol and demonstrates how
Wireshark can be employed to identify them.
1. Disable SMBv1:
o Ensure the server is configured to use SMBv2 or SMBv3 only, as these versions offer
improved security features such as encryption and signing, making them more resilient
against attacks like EternalBlue.
2. Restrict Guest Access:
o Disable guest access if it is not required. Alternatively, ensure guest users have extremely
limited access and cannot view sensitive shares like system directories (/etc, /var) or
application root folders (apache, tomcat).
3. Audit Shared Directories:
o Review the permissions and contents of shared directories to ensure they are not leaking
sensitive information to unauthorized users. Ensure that only authenticated and authorized
users can access critical directories.
4. Monitor and Log SMB Traffic:
o Continuously monitor and log SMB traffic to identify any unauthorized access attempts.
Reviewing logs for abnormal access patterns can help detect potential intrusions or misuse.