👉This report will be assessed according to its accuracy and comprehensiveness regarding every aspect of the test. Its goal is to confirm that the applicant possesses the technical know-how and understanding of penetration testing methodologies necessary to meet the requirements.
# 📌Introduction: This report will be assessed for its accuracy and completeness across all aspects of the test. Its The objective is to verify that the applicant has the technical expertise and comprehensive An understanding of penetration testing methodologies is required to meet the specified criteria.
This assessment aims to perform an internal network penetration test on the specified Personal network. The task requires a comprehensive and systematic approach to achieve the desired outcomes. This test aims to simulate a real-world penetration test within the provided testing environment. Additionally, it demonstrates the candidate’s approach from start to finish, including the identification and exploitation of vulnerabilities, as well as the creation of a detailed report.
# 💊Requirements The tester is required to complete a comprehensive penetration testing report, which should include the following sections: • Executive Summary and Recommendations: A non-technical overview summarizing key findings and suggested actions. • Methodology and Vulnerability Analysis: A detailed explanation of the testing approach and identified vulnerabilities. • Findings with Evidence: Each finding should include screenshots, step-by-step walkthroughs, and sample code. • Additional Observations: Any other relevant information not covered in the previous sections.
This section defines the scope and boundaries of the project. Project Name: Metasploitable2
Description: Metasploitable2 is a deliberately vulnerable virtual machine (VM) designed for penetration testing, training, and security research. It is widely utilized by cybersecurity professionals, students, and enthusiasts to simulate real-world attack scenarios within a controlled environment.
Scope: 192.168.219.132 Credentials: NA Test Scope: Black Box Penetration Test
Outlined is a Black Box Application Security assessment for the Metasploitable2. Finding ID Severity Service Enumeration via Open Ports: Medium Credential Exposure Through Telnet Banner Disclosure: HIGH Exploiting FTP (Anonymous Access): HIGH Samba smbd 3.x Remote Code Execution: HIGH Unveiling Usernames: SMTP Enumeration with Metasploit’s smtp_enum Module: HIGH
Tools Used: Nmap Vulnerability: Service Enumeration via Open Ports
Vulnerability Description: Service enumeration is a method used to identify the services running on specific ports of a target system and determine their versions. This version information is crucial because it allows attackers to search for known security vulnerabilities associated with the identified software versions. During service enumeration on Metasploitable2, we observed that the application has many open ports, each revealing the service name and its version. An attacker can use this information to search for available exploits on the internet or in hacking payload databases. These exploits can then be used to compromise the system.
Open Ports 21, 22, 23, 25, 53, 80, 111, 139, 445, 512, 513, 514, 1099, 1524, 2121,3306, 3632, 5900, 6000, 6667, 6697, 8009, 36979, 40940, 51217, 51247
Privilege Escalation: Enumerated services may have misconfigured permissions or weak authentication, allowing attackers to escalate privileges.
# 🎉Step to Reproduce 👉 Let’s begin first running the command in the terminal: nmap -sV 192.168.219.132
Tools Used: Nmap, Kali Linux
Vulnerability: Telnet banners may reveal sensitive information, such as usernames, system details, or even credentials during the initial connection.
Vulnerability Description: Telnet services configured with default or weak credentials pose a serious security risk. Attackers can easily access systems using publicly known default usernames and passwords, leading to unauthorized entry and potential system compromise.
Open Ports: 23
👉Let’s begin. First, run the command in the terminal: telnet
Vulnerability: vsftpd 2.3.4 - Backdoor Command Execution
Vulnerability Description: vsFTPd (Very Secure FTP Daemon) version 2.3.4 contains a backdoor that allows an attacker to gain a root shell by sending a specially crafted payload during the FTP login process. This vulnerability was introduced by a malicious backdoor in the source code.
Open Ports: 21
Tools Used: Metasploit
Vulnerability: Samba versions 3.0.0 to 3.0.25rc3 contain a remote code execution (RCE) vulnerability due to a flaw in the handling of MS-RPC requests.
Vulnerability Description: Samba versions 3.0.0 to 3.0.25rc3 contain a command injection vulnerability in the username map script functionality. This allows remote attackers to execute arbitrary commands as root by sending a specially crafted “username” parameter during authentication.
Open Ports: 139
Tools Used: Metasploit
Vulnerability: Unveiling Usernames: SMTP Enumeration with Metasploit’s smtp_enum Module.
Open Ports: 25
# 🎉Step to reproduce