summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authormo khan <mo@mokhan.ca>2016-02-12 08:38:26 -0700
committermo khan <mo@mokhan.ca>2016-02-12 08:38:26 -0700
commit9fc7e6c1cc5754bec8a508102f07a7d569820374 (patch)
treedeb3d4bc7ac7846f24b93deb83f7a8b78a0ba58d
parentfee17d55dc762ac93f95ade689b7616de3cca023 (diff)
complete recon.
-rw-r--r--report/hosts.csv20
-rw-r--r--report/ports.csv64
-rw-r--r--report/template.tex108
3 files changed, 134 insertions, 58 deletions
diff --git a/report/hosts.csv b/report/hosts.csv
index 88fd0c9..9f5d4a7 100644
--- a/report/hosts.csv
+++ b/report/hosts.csv
@@ -1,10 +1,10 @@
-ip address,hostname
-10.2.1.1,metasploitable.sait230.ca
-10.2.1.2,websecdojo.sait230.ca
-10.2.1.3,ultimatelamp.sait230.ca
-10.2.1.4,samurai.sait230.ca
-10.2.1.5,nessus.sait230.ca
-10.2.1.6,tomcat-apache.sait230.ca
-10.2.1.7,dvwa.sait230.ca
-10.2.1.8,bwa.sait230.ca
-10.2.1.30,bt5r3-was.sait230.ca
+ip address,hostname,operating system
+10.2.1.1,metasploitable.sait230.ca,Linux 2.6.x
+10.2.1.2,websecdojo.sait230.ca,Linux 2.6.x
+10.2.1.3,ultimatelamp.sait230.ca,Linux 2.6.x
+10.2.1.4,samurai.sait230.ca,Linux 2.6.x
+10.2.1.5,nessus.sait230.ca,Linux 2.6.x
+10.2.1.6,tomcat-apache.sait230.ca,Linux 2.6.x
+10.2.1.7,dvwa.sait230.ca,Linux 2.6.x
+10.2.1.8,bwa.sait230.ca,Linux 2.6.x
+10.2.1.30,bt5r3-was.sait230.ca,Linux 2.6.x
diff --git a/report/ports.csv b/report/ports.csv
index b77c106..2f4e5eb 100644
--- a/report/ports.csv
+++ b/report/ports.csv
@@ -1,32 +1,32 @@
-HOST,PORT,SERVICE,VERSION
-bwa,139,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP)
-bwa,143,imap,Courier Imapd (released 2008)
-bwa,22,ssh,OpenSSH 5.3p1 Debian 3ubuntu4 (protocol 2.0)
-bwa,445,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP)
-bwa,5001,ovm-manager,Oracle VM Manager
-bwa,8080,http,Apache Tomcat/Coyote JSP engine 1.1
-metasploitable,1099,rmiregistry,GNU Classpath grmiregistry
-metasploitable,111,rpcbind,(rpcbind V2) 2 (rpc 100000)
-metasploitable,139,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP)
-metasploitable,1524,,
-metasploitable,2049,nfs,(nfs V2-4)
-metasploitable,21,ftp,vsftpd 2.3.4
-metasploitable,2121,ftp,ProFTPD 1.3.1
-metasploitable,22,ssh,OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
-metasploitable,23,telnet,Linux telnetd
-metasploitable,25,smtp,Postfix smtpd
-metasploitable,3306,mysql,MySQL 5.0.51a-3ubuntu5
-metasploitable,445,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP)
-metasploitable,512,,
-metasploitable,513,,
-metasploitable,514,tcpwrapped,
-metasploitable,53,domain,ISC BIND 9.4.2
-metasploitable,5432,postgresql,PostgreSQL DB 8.3.0 - 8.3.7
-metasploitable,5900,vnc,VNC (protocol 3.3)
-metasploitable,6000,X11,
-metasploitable,6667,irc,Unreal ircd
-metasploitable,80,http,Apache httpd 2.2.8 ((Ubuntu) DAV/2)
-tomcat-apache,22,ssh,OpenSSH 5.5p1 Debian 6+squeeze2 (protocol 2.0)
-tomcat-apache,443,ssl/http,Apache httpd 2.2.16 ((Debian))
-tomcat-apache,80,http,Apache httpd 2.2.16 ((Debian))
-ultimatelamp,80,http,Apache httpd 2.0.54 ((Ubuntu) PHP/5.0.5-2ubuntu1.2)
+Hostname,IP,PORT,SERVICE,VERSION
+bwa,10.2.1.8,139,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP)
+bwa,10.2.1.8,143,imap,Courier Imapd (released 2008)
+bwa,10.2.1.8,22,ssh,OpenSSH 5.3p1 Debian 3ubuntu4 (protocol 2.0)
+bwa,10.2.1.8,445,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP)
+bwa,10.2.1.8,5001,ovm-manager,Oracle VM Manager
