Cyber Security Question
Cyber Security Question
Scenario
You have been hired as a junior security consultant and have been tasked with
performing an in-house penetration test to demonstrate your readiness to support the
audit of a large corporate client that has employed your firm’s services. Conducting a
penetration test consists of 1) planning the test, 2) preparing your test tools, 3)
performing the test, 4) analyzing the data, and 5) writing up and communicating your
findings. The project will document your notional penetration test.
Project OVERVIEW
Your project will be submitted in four sections. The final deliverable will include all
combined sections:
Supporting Details
The purpose of this project is to evaluate the student’s ability to:
Build and deploy an attack OS (Kali Linux or other similar operating system
(OS))
Configure and deploy a victim host (Metasploitable, Broken Web Apps,
Mutillidae, other exploitable OS or virtual machine (VM))
Conduct a vulnerability scan
Research a hardware or software vulnerability
Discuss how the vulnerability can be exploited
Exploit the vulnerability
Evaluate the risk posed by this vulnerability
Provide a recommended compensating control to mitigate the vulnerability
Students may choose to submit the project using one of two options – each option has
pros and cons that students should evaluate before making their decision.
Option 2A: Research and choose a cloud hosting provider and deploy a virtual
private server that you can remotely access and configure. Install any “free”
operating system on the cloud server. Typically, any Linux OS can be freely
deployed without charge. Most, if not all, of the cloud hosting providers will
require a credit card or PayPal account to verify identity and may charge a
nominal fee ($1 or more). The submission requirement for this option is to
take a screenshot of your newly created VPS with an open terminal window
echoing (printing to screen) your name and date simply to show that you
created it.
Option 2B: Research three cloud hosting providers and compare and contrast
their offerings in terms of a solution that you could use if you were to conduct
your penetration testing from their cloud services. Consider costs for
computing time, storage, access, security, etc. The research paper should be
1.5 – 2 pages in length with a minimum word count of 750 words.
Part A: Identifying the target system through network discovery using at least
two network discovery/mapping tools (e.g., Nmap, Netdiscover, Arp-scan, etc.)
to identify networks and targets. Identify what ports, services, and versions of
software are running in the network environment.
Part B: Additionally, you will need to complete a vulnerability scan against
your target host to identify vulnerabilities that you can then use to exploit to
gain administrative/root access in the following project section
Choose any vulnerability scanning software to download, install and configure (Open
VAS, Nessus, etc.) complete Part B. You should be able to find free “personal/home use
versions).” Configure a scan to run against your target host. If your target host is a
deliberately vulnerable machine, you should find plenty of “critical/high” vulnerabilities
to choose for your attack in the following project section.
During the course labs, you will have completed labs that require you to exploit a
vulnerability. You must choose an exploit that we have not done in class. I suggest doing
a web search on “Metasploitable Walkthrough” for additional ideas on Metasploit
modules that could be used (if you have selected Metasploitable as your vulnerable
target), or research vulnerabilities specific to your vulnerable framework. Keep in mind
that your vulnerability should have been flagged during the vulnerability scanning
portion.
Risk Assessment: Use this area to discuss what the risk represents to an
organization. Would it change the risk if it were on a public-facing server as
opposed to an internal server? What happens if this exploit were successful?
Assume that the vulnerable software would be installed in a business
environment, not your home lab network. Discuss the a few different risks
that would be dependent on where and how the vulnerable software would be
installed across the organization.
Mitigation and Security Control Recommendation: Discuss how you fix this
vulnerability. Can you patch it? Are there additional security controls,
protections, or sensing mechanisms that could be installed to lessen the
impact of an attack?
Guidelines
The proposal document should be 7 to 10 pages, conforming to APA
standards (double-spaced).
At least two authoritative outside references are required. These should be
listed on the last page titled “References” – which does not count toward your
overall page count.
Screenshots are required for each major section – any sensitive information
may be obfuscated or redacted).
o Screenshots will be no larger than 1/4 page. The text within the
screenshot should appear readable so avoid taking “full screen”
captures. Capture only the appropriate detail. Terminal command
output should be no smaller than an “equivalent” 12-point font size
(similar to the font in this document).
o Screenshots and images do not count toward the overall page
count. The project may extend into multiple pages depending on the
number of screenshots
o Clear screenshots should be used. There are numerous options
available to take screenshots. Use Google, or go
to https://www.take-a-screenshot.org for various options. By no
means should you take a picture with your smartphone or camera
and paste in.
Appropriate in-text citations are required.
This will be graded on quality of the research topic, technical
demonstration/write-up, the content quality, use of citations, grammar and
sentence structure, and creativity.
The paper is due during Week 8 of this course.
This paper should effectively describe the vulnerability, risks and
recommendation in a manner that will allow TECHNICAL readers to
understand the vulnerability, risk and mitigation. The course material and
research should provide you with the right level of technical understanding.
Format: The paper must contain clearly labeled headings for each major
section: Network Mapping, Vulnerability Scan, Vulnerability Research, etc.
References
https://www.offensive-security.com/reports/penetra… (Links to an external
site.)
Note: If you’ve never used Microsoft Word’s “References” feature to manage
citations, please invest some time in learning how to do this. You’ll be glad that
you did. https://support.office.com/en-ie/article/Add-a-citation-and-create-a-
bibliography-17686589-4824-4940-9c69-342c289fa2a5?ui=en-US&rs=en-
IE&ad=IE (Links to an external site.)
Ensure that you cite your references in the text when you are using material
from the reference. https://owl.english.purdue.edu/owl/resource/560/18…