In multi-tier network systems, custom applications, Web services and platform environments, storing data and information assets becomes a challenge for any organisation. Although there are different methods to secure network systems, the best way to test the level of security is to conduct penetration testing. In this paper, we describe how we performed live penetration testing for a particular network, namely, 192.168.3.0/24 (Case Study) by identifying the system vulnerabilities to enable its penetration. After compromising the system, critical data (Flags) must be found, indicating our successful penetration. As professional penetration testers, we used an arsenal of penetration testing tools utilised by malicious actors on the internet, such as Nmap, Nessus, Sparta and Metasploit, etc. Typically, much effort was employed on reconnaissance & scanning phases, rather than system exploration, due to their importance in identifying security vulnerabilities in the system environment. The vulnerability analysis highlighted the most critical threats, which token is an advantage to gain access, namely, FTP services, HTTP, and human errors. However, comprising the system is not sufficient because the critical data (Flag) generally requires the administrators rights. Consequently, teams often examine the system to find a way to escalate privilege to the root level. Furthermore, some critical data (Flags) require decryption algorithms or the analysis of captured packets to make them readable. We found eight Flags and identified a system security breach. Mitigation strategies addressing the identified vulnerabilities are recommended to ensure the given networks are secured against future attacks.
翻译:在多层网络系统中,定制应用程序、网络服务和平台环境,储存数据和信息资产成为任何组织的挑战。虽然有不同的方法来保障网络系统的安全,但测试安全程度的最佳方式是进行渗透测试。在本文中,我们描述了我们如何对特定网络进行现场渗透测试,即192.168.3.0.04(案例研究),通过查明系统脆弱性使其渗透到系统环境中。在损害系统后,必须找到关键数据(炉子),表明我们的渗透成功。作为专业渗透测试者,我们使用互联网上恶意行为者使用的渗透测试工具库,例如Nmap、Nessus、Sparta和Metasploit等。一般情况下,在侦察和扫描阶段,而不是系统探索方面做了大量努力,因为它们对于查明系统在系统环境中的安全脆弱性以利渗透非常重要。脆弱性分析突出了最关键的威胁,即FTP服务、HTTP以及人性错误。然而,由于关键数据系统(Flag)针对未来袭击的升级,我们通常需要从安全级别分析系统(F)到底压水平。因此,数据团队往往需要从安全等级分析。因此,找到一些安全等级系统(我们所认定的升级到底值)系统。