Network Penetration Test Project Summary
Introduction
For this project I conducted a network penetration test for Example Corpo to evaluate their internal security posture. The assessment was carried out over a period of twelve days and focused on identifying and exploiting vulnerabilities within their network. Click here to view: Pen Test Report Project
Assessment Overview
The penetration test aimed to simulate the actions of an attacker within the internal network. This involved scanning for vulnerabilities, exploiting identified weaknesses, and assessing the impact of potential attacks. The key phases of the test included planning, discovery, attack, and reporting.
Key Findings
During the assessment, several critical and high-severity vulnerabilities were identified:
vsftpd 2.3.4 Backdoor (Critical)
- An FTP server running vsftpd version 2.3.4 was found with a backdoor vulnerability. This allowed unauthorized access to the system.
FTP Weak Passwords (Critical)
- Weak passwords were identified on the FTP server, making it susceptible to brute-force attacks. Using a tool called Hydra, the username "msfadmin" and its weak password were discovered.
SMB Vulnerabilities (Critical)
- The EternalBlue exploit was used to gain a reverse shell, providing unauthorized access to the system.
WebDAV Misconfiguration (Critical)
- The WebDAV service allowed unauthorized file uploads, enabling the upload of a PHP web shell that could execute commands remotely.
SMTP User Enumeration (High)
- The SMTP server was vulnerable to user enumeration via the VRFY command, allowing attackers to verify valid usernames for further attacks.
Recommendations
To mitigate these vulnerabilities, the following actions were recommended:
Upgrade vsftpd
- Upgrade to the latest version and restrict access to trusted users. Regularly monitor server logs for suspicious activity.
Enforce Strong Password Policies
- Implement complex password requirements and account lockout mechanisms. Regularly review access logs for suspicious login attempts.
Patch and Update Systems
- Update and patch all systems, disable SMBv1, and use SMBv2 or SMBv3. Implement network segmentation and monitor SMB traffic.
Secure WebDAV
- Disable WebDAV if not needed, or restrict access to trusted IPs and require authentication. Conduct regular security audits.
Harden SMTP
- Disable the VRFY command, use secure authentication methods, and implement rate limiting. Regularly monitor and audit SMTP logs.
Conclusion
The penetration test provided valuable insights into Example Corpo's internal security posture, identifying critical areas for improvement. By addressing the identified vulnerabilities and implementing the recommended security measures, Example Corpo can significantly enhance their security posture and reduce the risk of successful attacks. Regular security assessments and updates are crucial to maintaining a robust defense against evolving threats.
