University of Southampton [623142]
1
University of Southampton
COMP2207 Coursework 1
Network Penetration Testing
Student: [anonimizat]: Ana-Maria Schintee
Email ID: [anonimizat]
Student: [anonimizat]: 27978214
October 2016
2
Part A : Scanning the ECS DMZ subnet
The aim of the the first part is to scan the network and produce a table listing, for each
service, the number of servers running that service, the port(s) the service runs on and a brief
description of the function of that service.
For the scan, using the nmap network scanning tool the following command was runned:
nmap -sV -T4 -O -F –version -light 152.78.180.0/23:
-sV –Version detection : used to differentiate filtered ports from the open ones
-T4: used to set the speed of the scan, having the range from 0(slow) to 5(fast)
-O: used to locate the target operating system
-F – Fast Scan: sets the boundry of the scan, taking only the most common 100 ports
–version -light: used to set the intensity level of the probes tried during the scan, in
this case level 2.
Scan details:
-Date: 20th October 2016
-Time: 13:37 GMT Summer Time
-Location: Zepler Labs, Level 3
-Network: Eduroam Wi -fi
-IP range: 152.78.180.0/23
-nmap mode used: Quick scan plus
-runned on my personal machine
3
Number of
servers running
the service Port(s) the
service runs on Brief description of the
function of the service
h323q931 503 1720 H323, part of the ITU
recommendations, is a
service which provides
multimedia( audio –
visual)communication
sessions. It uses port 1720
during calls setup
negotiation.
Q931 “ is the ITU standard
ISDN connection control
signalling protocol”[10]
,used in the transmission of
call signalling messages.
http 39 80 HTTP(HyperText Transfer
Protocol) is a request –
response protocol, with
default port 80, used by
World Wide Web in order
to define how messages are
transmitted. Alternative port
8080 is used by the Node.js
express framework.
http-proxy 2 8080
https 16 443 Port 443 is used by the
HTTPS protocol for
websites which use
SSL(secure socket layer) for
security purposes.
ssh 2 22 SSH(Secure Socket Shell) is
a protocol that guarantees a
secure communication
between computers over the
Internet. It is “a
cryptographic network
protocol for operating
network services securely
over an unsecured
network.”[11]
4
Part B: Brief analysis of results
In this part we will be examining the vulnerabilities of specific services during the scan .
A. Apache httpd
1. 2.2.15((Red Hat)) CVE -2010 -2068: “mod_proxy_http.c in mod_proxy_http in the
Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4 -alpha, and 2.3.5 -alpha on Windows,
NetWare, and OS/2, in certain configurations involving proxy worker pools, does not
properly dete ct timeouts, which allows remote attackers to obtain a potentially sensitive
response intended for a different client in opportunistic circumstanc es via a normal HTTP
request.”[1 ]
2. 2.4.7((Ubuntu)) CVE -2016 -0706: “Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68,
8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place
org.apache.catalina.manager.StatusManagerServlet on the
org/apache/catalina/core/RestrictedServlets.properties list, which allows remote
authenticated users to bypass intended SecurityManage r restrictions and read arbitrary
HTTP requests, and consequently discover session ID values, v ia a crafted web
application.”[2 ]
3. 2.2.22((Ubuntu)) CVE -2013 -5704: “The mod_headers module in the Apache HTTP
Server 2.2.22 allows remote attackers to bypass "Req uestHeader unset" directives by
placing a header in the trailer portion of data sent with chunked transfer coding. NOTE:
the vendor states "this is not a secu rity issue in httpd as such."”[3 ]
4. 2.4.10((Ubuntu)) CVE -2014 -3583 : “The handle_headers function in mod_proxy_fcgi.c in
the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI
servers to cause a denial of service (buffer over -read and daemon crash) via long response
headers. ”[4]
5. 2.4.12((Ubuntu)) CVE -2015 -0228: “The lua_websocket_ read function in lua_request.c in
the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers
to cause a denial of service (child -process crash) by sending a crafted WebSocket Ping
frame after a Lua script has c alled the wsupgrade f unction.”[5 ]
B. Node.js
1. Express framework CVE -2014 -7205: “Eval injection vulnerability in the internals.batch
function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server
framework for Node.js allows remote attackers to execute arbitrary Javascript code via
unspecified vectors.”[6 ]
2. (Express middleware) CVE -2015 -1164: “Open redirect vulnerability in the serve -static
plugin before 1.7.2 for Node.js, when mounted at the root, allows remote attackers to
redirect users to arbitrary web sites and conduct phishing a ttacks via a // (slash slash)
followed by a domain in the PATH_INFO to the default URI.”[ 7]
C. Nginx
1. 1.10.1 CVE -2016 -4450: “os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before
1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference
and worker process crash) via a crafted request, involving writing a client request body to
a temporary file.”[ 8]
2. 1.1.19 CVE -2012 -2089: “Buffer overflow in ngx_http_mp4_module.c in the
ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 a nd 1.1.3 through 1.1.18,
when the mp4 directive is used, allows remote attackers to cause a denial of service
(memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.”[ 9]
5
Part C: Describing shortcomings of a network penetration test
The use of a network penetration test is that it identifies the vulnerabilities or the
security weaknesses of a computer system that could potentially be exploit by an attacker.
Among the most popular tools used in pen -testing we can find Nmap, which is ab le to scan
the ports and identify the operating system of the target computer.
However a network penetration test has its shortcomings and that is one of the reasons
why a complete test of a network security posture should not fully rely on a it. Some of the
shortcomings of a pen -testing are listed below:
This type of testing can only scan the ports but cannot fix the issues found.
