Computer Security Assignment 2.final
Computer Security Assignment 2.final
Student # 20794648
ABSTRACT
Nowadays, our society depends on Computer, Internet and Web
technologies than ever. Yet, with the growing complexity of hardware and
software, the vulnerabilities of the computer systems and a malicious intrusion
increases as well. News of leakage information appears day-to-day on the
Internet (INFOWATCH, 2018). These breaches may be costly to an organization –
the loss of money, reputation, products, customers, and even the complete
collapse of the company (Armerding, 2018). Thus, the demand for evaluating the
weaknesses of the system and addressing these security issues have become
critical for each organization over the world. This research seeks to examine the
multiple security weaknesses and threats of a new web-based store of Widgets
Inc. Consequently, the study offers a solution to improve the security level of the
server by conducting vulnerability testing and vulnerability assessment exploiting
Free Open Source Software (FOSS) and several useful tools. The research adopted
the Network and System Administrator's Best Practices which used in everyday
work process to investigate the breaches in the system and prevent malicious
intrusion. This paper aims to demonstrate a demand for system investigation and
a suitable methods against attackers. The components of the study included the
following instruments Oracle VM VirtualBox, Kali Linux, John-the-Ripper, Network
Mapper (Nmap) port scanning and Open Vulnerability Assessment Software
(OpenVAS).
General Terms
Free Open Source Software (FOSS), System Investigation, Vulnerability testing,
Vulnerability assessment, Malicious Detection, Virtual Machine image, Security
evaluation, Port Scanning, Fingerprinting.
1. INTRODUCTION
Currently, the information technology could be considered as one of the
primary resources for the progressive world. Indeed, the information technology
takes part almost in each aspect of a current lifetime. However, availability and
wide dissemination of information technologies make them extremely vulnerable
to harmful effect.
A threat to the security information means an action that can lead to the
destruction, distortion or unauthorized usage of IT resources (Stanley, 2010).
Presently, the importance of information protection has frequently become
recognized by the organizations (Basta, Basta and Brown, 2014). The more
information kept in the company, the more the problem of ensuring its security
among with the preventing unauthorized access to sensitive data and physical
destruction. Accordingly, the protection of digital data is one of the most
significant parts of the safe development system (Rhodes-Ousley, 2013).
This research seeks to cover all the security aspects on the server of
Widgets Inc such as the physical access, services and applications weaknesses,
and conduct a vulnerability assessment. The experiments combine the practical
techniques of detection vulnerabilities of hardware and software and provide
recommendations to mitigate weaknesses and enhance the security of the
system, according to the Network and System Administrators best practices
securing system.
2. BACKGROUND
2.1 Basic definitions in the field of information security
Weaknesses of an organization’s network is a kind of its weak points which
makes possible the damage to the system and the leakage of information. In
other words, these undesirable events occur as a consequence of defects in the
system.
An attack on a computer system is the actions used by attackers to find and
exploit a vulnerability in their favor (Brinkley and Schell, 1995).
The vulnerability testing is a process of evaluating the security weaknesses
of the IT infrastructure of a company through authorized tools and techniques
simulated malicious attacks.
The vulnerability assessment is the audit process of identifying weak points
of a computer system and security level of an organization's IT infrastructure; the
results of which indicate Confidentiality, Integrity and Availability (Metivier,
2017).
