GithubHelp home page GithubHelp logo

chris-kelleher / pentest_project Goto Github PK

View Code? Open in Web Editor NEW
0.0 1.0 0.0 1.46 MB

A description of a Penetration Test project, including assessments from the Red and Blue team, and a final report.

pentest_project's Introduction

Red Team and Blue Team Penetration Test and Reporting Project

The tactics, techniques, methods and procedures in this repository were used during an authorized penetration test and were compiled into a written report.

This project was split into three phases to provide insight about how an attack may occur, how the incident response team analyzes the logs to discover the attack, and provide a report detailing the attack along with mitigation strategies.

The Red Team phase will cover:

  • Network Discovery
  • OSINT
  • Brute Force Attacks
  • Breaking encryption
  • Researching vulnerabilities
  • Creating and deploying exploits

The Blue Team phase will cover analyzing:

  • Metricbeat log data for operating system metrics
  • Filebeat Log data for folder and file data
  • Packetbeat log data for network traffic

The reporting phase will provide a report summariazing the egagement and providing:

  • The methods and tools used to exploit the vilnerabilities disovered
  • The log data used to discover evidence of the attack
  • Mitigation strategies for hardening the network from future attacks

Network Topology

This is a virtual network created within Microsoft Azure for educational purposes.

This virtual network is depicted below:

The main purpose of this network is to expose a web server to an penetration test and have the ELK machine capture log data for data analysis to gain visibility of the attack vectors. It should be noted that for this project all machines were located on the same subnet.

The configuration details of each machine may be found below.

Name Function IP Address Operating System
Kali Attacker 192.168.1.90 Linux
Capstone Target 192.168.1.105 Windows - Apache
ELK Elk Stack 192.168.1.100 Windows

The attacker machine used was a VM operating with 5.10.0-Kali7-amd64 The target machine used was a VM operating with Windows as an Apache web server. The Elk Stack machine was a VM operating Windows as an Elk Stack server.

The Capstone machine (apache server) was configured with Kibana and utilized the following log data capture agents:

  • Metricbeat
  • Filebeat
  • Packetbeat

Red Team Phase

To gain a picture of the network landscape we first determined our ip address using the command line entry:

  • IP addr provided an IP address of 192.168.1.90/24 as shown with this Screenshot

Nmap was used to perform a scan of the subnet using the command line entry:

  • nmap -sX 192.168.1.0/24 as seen in this Screenshot

With the identification of a web server at 192.168.1.105, firefox was opened and an OSINT investigation found the following page with open sensitive data:

  • This page is viewable in this Screenshot

  • Upon entering the path to the "Secret Folder", we were provided a login page depicted in this Screenshot

A brute force attack was initiated against this page using the hydra tool, with the username "ashton" as discovered by OSINT. The hydra command was hydra -l ashton -P /usr/share/wordlists/rockyou.txt -f -vV http-get://192.168.1.105/company_folders/secret_folder.

Upon entering the credentials and gaining access, we located the following page which provided the user name ryan.

We researched vulnerabilities with WebDav and discovered:

Using msfvenom, we created a PHP payload:

We then logged into to the web server via WebDav:

  • Placing the payload, opening the connection and discovering the flag

Final Report

The Blue Team analysis and the final report can be seen Here

pentest_project's People

Contributors

chris-kelleher avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.