Moreover it cannot cover all the services used, since this ones can vary over
time
The time allocated to professionals to p erform a pen -test is usually shorter
than the time spent by attackers planning their scheme on a network
The quality of a test depends on the skills owned by the testers. An a ttacker
can own different abilities which can help him target technologies different
from those exploited by the testers
Although it can give a good idea of how an attacker may exploit the
vulnerabilities, it can’t identify viruses or internal issues/attacks on the
network
It can’t detect weak password policies for services that require authentication
It can’t identify phishing emails/websites. A good example would be an
employee receiving a phishing email in which it is requested to provide
sensitive information that shouldn’t be leaked outside the company .
Malicious code stored on a USB stick can be inserted into the user’s or
company’s computer and affect the network, without being identified by the
test . For example, an employee may find a USB stick containing malicious
code , placed by an attacker near the company , and introduce it into the
company’s computer. In this way the network’s security is affected, if not
compromised.
6
References
[1] CVE, Common Vulnerabilities and E xposures , 2016 [Online] Available at:
https://cve.mitre.org/cgi -bin/cvename.cgi?name=CVE -2010 -2068 [Accessed: 29th October
2016]
[2] CVE ,Common Vulnerabilities and E xposures , 2016 [Online] Available at:
https://cve.mitre.org/cgi -bin/cvename.cgi?name=CVE -2016 -0706 [Accessed: 29th October
2016]
[3] CVE, Common Vulnerabilities and E xposures , 2016 [Online] Available at:
https://cve.mitre.org/cgi -bin/cvename.cgi?name=CVE -2013 -5704 [Accessed: 29th October
2016]
[4] CVE, Common Vulnerabilities and E xposures , 2016 [Online] Available at:
https://cve.mitre.org/cgi -bin/cvename.cgi?name=CVE -2014 -3583 [Accessed: 29th October
2016]
[5] CVE, Common Vulnerabilities and E xposures , 2016 [Online] Available at:
https://cve.mitre.org/cgi -bin/cvename.cgi?name=CVE -2015 -0228 [Accessed: 29th October
2016]
[6] CVE, Common Vulnerabilities and E xposures, 2016 [Online] Available at:
https://cve.mitre.org/cgi -bin/cvename.cgi?name=CVE -2014 -7205 [Accessed: 29th October
2016]
[7] CVE, Common Vulnerabilities and E xposures , 2016 [Online] Available at:
https://cve.mitre.org/cgi -bin/cvename.cgi?name=CVE -2015 -1164 [Accessed: 29th October
2016]
[8] CVE, Common Vulnerabilities and E xposures , 2016 [Online] Available at:
https://cve.mitre.org/cgi -bin/cvename.cgi?name=CVE -2016 -4450 [Accessed: 29th October
2016]
[9] CVE, Common Vulnerabilities and E xposures , 2016 [Online] Available at:
https://cve.mitre.org/cgi -bin/cvename.cgi?name=CVE -2012 -2089 [Accessed: 29th October
2016]
[10] Q931, Wikiped ia [Online] Available at: https://en.wikipedia.org/wiki/Q.931 [Accessed:
30th October ]
[11] Secure Shell , W ikipedia [Online] Available at:
https://en.wikipedia.org/wiki/Secure_Shell [Accessed: 30th October ]
7
Bibliography
Port 5101 , SpeedGuide [Online] Available at:
http://www.speedguide.net/port.php?port=5101 [Accessed: 2nd November]
H.323 , Wikipedia [Online] Available at: https://en.wikipedia.org/wiki/H.323 [Accessed: 2nd
November]
What is H.323? – Definition from WhatIs.com, SearchNetworking, 2006 [Online ] Available
at: http://searchnetworking.techtarget.com/definition/H323 [Accessed: 2nd November]
What is Q.931? – Definition from WhatIs.com, SearchUnifiedCommunications, 2008 [Online]
Available at: http://searchunifiedcommunications.techtarget.com/definition/Q931 [Accessed:
2nd November]
Hypertext Transfer Protocol, Wikipedia [Online] Available at:
https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol [Accessed: 2nd November]
HTTPS, Wikipedia [Online] Available at: https://en.wi kipedia.org/wiki/HTTPS [Accessed:
2nd November]
Steve Gibson, GRC| Port Authority, for Internet Port 1720, Grc.com [Online] Available at:
https://www.grc.com/port_1720.htm [Accessed: 2nd November]
Limitations of Penetration Testing| Penetration Testing Tools, Pen -tests.com [Online]
Available at: http://www.pen -tests.com/limitations -of-penetration -testing.html [Accessed: 2nd
November]
The Pros and Cons of attacking Your Own Network with Penetration Testing, Technology
news blog , 2013 [Online] Available at: http://technewsarm.com/2013/03/the -pros-and-cons-
of-attacking -your-own-network -with-penetration -testing/ [Accessed: 2nd November]
https://www.sans.org/reading -room/whitepapers/analyst/penetration -testing -assessing –
security -attackers -34635
Henry Kenyon, Found thumb drives: another way employees are a security menace – GCN,
GCN, 2011 [Online] Available at: https://gcn.com/articles/2011/06/30/dhs -test-found -thumb –
drives -disks -network.aspx [Accessed: 2nd November]
Copyright Notice
© Licențiada.org respectă drepturile de proprietate intelectuală și așteaptă ca toți utilizatorii să facă același lucru. Dacă consideri că un conținut de pe site încalcă drepturile tale de autor, te rugăm să trimiți o notificare DMCA.
Acest articol: University of Southampton [623142] (ID: 623142)
Dacă considerați că acest conținut vă încalcă drepturile de autor, vă rugăm să depuneți o cerere pe pagina noastră Copyright Takedown.
