FINAL PENTESTING Rev
FINAL PENTESTING Rev
Jose Rodriguez
©
All rights reserved to Offensive Security, 2016
No part of this publication, in whole or in part, may be reproduced, copied, transferred or any other right reserved to its copyright owner,
including photocopying and all other copying, any transfer or transmission using any network or other means of communication, any broadcast
for distant learning, in any form or by any means such as any information storage, transmission or retrieval system, without prior written
permission from Offensive Security.
1|Page
Pentest
This document is provided as an example of what is expected, at minimum, in a typical lab report that is
submitted for review. You must successfully compromise no less than 10 machines in the labs and
document all of your steps as illustrated in the “Offensive Security Lab and Exam Penetration Report:
Section 3 - Methodologies” template. You may choose to include more than 10 machines in your
report, however this will not provide any additional points to your final exam score.
The sample report presented in this document has been adapted for the non-native English speaker. For
that reason, Offensive Security has opted for a more visual (i.e: more screenshots) style of reporting. A
narrative of how the machine was compromised as well as vulnerability information can be included in
the report, at your discretion. Please note that this template is only a guide, you may opt not to use it
and create your own. The report, regardless of the template used, must be clear, concise, and most
importantly, it must be reproducible. In other words, we must be able to compromise the machine again
by simply following the report.
2|Page
Pentest
Table of Contents
1.0 Offensive Security Lab and Exam Penetration Test Report ..............................................................4
3|Page
Pentest
1.2 Objective
The objective of this assessment is to perform an internal penetration test against the Offensive Security
Lab and Exam network. The student is tasked with following methodical approach in obtaining access to
the objective goals. This test should simulate an actual penetration test and how you would start from
beginning to end, including the overall report. A sample page has been included in this document that
should help you determine what is expected of you from a reporting standpoint. Please use the sample
report as a guide to get you through the reporting requirement of the course.
1.3 Requirements
The student will be required to complete this penetration testing report in its entirety and to include the
following sections:
4|Page
Pentest
2.0 Report – High-Level Summary
OS-XXXXX was tasked with performing an internal penetration test in the Offensive Security Labs and
Exam network. An internal penetration test is a simulated attack against internally connected systems.
The focus of this test is to perform attacks, similar to those of a malicious entity, and attempt to
infiltrate Offensive Security’s internal lab systems – the THINC.local domain, and the exam network. OS-
XXXXX’s overall objective was to evaluate the network, identify systems, and exploit flaws while
reporting the findings back to Offensive Security.
While conducting the internal penetration test, there were several alarming vulnerabilities that were
identified within Offensive Security’s network. For example, OS-XXXXX was able to gain access to
multiple machines, primarily due to outdated patches and poor security configurations. During testing,
OS-XXXXX had administrative level access to multiple systems. All systems were successfully exploited
and access granted. These systems as well as a brief description on how access was obtained are listed
below:
• Target #1 – Obtained a low-privilege shell via the vulnerable web application called 'KikChat'.
Once in, access was leveraged to escalate to 'root' using the 'getsystem' command in
Meterpreter.
5|Page
Pentest
3.1 Report – Information Gathering
The information gathering portion of a penetration test focuses on identifying the scope of the
penetration test. During this penetration test, OS-XXXXX was tasked with exploiting the lab and exam
network. The specific IP addresses were:
Lab Network
10.0.2.20
6|Page
Pentest
6|Page
Pentest
6|Page
Pentest
Server IP Address Ports Open Service/Banner
TRACEROUTE
HOP RTT ADDRESS
1 1.13 ms 10.0.2.20
Pentest
Jose Rodriguez
Pentest
Vulnerability Explanation: The KikChat web application suffers from a Local File Include (LFI), as well as
a Remote Code Execution (RCE) vulnerability. A combination of these vulnerabilities was used to obtain
a low privilege shell.
Severity: Critical
Information Gathering:
7|Page
Pentest
Empezamos con un moduo auxiliar de metasploit para fuerza bruta con ssh.
8|Page
Pentest
Continuamos buscando usuarios y contraseñas con diferentes diccionarios.
9|Page
Pentest
Continuamos buscando usuarios y contraseñas con diferentes diccionarios.
9|Page
Pentest
Probamos con ssh que los usuarios y contraseñas encontrados nos den una conexión.
9|Page
Pentest
Ahora podemos ver los datos de los diferentes usuarios encontrados.
9|Page
Pentest
No podiamos encontrar la contraseña del usuario Guest. Y en su información vemos
que es debido a que no tiene.
9|Page
Pentest
Ahora con la info del Administrador y con el comando scp, enviamos un script de
visual basic para poder hacer una copia de os archivos SAM y system.
9|Page
Pentest
Copiamos esos archivos que tienen SAM y system a una ruta mas facil para la
extracción.
9|Page
Pentest
Ahora lo intentaremos de otra forma, directamente utilizando una
vulnerabilidad dw Windows server 2008, con eternal blue. Como vemos
conseguimos un shell sin problema.
9|Page