+bwa,10.2.1.8,8080,http,Apache Tomcat/Coyote JSP engine 1.1
+metasploitable,10.2.1.1,1099,rmiregistry,GNU Classpath grmiregistry
+metasploitable,10.2.1.1,111,rpcbind,(rpcbind V2) 2 (rpc 100000)
+metasploitable,10.2.1.1,139,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP)
+metasploitable,10.2.1.1,1524,,
+metasploitable,10.2.1.1,2049,nfs,(nfs V2-4)
+metasploitable,10.2.1.1,21,ftp,vsftpd 2.3.4
+metasploitable,10.2.1.1,2121,ftp,ProFTPD 1.3.1
+metasploitable,10.2.1.1,22,ssh,OpenSSH 4.7p1 Debian 8ubuntu1 (protocol 2.0)
+metasploitable,10.2.1.1,23,telnet,Linux telnetd
+metasploitable,10.2.1.1,25,smtp,Postfix smtpd
+metasploitable,10.2.1.1,3306,mysql,MySQL 5.0.51a-3ubuntu5
+metasploitable,10.2.1.1,445,netbios-ssn,Samba smbd 3.X (workgroup: WORKGROUP)
+metasploitable,10.2.1.1,512,,
+metasploitable,10.2.1.1,513,,
+metasploitable,10.2.1.1,514,tcpwrapped,
+metasploitable,10.2.1.1,53,domain,ISC BIND 9.4.2
+metasploitable,10.2.1.1,5432,postgresql,PostgreSQL DB 8.3.0 - 8.3.7
+metasploitable,10.2.1.1,5900,vnc,VNC (protocol 3.3)
+metasploitable,10.2.1.1,6000,X11,
+metasploitable,10.2.1.1,6667,irc,Unreal ircd
+metasploitable,10.2.1.1,80,http,Apache httpd 2.2.8 ((Ubuntu) DAV/2)
+tomcat-apache,10.2.1.6,22,ssh,OpenSSH 5.5p1 Debian 6+squeeze2 (protocol 2.0)
+tomcat-apache,10.2.1.6,443,ssl/http,Apache httpd 2.2.16 ((Debian))
+tomcat-apache,10.2.1.6,80,http,Apache httpd 2.2.16 ((Debian))
+ultimatelamp,10.2.1.3,80,http,Apache httpd 2.0.54 ((Ubuntu) PHP/5.0.5-2ubuntu1.2)
diff --git a/report/template.tex b/report/template.tex
index bdc755c..da296ff 100644
--- a/report/template.tex
+++ b/report/template.tex
@@ -62,22 +62,92 @@ Some more text.
Even more text.
-\newpage
-\section{Attack Narrative}
-\subsection{Wordpress Exploitation}
-\subsection{Wordpress Plugin Unintended File Type Upload}
-\subsection{Linux Local Privilege Escalation}
-\subsection{Maintaining Access to Compromised Webserver}
-\subsection{Vulnerable Splunk Installation}
-\subsection{Domain Privilege Escalation}
-\subsection{Attacker Control of Archmake Transactions}
+%\newpage
+%\section{Attack Narrative}
+%\subsection{Wordpress Exploitation}
+%\subsection{Wordpress Plugin Unintended File Type Upload}
+%\subsection{Linux Local Privilege Escalation}
+%\subsection{Maintaining Access to Compromised Webserver}
+%\subsection{Vulnerable Splunk Installation}
+%\subsection{Domain Privilege Escalation}
+%\subsection{Attacker Control of Archmake Transactions}
\newpage
\section{Recon}
\subsection{Information}
+
+In order to get an understanding of what hosts are active on the network the first step
+I took was to find out what ip address the DHCP server assigned to my backtrack host using
+ifconfig\footnote{\label{ifconfig}ifconfig -- configure network interface parameters}
+
+\begin{lstlisting}[language=Bash, firstline=1, lastline=3]
+root@bt-was:~/# ifconfig eth0
+eth0 Link encap:Ethernet HWaddr 00:0c:29:4b:5c:be
+ inet addr:10.2.1.30 Bcast:10.2.1.31 Mask:255.255.255.224
+ inet6 addr: fe80::20c:29ff:fe4b:5cbe/64 Scope:Link
+ UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
+ RX packets:472581 errors:0 dropped:0 overruns:0 frame:0
+ TX packets:435725 errors:0 dropped:0 overruns:0 carrier:0
+ collisions:0 txqueuelen:1000
+ RX bytes:258604722 (258.6 MB) TX bytes:92862199 (92.8 MB)
+ Interrupt:19 Base address:0x2000
+\end{lstlisting}
+
\subsubsection{DNS}
-List out entries found in the /etc/hosts file.
