Vaprogram Example
Vaprogram Example
Vaprogram Example
Conducted by:
Information Systems Security and Compliance (aka “ISS/C”)
Jeff Holland
Northwestern University
IP scan originated from: 192.168.127.128
Conducted for:
School of Egyptology (aka “Client”)
Northwestern University
Evanston, IL
Date Conducted:
3/16/07
Focus of Assessment:
None
Information Security Vulnerability Assessment Program
1 Table of Contents
1 Table of Contents........................................................................................................ 2
2 Executive Summary .................................................................................................... 3
3 Findings and Recommendations ................................................................................. 5
4 Network Profile Template........................................................................................... 9
5 Server 1 Information ................................................................................................. 10
6 Server 2 Information ................................................................................................. 13
7 Appendix – Tools Outputs ........................................................................................ 16
8 192.168.127.129........................................................................................................ 16
9 192.168.127.130........................................................................................................ 20
10 Vulnerability Exploitation / Penetration Testing .................................................. 32
11 Google Hacking .................................................................................................... 33
12 Firewall Analysis Template .................................................................................. 34
13 Social Engineering Target Template .................................................................... 35
14 Social Engineering Telephone Attack Template .................................................. 35
15 Social Engineering E-mail Attack Template ........................................................ 35
16 Password Cracking Template ............................................................................... 36
17 Security Policy Review......................................................................................... 37
Information Security Vulnerability Assessment Program
2 Executive Summary
The following report details the findings from the security assessment performed by
ISS/C for the Client. The assessment included the following activities as outlined in the
Vulnerability Assessment Profiles section of the Assessment Program document.
• Vulnerability Assessment
Positive Findings
The following are some positives findings from the assessment, outlining what security
controls already in place are helping to secure you environment.
• There were relatively few security vulnerabilities, with only one being “High”.
The “High” vulnerability (remote Telnet vulnerability on Server 2), while
significant and require immediate attention, is easily fixed by applying the proper
patch as noted in the recommendations.
• The Client technical personnel were responsive and helpful during and after the
assessment regarding questions and the discussion of the results of the scan.
Deficiencies Noted
• Server 1:
o There were Cross Site Tracing vulnerabilities on
192.168.127.129 for ports 80 and 443.
• Server 2:
o There were Cross Site Tracing vulnerabilities on
192.168.127.129 for ports 80 and 443.
Overall Summary:
Information Security Vulnerability Assessment Program
The assessment uncovered several deficiencies (one of which is of High criticality) in the
security of the network that requires attention, but overall reflects the relatively secure
nature of the network. In terms of a numerical score, based upon the experience of ISS/C,
the Client would receive a score of 8 out of 10 (10 being the highest) in terms of security.
Information Security Vulnerability Assessment Program
Note that the assessment agreement between the Client and ISS/C, the Client is
responsible for fixing the issues themselves and following up with ISS/C in a timely
manner when they have been addressed. ISS/C will be available for consultation on any
of the recommendations as defined in the agreement.
Server 1
Synopsis :
Debugging functions are enabled on the remote HTTP server.
Description : The remote webserver supports the TRACE and/or TRACK methods. TRACE and
TRACK are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to cross-site-scripting
attacks, dubbed XST for "Cross-Site-Tracing", when used in conjunction with various
weaknesses in browsers.
An attacker may use this flaw to trick your legitimate web users to give him their credentials.
Information Security Vulnerability Assessment Program
Solution :
Disable these methods.
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Solution
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
Synopsis :
Debugging functions are enabled on the remote HTTP server.
Description :
The remote webserver supports the TRACE and/or TRACK methods. TRACE and TRACK are
HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to
cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when used in conjunction
with various weaknesses in browsers. An attacker may use this flaw to trick your legitimate
web users to give him their credentials.
Solution :
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Solution :
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
Information Security Vulnerability Assessment Program
Server 2
Synopsis :
Debugging functions are enabled on the remote HTTP server.
Description : The remote webserver supports the TRACE and/or TRACK methods. TRACE and
TRACK are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to cross-site-scripting
attacks, dubbed XST for "Cross-Site-Tracing", when used in conjunction with various
weaknesses in browsers.
An attacker may use this flaw to trick your legitimate web users to give him their credentials.
Solution :
Disable these methods.
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Solution
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
Synopsis :
Debugging functions are enabled on the remote HTTP server.
Description :
The remote webserver supports the TRACE and/or TRACK methods. TRACE and
TRACK are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to
cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when used in conjunction
with various weaknesses in browsers.
