0% found this document useful (0 votes)
54 views3 pages

Report

Kioptrix Level 1 Reporting penetration test findings

Uploaded by

Jojo Koko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views3 pages

Report

Kioptrix Level 1 Reporting penetration test findings

Uploaded by

Jojo Koko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Penetration Testing Report for Kioptrix Level 1

Prepared by: Muhammed Apdulkawi Aly


Target: Kioptrix Level 1 (192.168.152.129)

1. Executive Summary
The object of the game is to acquire root access via any means possible (except
actually hacking the VM server or player). The purpose of these games are to learn
the basic tools and techniques in vulnerability assessment and exploitation. There
are more ways then one to successfully complete the challenges.

2. Scan Results
The following tools were utilized during the scanning and assessment of the Kioptrix
Level 1 system:
 Tools Used: Nmap, Metasploit, Nikto, Hydra
 Scope: The test was conducted using a black-box approach with no prior
knowledge of internal configurations.
 Target: 192.168.152.129

3. Our Findings
The vulnerability assessment revealed multiple exploitable services running on the
target machine, including Samba and Apache. The most critical findings are outlined
below:
Critical Severity Vulnerability
 Samba 2.2.1a
o Description: This outdated version of Samba allows remote attackers
to gain root-level access through command injection.
o Solution: Update Samba to the latest version.

High Severity Vulnerabilities


 Apache mod_ssl
o Description: The version of mod_ssl in use is vulnerable to remote
code execution attacks.
o Solution: Apply the latest patches to Apache mod_ssl.

Medium Severity Vulnerabilities


 SSH Service
o Description: The outdated version of SSH allows user enumeration,
potentially revealing critical information about system users.
o Solution: Update the SSH service to a more secure version.

4. Risk Assessment
Based on the findings, the risk to the system was categorized into the following
severity levels:
 Critical Vulnerabilities:
These pose the highest risk to the system, allowing attackers to gain root
control. Immediate action is needed.
 High Vulnerabilities:
High-risk vulnerabilities could lead to unauthorized access but may require
specific conditions to be exploited.
 Medium Vulnerabilities:
These vulnerabilities could expose system information that could help
attackers in further exploitation.
Critical Vulnerability
 Samba 2.2.1a
o This version of Samba allows remote command injection, which
provided root access during testing.
High Vulnerability
 mod_ssl (Apache)
o Outdated versions lead to potential remote code execution
vulnerabilities.
Medium Vulnerability
 SSH Service
o User enumeration via SSH could allow attackers to map out valid
usernames.

5. Recommendations
Remediation Steps
The following steps are recommended to resolve the identified vulnerabilities and
secure the system:
1. Update Samba:
Immediately update Samba to the latest version to close the remote
command injection vulnerability.
2. Patch Apache and mod_ssl:
Apply the latest patches to both Apache and its mod_ssl module to address
remote execution risks.
3. Update SSH:
Update the SSH service to prevent user enumeration.
4. System Hardening:
Implement additional security measures such as network segmentation,
firewalls, and strict access controls.

You might also like