+I used nmap\footnote{\label{nmap}nmap - Network exploration tool and security / port scanner}
+to do a ping sweep of the active hosts in the
+10.2.1.0/24 CIDR range.
+
+\begin{lstlisting}[language=Bash, firstline=1, lastline=1]
+root@bt-was:~/scans# nmap -sP 10.2.1.0/24
+
+Starting Nmap 6.01 ( http://nmap.org ) at 2016-02-12 09:51 EST
+Nmap scan report for metasploitable.sait230.ca (10.2.1.1)
+Host is up (0.00029s latency).
+MAC Address: 00:0C:29:B8:82:E1 (VMware)
+Nmap scan report for websecdojo.sait230.ca (10.2.1.2)
+Host is up (0.00027s latency).
+MAC Address: 00:0C:29:2A:C8:AF (VMware)
+Nmap scan report for ultimatelamp.sait230.ca (10.2.1.3)
+Host is up (0.00016s latency).
+MAC Address: 00:0C:29:23:94:3C (VMware)
+Nmap scan report for samurai.sait230.ca (10.2.1.4)
+Host is up (0.00038s latency).
+MAC Address: 00:0C:29:A9:4F:36 (VMware)
+Nmap scan report for nessus.sait230.ca (10.2.1.5)
+Host is up (0.00022s latency).
+MAC Address: 00:0C:29:90:C9:6F (VMware)
+Nmap scan report for tomcat-apache.sait230.ca (10.2.1.6)
+Host is up (0.00015s latency).
+MAC Address: 00:0C:29:72:36:2B (VMware)
+Nmap scan report for bwa.sait230.ca (10.2.1.8)
+Host is up (0.00028s latency).
+MAC Address: 00:0C:29:4C:6D:F9 (VMware)
+Nmap scan report for bt5r3-was.sait230.ca (10.2.1.30)
+Host is up.
+nexthost: failed to determine route to 10.2.1.32
+QUITTING!
+\end{lstlisting}
+
+In total I discovered 9 active hosts on the network. All hosts were
+located in the 10.2.1.0/24 subnet.
+
+Next, I used fping\footnote{\label{fping}fping - fping - send ICMP ECHO\_REQUEST packets to network hosts}
+to make sure these hosts were active on the network
+
+\begin{lstlisting}
+root@bt-was:~/scans# fping 10.2.1.1 10.2.1.2 10.2.1.3 10.2.1.4 10.2.1.5 10.2.1.6 10.2.1.8
+10.2.1.1 is alive
+10.2.1.2 is alive
+10.2.1.3 is alive
+10.2.1.4 is alive
+10.2.1.5 is alive
+10.2.1.6 is alive
+10.2.1.8 is alive
+\end{lstlisting}
+
+\csvautotabular{hosts.csv}
\subsubsection{IP Ranges}
@@ -91,18 +161,19 @@ Use genlist to generate a list of ip addresses found.
\subsection{Diagrams and spreadsheets}
\subsection{Tools}
-* nikto
-* sqlmap
-* wget -R
-* httpprint
+* nmap
+* ifconfig
\newpage
\section{Mapping}
-\subsection{Open Ports}
-\subsection{Service version}
+\subsection{Open Ports/Services}
+
+Below is a list of open ports and services running. This list was put together using nmap.
\csvautotabular{ports.csv}
+\newpage
+
\noindent The following command :
\begin{lstlisting}[language=bash]
$ nmap -sV localhost
@@ -131,6 +202,11 @@ Nmap done: 1 IP address (1 host up) scanned in 8.78 seconds
\subsection{Vulnerabilities for ultimatelamp.sait230.ca}
\subsection{Tools}
+* nikto
+* sqlmap
+* wget -R
+* httpprint
+
\newpage
\section{Exploitation}
\subsection{Exploits for metasploitable.sait230.ca}