LPTv4 Module 44 Penetration Testing Report Analysis
LPTv4 Module 44 Penetration Testing Report Analysis
EC Council
EC-Council
Mod le XXXXIV
Module
Penetration Testing
R
Report
t Analysis
A l i
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Research Analysis
Research the vulnerabilities you have
found and discover the latest fix or patch
for each vulnerability.
Extensive research must be conducted
for each vulnerability.
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Pen-Test Findings
Findings are security issues that you
uncovered during your penetration testing.
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Rating Findings
High criticality findings:
Loss could result in the unauthorized release of information that
could have a significant impact on the organizations mission or
financial assets or result in loss of life
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Example of Finding- I
Finding: SNMP set public community
Finding ID #: 1
CVE/CAN: CAN-19990517
Category: Identification and Authentication (External Exposure)
Location: 10.0.0.4
Severity: High
Discussion:
The SNMP default p
public communityy name is specified,
p
allowing
g anyone
y
to change
g the
computers system information if they use this default value. An attacker can use SNMP to
obtain valuable information about the system, such as information on network devices
and current open connections. In this case, the ability exists to actually change
information, because the SNMP Set p
password is set to Public
Recommendations:
Option 1: If the SNMP Service is not necessary, disable or remove it.
p
2: If yyour organization
g
requires
q
the use of the SNMP Service,, you
y should take
Option
steps to secure the SNMP community names and the community strings
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Example of Finding- II
Finding: Telnet default account accessible
Finding ID #: 2
CVE/CAN: No common corresponding vulnerability
Category: Technical Finding (System Boundary)
Location: 10.0.0.4
Severity: High
Discussion:
An accessible default account was detected through Telnet. Default accounts through
Telnet allow attackers easy access to remote systems by providing a network-accessible
service on the server or printer
R
Recommendations:
d i
Option 1: Disable the Telnet account/service on each network.
Option 2: Change the password for the account to something difficult to guess
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Analyze
Repeatedly
p
y analyze
y yyour findings.
g
This will be critical in preparing your final report.
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited