Virtual Vapt Cert in Certification Datasheet
Virtual Vapt Cert in Certification Datasheet
For
By
Confidential Page 1 of 11
Vulnerability Assessment and Penetration Testing Report
DOCUMENT DETAILS
Testing Date
Report Date
Authored by MQAS
Reviewed by MQAS
Disclaimer:
This report and any supplements are HIGHLY CONFIDENTIAL and may be protected by one or
more legal privileges. It is intended solely for the use of the addressee identified in the report. This
report is prepared based on the IT environment that prevailed in the approved period of
assessment.
This report is not a guarantee or certification that all vulnerabilities have been discovered and
reported in the findings. Subsequent reviews may report on previously unidentified findings or on
new vulnerabilities. The samples screen shot should not be treated as the final vulnerabilities.
Gaps which we have identified can also get replicated in any part of the Infrastructure. Client
should ensure that Vulnerability Management Program should be adapted continuously rather
than fixing just the issues identified within the areas which MQAS has highlighted.
Confidential Page 2 of 11
Vulnerability Assessment and Penetration Testing Report
Table of Contents
1. INTRODUCTION .................................................................................................................................... 4
2. SCOPE ........................................................................................................................................................ 4
3. VAPT METHODOLOGY ........................................................................................................................ 4
3.1 Four Step Approach .......................................................................................................... 5
3.1.1 Foot Print Analysis (Information Gathering) ..................................................... 5
3.1.2 Vulnerabilities Assessment...................................................................................... 5
3.1.3 Exploitation Analysis ................................................................................................. 5
3.1.4 Configuration Analysis .............................................................................................. 6
4. SUMMARY OF FINDINGS .................................................................................................................. 6
5. WEB SERVER VULNERABILITIES ................................................................................................. 9
5.1 Vulnerability in Schannel Could Allow Remote Code Execution (2992611)
(uncredentialed check)................................................................................................................ 9
5.2 SSL Version 2 & 3 and TLS Version 1.0 & 1.1 Protocol Detection ..................... 9
5.3 Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle
Weakness ...................................................................................................................................... 10
Confidential Page 3 of 11
Vulnerability Assessment and Penetration Testing Report
1. Introduction
This document summarizes the results of Vulnerability / Penetration tests conducted on the
given IP’s.
S. NO IP address Status
1 A.A.A.A Reachable
2 B.B.B.B Not Reachable
2. Scope
The aim of this project was to conduct the following activities
i. Gather Information
ii. Enumerate the network
iii. Establish Vulnerabilities
iv. Reporting details based on the information gathered
3. VAPT Methodology
Confidential Page 4 of 11
Vulnerability Assessment and Penetration Testing Report
Confidential Page 5 of 11
Vulnerability Assessment and Penetration Testing Report
Risk Description
Critical vulnerabilities provide attackers with remote root or administrator
Critical capabilities. Malicious users have the ability to compromise the entire host. Easy
to detect and exploit and result in large asset damage.
Exploitation of the vulnerability discovered on the system can directly lead to
an attacker to information allowing them to gain privileged access (e.g.,
High
administrator or root) to the system. These issues are often difficult to detect
and exploit but can result in large asset damage.
The vulnerability discovered on the system can directly lead to an attacker
gaining non-privileged access (e.g., as a standard user) to the system or the
Medium vulnerability provides access that can be leveraged within one step to gain
administrator-level access. These issues are easy to detect and exploit, but
typically result in small asset damage.
The vulnerability discovered on the system provides low-level, but sufficient
data to the attacker that may be used to launch a more informed attack against
Low the target environment. In addition, the vulnerability may indirectly lead to an
attacker gaining some form of access to the system. These issues can be difficult
to detect and exploit and typically result in small asset damage.
4. Summary of Findings
This report is based on following assumption
• On-site/Off-site Blackbox testing.
• No application testing.
• This report is based on tool-based testing and analysis is done with multiple level testing.
• The result of informational is not a part of this report, but can be provided, if required.