An attacker may use this flaw to trick your legitimate web users to give him their credentials.
Solution :
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Solution :
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
Synopsis :
Description :
Solution :
See also :
http://lists.sans.org/pipermail/list/2007-February/025935.html
http://isc.sans.org/diary.html?storyid=2220
Risk factor :
CVE : CVE-2007-0882
BID : 22512
Nessus ID : 24323
4 Network Profile
n/a
SERVER LIST
IP Address Domain Name(s) Operating System
192.168.127.129 Linux (rpath)
192.168.127.130 Solaris 10
5 Server 1 Information
Service (Port/Protocol)
o norton-av-for-gateways-web-interface (8003/tcp)
o terabase (4000/tcp)
o ssh (22/tcp)
o https (443/tcp) (Security notes found)
o nfs (2049/tcp)
o shoutcast (8004/tcp)
o sunrpc (111/tcp)
o http (80/tcp) (Security notes found)
o ftp (21/tcp)
o fcp-udp (810/tcp)
o wpages (776/tcp)
BANNER(S):
Port Protocol Banner
443 TCP TRACE /Nessus240472754.html HTTP/1.1
Connection: Close
Host: apache_appliance
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0;
Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg,
image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8
Information Security Vulnerability Assessment Program
Synopsis :
Debugging functions are enabled on the remote HTTP server.
Description : The remote webserver supports the TRACE and/or TRACK methods. TRACE and
TRACK are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to
cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when
used in conjunction with various weaknesses in browsers.
An attacker may use this flaw to trick your legitimate web users to give
him their credentials.
Solution
Solution :
Disable these methods.
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Solution
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
Information Security Vulnerability Assessment Program
Synopsis :
Debugging functions are enabled on the remote HTTP server.
Description :
The remote webserver supports the TRACE and/or TRACK methods. TRACE and
TRACK
are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to
cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when
used in conjunction with various weaknesses in browsers.
An attacker may use this flaw to trick your legitimate web users to give
him their credentials.
Solution
Solution :
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Solution :
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
Information Security Vulnerability Assessment Program
6 Server 2 Information
Service (Port/Protocol)
o smtp (25/tcp) (Security notes found)
o sometimes-rpc21 (32779/tcp)
o ssh (22/tcp) (Security notes found)
o sometimes-rpc15 (32776/tcp)
o commplex-link (5001/tcp) (Security notes found)
o sometimes-rpc9 (32773/tcp)
o submission (587/tcp) (Security notes found)
o smc-http (6788/tcp) (Security notes found)
o finger (79/tcp) (Security notes found)
o sometimes-rpc23 (32780/tcp)
o font-service (7100/tcp)
o telnet (23/tcp) (Security hole found)
o sometimes-rpc17 (32777/tcp)
o lockd (4045/tcp)
o dtspcd (6112/tcp)
o filenet-rmi (32771/tcp)
o x11 (6000/tcp) (Security notes found)
o login (513/tcp)
o sunrpc (111/tcp) (Security notes found)
o smc-https (6789/tcp) (Security notes found)
o sometimes-rpc19 (32778/tcp)
o ftp (21/tcp) (Security notes found)
o filenet-pa (32772/tcp)
o shell (514/tcp)
o unknown (32795/udp) (Security warnings)
o unknown (32794/udp) (Security warnings)
o general/udp (Security notes found)
o general/tcp (Security notes found)
BANNER(S):
Port Protocol Banner
25 TCP An SMTP server is running on this port
Here is its banner :
220 unknown ESMTP Sendmail 8.13.7+Sun/8.13.7;
Thu, 15 Mar 2007 07:44:45 -0700 (PDT)
Nessus ID : 10330
587 TCP An SMTP server is running on this port
Here is its banner :
220 unknown ESMTP Sendmail 8.13.7+Sun/8.13.7;
Thu, 15 Mar 2007 07:45:05 -0700 (PDT)
Information Security Vulnerability Assessment Program
Nessus ID : 10330
23 TCP Remote telnet banner:
login:
Nessus ID : 10281
21 TCP An FTP server is running on this port.
Here is its banner :
220 unknown FTP server ready.
Nessus ID : 10330
Synopsis :
Debugging functions are enabled on the remote HTTP server.
Description : The remote webserver supports the TRACE and/or TRACK methods. TRACE and
TRACK are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to
cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when
used in conjunction with various weaknesses in browsers.
An attacker may use this flaw to trick your legitimate web users to give
him their credentials.
Solution
Solution :
Disable these methods.
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Solution
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
Information Security Vulnerability Assessment Program
Synopsis :
Debugging functions are enabled on the remote HTTP server.
Description :
The remote webserver supports the TRACE and/or TRACK methods. TRACE and
TRACK
are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to
cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when
used in conjunction with various weaknesses in browsers.
An attacker may use this flaw to trick your legitimate web users to give
him their credentials.
Solution
Solution :
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Solution :
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
Information Security Vulnerability Assessment Program
8 192.168.127.129
Repartition of the level of the security problems:
o norton-av-for-gateways-web-interface (8003/tcp)
o terabase (4000/tcp)
o ssh (22/tcp)
o https (443/tcp) (Security notes found)
o nfs (2049/tcp)
o shoutcast (8004/tcp)
o sunrpc (111/tcp)
Information Security Vulnerability Assessment Program
Synopsis :
Description :
The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK
are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to
cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when
used in conjunction with various weaknesses in browsers.
An attacker may use this flaw to trick your legitimate web users to give
him their credentials.
Solution :
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
Information Security Vulnerability Assessment Program
Plugin output :
CVE : CVE-2004-2320
BID : 9506, 9561, 11604
Other references : OSVDB:877
Nessus ID : 11213
Synopsis :
Description :
The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK
are HTTP methods which are used to debug web server connections.
It has been shown that servers supporting this method are subject to
cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when
used in conjunction with various weaknesses in browsers.
Information Security Vulnerability Assessment Program
An attacker may use this flaw to trick your legitimate web users to give
him their credentials.
Solution :
See also :
http://www.kb.cert.org/vuls/id/867593
Risk factor :
Add the following lines for each virtual host in your configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
Plugin output :
CVE : CVE-2004-2320
BID : 9506, 9561, 11604
Other references : OSVDB:877
Nessus ID : 11213
Information Security Vulnerability Assessment Program
9 192.168.127.130
Repartition of the level of the security problems:
Synopsis :
An SMTP server is listening on the remote port.
Description :
Solution :
Disable this service if you do not use it, or filter incoming traffic
Information Security Vulnerability Assessment Program
to this port.
Risk factor :
None
Plugin output :
Remote SMTP server banner :
220 unknown ESMTP Sendmail 8.13.7+Sun/8.13.7; Thu, 15 Mar 2007 07:44:45 -
0700 (PDT)
Nessus ID : 10263
Nessus ID : 10267
Nessus ID : 10881
Synopsis :
An SMTP server is listening on the remote port.
Description :
The remote host is running a mail (SMTP) server on this port.
Since SMTP servers are the targets of spammers, it is recommended you
disable it if you do not use it.
Solution :
Disable this service if you do not use it, or filter incoming traffic
to this port.
Risk factor :
None
Plugin output :
Remote SMTP server banner :
220 unknown ESMTP Sendmail 8.13.7+Sun/8.13.7; Thu, 15 Mar 2007 07:45:05 -
0700 (PDT)
Nessus ID : 10263
Apache-Coyote/1.1
and the 'ServerTokens' directive is ProductOnly
Apache does not permit to hide the server type.
Nessus ID : 10107
Synopsis :
Description :
This test gives some information about the remote HTTP protocol - the version
used, whether HTTP Keep-Alive and HTTP pipelining are enabled, etc...
This test is informational only and does not denote any security problem
Solution :
None.
