scs file (2)
scs file (2)
A traditional penetration test has become more commonly used for regularly test
security systems and processes and maintain a policy that addresses information
security for all personnel. In this category of assessments, security analysts have to
go beyond the minimum-security requirements that are designed to actually improve
the overall security of the system.
Each group will use the Metasploitable 2 VM and Windows 10 in the Apporto and
attack machine (Machine being used for the pen testing and vulnerability
assessment) should be the Kali. Every student will be assigned a group.
There is an allocation for each student. This can be seen in the excel sheet on
Teams.
VM Allocation
Group 1 – Brainpan
Group 2 – Kioptrix
Group 3 – NullByte
Group 4 – pWnOS
(We have to use any one of the four)
1
4 Groups
1 - 172.16.1.0 / 24
2 - 172.16.2.0 /24
3 - 172.16.3.0 /24
4 - 172.16.4.0 /24
The objective is to exploit one target machine and provide proof of exploitation.
Stimulate, what would happen if an internal user is compromised, or identify what
would happen if the system under testing is subject to an attack by a malicious
external party. To achieve that you must complete the following tasks:
• Create the Network Topology based on the network block and configure
DHCP
• Perform a passive attack gathering information.
• Perform Network discovery on the target network.
• Conduct a Port scanning on the target, documenting service that are
running, protocols, application version, identify operating system etc.
• Conduct a vulnerability scanning, analysing the results and identify the
risks.
• Leverage identified issues to uncover the worst-case scenario.
• Follow up with validation of the findings through the use of exploits or tests
to eliminate false positives and detect hidden vulnerabilities or false
negatives. This involves exploiting the vulnerabilities discovered.
• Explore the level of access each exploit provides and use increased access
as leverage for additional attacks. Some of the machines may require
multiple exploitation steps, resulting first in low-level local access, and then
in root or administrative as vertical privilege escalation.
• Be able to evaluate and assess the security of a computer system, by
conducting a security assessment.
• Evaluate vulnerabilities and security risks, by attempting a vulnerability
scanning followed by exploitation techniques to identify false positive and
false negative vulnerabilities, and know-how to assess them.
• Analyse systems for security weaknesses and propose mitigating
measures to improve the overall security.
2
3
4