Final Penetration Testing Report
Final Penetration Testing Report
Executive Summary
The penetration test that was carried out over the targeting environments revealed loopholes at
risk because of poor configuration of systems, services, and password policies. Industry-standard
tools, such as Tenable Nessus, Nmap, Nikto, Hydra, and WebGoat, were used to simulate real-
world attacks in the course of the assessment. This report contains a detailed summary of
findings, the likely risk they pose, and recommendations for prevention or remediation.
Key Findings
1. Critical Vulnerabilities:
○ The presence of such services as Samba, vsftpd, and UnrealIRCd provides
outdated software versions, thus allowing RCE and unauthorized access.
○ Weak password policies enabled the attacks.
3. Policy Gaps:
○ No account lockout mechanism present.
○ Clear-text passwords are used for FTP and Telnet.
Recommendations
1. Updating outdated software along with patching.
2. Strengthening password policies and implementing multi-factor authentication.
3. Configuring more secure protocols (SSH instead of telnet).
4. Continually running updated software vulnerability scans.
Methodology
Tools Used
● Nessus: For exhaustive vulnerability scanning.
● Nmap/Nikto: For detecting open ports, services, and configuration issues.
● Hydra: For password-cracking simulations.
● WebGoat: To exploit common web application vulnerabilities.
Scope
The assessment included the following systems:
● Metasploitable: Simulated vulnerable host.
● Ubuntu Server: Hosting Apache services.
● Windows 11 VM: Configured with IIS and FTP services.
Findings and Analysis
1. Nessus Vulnerability Scanning
Summary:
Nessus identified 39 vulnerabilities across the target systems, categorized as follows:
● Critical: 10
● High: 15
● Medium: 9
● Low: 5
Detailed Findings