Risk factor :
Plugin output :
Location: http://192.168.127.130/console/faces/jsp/login/BeginLogin.jsp
Content-Length: 0
Date: Thu, 15 Mar 2007 14:47:36 GMT
Server: Apache-Coyote/1.1
Nessus ID : 24260
Synopsis :
Description :
Solution :
See also :
http://lists.sans.org/pipermail/list/2007-February/025935.html
http://isc.sans.org/diary.html?storyid=2220
Risk factor :
Plugin output :
cat /etc/passwd
root:x:0:0:Super-User:/:/usr/bin/tcsh
daemon:x:1:1::/:
bin:x:2:2::/usr/bin:
sys:x:3:3::/:
adm:x:4:4:Admin:/var/adm:
lp:x:71:8:Line Printer Admin:/usr/spool/lp:
uucp:x:5:5:uucp Admin:/usr/lib/uucp:
nuucp:x:9:9:uucp Admin:/var/spool/uucppublic:/usr/lib/uucp/uucico
smmsp:x:25:25:SendMail Message Submission Program:/:
listen:x:37:4:Network Admin:/usr/net/nls:
gdm:x:50:50:GDM Reserved UID:/:
webservd:x:80:80:WebServer Reserved UID:/:
nobody:x:60001:60001:NFS Anonymous Access User:/:
noaccess:x:60002:60002:No Access User:/:
nobody4:x:65534:65534:SunOS 4.x NFS Anonymous Access User:/:
$
CVE : CVE-2007-0882
BID : 22512
Nessus ID : 24323
[ back to the list of ports ]
Information Security Vulnerability Assessment Program
Synopsis :
Description :
Solution :
Risk factor :
Plugin output:
Synopsis :
Information Security Vulnerability Assessment Program
Description :
Solution :
Risk factor :
Plugin output :
Nessus ID : 10407
Nessus ID : 11153
Synopsis :
Description :
Risk factor :
None
Plugin output :
Using rusers, we could determine that the following users are logged in :
- root (console) from :0
- root (pts/3) from :0.0
- root (pts/4) from :0.0
CVE : CVE-1999-0624
Nessus ID : 10227
Nessus ID : 10287
Nessus found a security hole in the Telnet daemon on 192.168.127.130. Per the notes in the
aforementioned Nessus output, an unauthenticated telnet session was established for the
user “bin” remotely (see screenshot below):
Information Security Vulnerability Assessment Program
11 Google Hacking
Search string Result
Information Security Vulnerability Assessment Program
fingerprinting
This test is to determine the success of various packet response fingerprinting methods through
the firewall.
Method Result
stealth
This determines the viability of SYN stealth scanning through the firewall for enumeration.
Result
ICMP Responses
This test is to measure the firewall’s response to various types of ICMP packets.
Protocol
This test is to discover the firewall’s ability to screen packets of various protocols.
Protocol Result
Information Security Vulnerability Assessment Program
TargetDefinition
Name E-mail Telephone Description
EncodedPasswordFile
IP Address
Service Port
Service Type
Protocol
File name
File type
Crack time
Login Names
Passwords
ProtectedOnlineService
IP Address
Service Port
Service Type
Protocol
Login Names
Passwords
Information Security Vulnerability Assessment Program
1. Measure the security policy points against the actual state of the Internet presence.
2. Approval from Management -- Look for any sign (e.g. signature) that reveals that the policy is
approved by management. Without this approval the policy is useless because staff is not required
to meet the rules outlined within. From a formal point of view you could stop investigating the
policy if it is not approved by management. However, testing should continue to determine how
effective the security measures are on the actual state of the internet presence.
3. Ensure that documentation is kept, either electronically or otherwise, that the policy has been
read and accepted by people before they are able to gain any access to the computer systems.
4. Identify incident handling procedures, to ensure that breaches are handled by the correct
individual(s) and that they are reported in an appropriate manner.
5. Inbound connections -- Check out any risks mentioned on behalf of the Internet inbound
connections (internet->DMZ, internet -> internal net) and measures which may be required to be
implemented to reduce or eliminate those risks. These risks could be allowed on incoming
connections, typically SMTP, POP3,HTTP, HTTPS, FTP, VPNs and the corresponding measures as
authentication schemes, encryption and ACL. Specifically, rules that deny any stateful access to
the internal net are often not met by the implementation.
6. Outbound connections -- Outbound connections could be between internal net and DMZ, as
well as between internal net and the Internet. Look for any outbound rules that do not correspond
to the implementation. Outbound connections could be used to inject malicious code or reveal
internal specifics.
7. Security measures -- Rules that require the implementation of security measures should be
met. Those could be the use of AVS, IDS, firewalls, DMZs, routers and their proper
configuration/implementation according to the outlined risks to be met.
8. Measure the security policy points against the actual state of non-Internet connections.
9. Modems -- There should be a rule indicating that the use of modems that are not specially
secured is forbidden or at least only allowed if the modems are disconnected when not in use, and
configured to disallow dial- in. Check whether a corresponding rule exists and whether the
implementation follows the requirements.
10. Fax machines -- There should be a rule indicating that the use of fax machines which can
allow access from the outside to the memory of the machines is forbidden or at least only allowed
if the machines are powered down when not in use. Check whether a corresponding rule exists
and whether the implementation follows the requirements.
11. Measure the security policy against containment measures and social engineering tests
based on the organization’s employees’ misuse of the Internet according to business justification
and best security practices.