Harden/
Prepare Detect Respond Improve
Secure
Figure 1. The high-level steps of how to secure information and mitigate malicious intrusion,
according to CERT Network and System Administrator practices
Kali Linux
Harden/
Prepare Detect Respond Improve
Secure
/etc/passwd:
The cracking of this password has taken from John-the-Ripper about 14.5
seconds. This vulnerability is a critical weak point since a hacker can illegally
access the system anytime and compromise sensitive data. Moreover, the version
of the operating system has been identified using the command cat /etc/os-
release:
Throughout the research was carried out the imitation malicious intrusion
in order to estimate how attackers may use weaknesses and break into the
system. In this stage, the port scanning along with services printing, and the
availability of a firewall were identified using nmap with different flags. The
purpose of network scanning is determining opened, closed, filtered, unfiltered
ports and providing the detailed information of services running on the target
machine. Scans were used with switches -sS (SYN Stealth Scan) and -A (Aggressive
Scan). The SYN scan based on the response differentiates which ports were
listened or not, and identifies the existence of firewalls. An aggressive option
determines the version detection and other advanced features. The command
nmap -sS 192.168.10.21 -A was executed and outcomes were displayed in figure
11.1 and 11.2.
Figure 11.1. Results from Nmap port scanning
The standard SSH port 22 was opened and the fingerprints of host keys
were found. Host keys are cryptographic keys used for authentication computer
in the SSH protocol. The private keys should be accessible only to a system
administrator. However, if attackers gain a root access to the server, they may
obtain private host keys and perform for instance a DoS (Denial of Service) attack,
steal sensitive data, or access to files /etc/passwd and /etc/shadow and crack all
the network. The instructions of how cracked the password placed in paragraph
4.1. It is vital to keep the root password in reliable hands and regularly change
host keys (SSH Host Key - What, Why, How | SSH.COM, 2017). Also, the standard
HTTP port 80 was opened. The ports 3306 (mySQL database) and 8080 (HTTP) was
opened.
Figure 11.2. Results from Nmap port scanning
In the next stage, the ACK scan was performed to identify the existence of
firewalls. Figure 12 display results of the executed command nmap -sA
192.168.10.1. All 1000 scanned ports were unfiltered which means no perimeter
devices and firewalls were used to filter the data in the target machine.
Also, the detailed report of particular defects in the system was given.
Figure 14 models the full descriptions of vulnerabilities.
The operating system and the database proved to be the weakest link in
the system, a little less the severity of the risks related to the files located by
default on the servlet, sensitive data transmitted via HTTP and also the risks
associated with a simple algorithm.
5. THE RECOMMENDATIONS: RESPOND AND IMPROVE STEPS
5.1 Respond Step
On this step, the recommendation of how to mitigate the severity of
weaknesses and increase the security level of the server. Firstly, the main server
and the console of the system should be physically protected. The password from
a superuser account must be kept in reliable hands. Otherwise, attackers can
access the unsecured system, reset the root password and break into the system.
Also, it was mentioned above Ubuntu 12.04 has several vulnerabilities
which were addressed in updated realizes. It is crucial to update the current OS to
Ubuntu 18.04 (Cawley, 2018). During the installation of OS, the services and
packages should be minimized and only essential components should be installed.
As it was revealed earlier, firewall was not identified. The firewalls should be set
to protect transmitted data via Network.
Moreover, the password of the root account and other user passwords
must be secure and no set by default. The strong password should contain lower
and upper characters along with symbols such as ", @, !, #, ^ etc. The credentials
stored in plaintext were found in the host applications. These files should be
removed, oppositely attackers may access to sensitive data. Also, it is possible to
login in the MySQL database as a root with no password. It is significant to set the
secure password as soon as possible.
6. CONCLUSION
As the computer's IT infrastructure and the usage of Internet technologies
become complexity day-to-day, the maintaining the security level of systems
become challenging as well. Thus, the demand for the investigation threats to
systems and them mitigation and address are increased. Based on the results, it
can be concluded that research into a simulation environment of Widgets Inc has
been significant. Hence, while this research the security threats of Widgets Inc
server were investigated and proposed recommendations for reducing the
likelihood of malicious intrusion using FOOS tools, according to the best system
administration practices.
The proposed method can be readily used in practice. Therefore, it should
be considered of the benefits of this simulation test of Widgets Inc network by
developers while developing new products and by system and network
administrators during conducting the system investigation.
7. REFFERENCES