Confidential Page 6 of 11
Vulnerability Assessment and Penetration Testing Report
Confidential Page 7 of 11
Vulnerability Assessment and Penetration Testing Report
Severity Analysis
11% 11%
11%
67%
Confidential Page 8 of 11
Vulnerability Assessment and Penetration Testing Report
Severity : Critical
Description : The remote Windows host is affected by a remote code execution vulnerability.
Impact : The remote Windows host is affected by a remote code execution vulnerability
due to improper processing of packets by the Secure Channel (Schannel)
security package. An attacker can exploit this issue by sending specially crafted
packets to a Windows server.
Recommendation : Microsoft has released a set of patches for Windows 2003, Vista, 2008,
7, 2008 R2, 8, 2012, 8.1, and 2012 R2.
Reference :
5.2 SSL Version 2 & 3 and TLS Version 1.0 & 1.1 Protocol
Detection
Affected IP : IP 1 IP2
IP 3 IP4
Severity : High
Description : The remote service accepts connections encrypted using SSL 2.0 and/or SSL 3.0.
These versions of SSL are affected by several cryptographic flaws, including:
• An insecure padding scheme with CBC ciphers.
• Insecure session renegotiation and resumption schemes.
An attacker can exploit these flaws to conduct man-in-the-middle
attacks or to decrypt communications between the affected service and
clients.
Many web browsers implement this in an unsafe way that allows an attacker to
downgrade a connection (such as in POODLE). Therefore, it is recommended that
these protocols be disabled entirely.
NIST has determined that SSL 3.0 is no longer acceptable for secure
communications. As of the date of enforcement found in PCI DSS v3.1, any version
of SSL will not meet the PCI SSC's definition of 'strong cryptography.
Confidential Page 9 of 11
Vulnerability Assessment and Penetration Testing Report
Modern implementations of TLS 1.0 mitigate these problems, but newer versions
of TLS like 1.2 and 1.3 are designed against these flaws and should be used
whenever possible.
PCI DSS v3.2 requires that TLS 1.0 be disabled entirely by June 30,
2018, except for POS POI terminals (and the SSL/TLS termination
points to which they connect) that can be verified as not being
susceptible to any known exploits.
The remote service accepts connections encrypted using TLS 1.1. TLS 1.1 lacks
support for current and recommended cipher suites. Ciphers that support
encryption before MAC computation, and authenticated encryption modes such
as GCM cannot be used with TLS 1.1.
As of March 31, 2020, Endpoints that are not enabled for TLS 1.2 and higher will
no longer function properly with major web browsers and major vendors.
PCI DSS v3.2 still allows TLS 1.1 as of June 30, 2018, but strongly recommends the
use of TLS 1.2/1,3.
Impact : The remote service encrypts traffic using a protocol with known weaknesses.
Recommendation : Consult the application's documentation to disable SSL 2.0,3.0 &TLS 1.0 & 1.1. Use
TLS 1.2/1.3 (with approved cipher suites) or higher instead.
Reference :
Severity : Medium
Description : The remote version of the Remote Desktop Protocol Server (Terminal Service)
is vulnerable to a man-in-the-middle (MiTM) attack. The RDP client makes no
effort to validate the identity of the server when setting up encryption. An
attacker with the ability to intercept traffic from the RDP server can establish
encryption with the client and server without being detected. A MiTM attack
of this nature would allow the attacker to obtain any sensitive information
transmitted, including authentication credentials.
This flaw exists because the RDP server stores a hard-coded RSA private key in
the mstlsapi.dll library. Any local user with access to this file (on any Windows
system) can retrieve the key and use it for this attack.
Confidential Page 10 of 11
Vulnerability Assessment and Penetration Testing Report
Recommendation : • Force the use of SSL as a transport layer for this service if supported, or/and
• Select the 'Allow connections only from computers running Remote Desktop
with Network Level Authentication' setting if it is available.
Confidential Page 11 of 11