Hand On Practical Ethical Hacking
Hand On Practical Ethical Hacking
1. Cisco IOS, iOS XE, and iOS XR Software SNAIP Denial of Service
o This advisory likely addresses vulnerabilities in Cisco's IOS, IOS XE, and IOS
2. Cisco Secure Client for Windows with Secure Firewall Posture Engine DLL
o This advisory concerns a DLL hijacking vulnerability in the Cisco Secure Client
for Windows, which could be exploited if an attacker places a malicious DLL in a specific
location.
Appliances TCP UDP Snort 2 and Snort 3 Denial of Service Vulnerability (2024 October 23)
geolocation-based access control lists (ACLs) in Cisco Firepower Threat Defense Software.
6. Cisco Adaptive Security Appliance and Firepower Threat Defense Software KEx2
Remote Access VPN Brute Force Denial of Service Vulnerability (2024 October 23)
o This advisory covers a vulnerability that could allow brute force attacks leading to
Cisco IOS XE Software for Wireless Controllers could allow an unauthenticated, adjacent
2. CVE-2024-20480
o Description: A vulnerability in the DHCP Snooping feature of Cisco IOS XE
Software on SD-Access fabric edge nodes could allow an unauthenticated, remote attacker to
o Impact: An attacker could cause the device to exhaust CPU resources, requiring a
3. CVE-2024-20467
IOS XE Software could allow an unauthenticated, remote attacker to cause a DoS condition.
condition.
4. CVE-2024-20464
of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a DoS
condition.
condition.
5. CVE-2024-20455
o Description: A vulnerability in the traffic classification process for the Unified
Threat Defense (UTD) component of Cisco IOS XE Software could allow an unauthenticated,
condition.
6. CVE-2024-20437
7. CVE-2024-20436
Software when the Telephony Service feature is enabled could allow an unauthenticated, remote
o Impact: An attacker could cause the affected device to reload, resulting in a DoS
condition.
Activity 13-2
The configuration file for the Linux Web Server in OpenCanary enables the following
o Port: 21
o Port: 80
o Port: 8022
These ports and services are configured to simulate a Linux web server environment.
between Linux/Unix and Windows systems by enabling file and print sharing. While the file
doesn’t explicitly list the ports, Samba typically operates on two key ports: Port 139 for NetBIOS
Session Service, which facilitates SMB communication, and Port 445 for direct SMB over
TCP/IP, bypassing the need for NetBIOS. These ports allow Windows clients to seamlessly
access shared files and printers on a Linux/Unix server, making Samba a powerful ally in mixed-
OS environments.
In the configuration, the [myshare] section defines a shared directory with a playful
comment, "All the stuff!" This share points to the /samba directory, allowing guest access and
making it browseable, though it’s set to read-only to prevent unauthorized modifications. The
configuration also includes advanced auditing features using the full_audit module, which logs
the local7 facility and can be redirected to /var/log/samba-audit.log using rsyslog, ensuring that
capabilities, making it an excellent companion for security tools like OpenCanary. By monitoring
these logs, you can detect and analyze suspicious activities, turning your Samba server into both
a functional file-sharing hub and a vigilant security sentinel. Whether you’re sharing documents
or safeguarding your network, this configuration ensures you’re well-equipped for both tasks.
The configuration file for the MySQL Server in OpenCanary enables two specific ports,
each serving different software to simulate a realistic server environment. The MySQL service is
configured to run on port 3306, presenting a banner that identifies it as version "5.5.43-
0ubuntu0.14.04.1." This mimics a genuine MySQL server, which is commonly used for database
management. Additionally, the SSH (Secure Shell) service is enabled on port 22, with a version
each serving different software to simulate a realistic server environment. The Microsoft SQL
Server (MSSQL) service is configured to run on port 1433, with a version identifier set to
"2012," mimicking a genuine MSSQL database server commonly used for data storage and
management. Additionally, the Remote Desktop Protocol (RDP) service is enabled on port 3389,
simulating a Windows Remote Desktop service that allows remote access to a system.
By enabling these ports and services, OpenCanary creates a deceptive environment that
can attract and detect potential attackers. The simulated MSSQL and RDP services trick attackers
into believing they are interacting with real systems, allowing security professionals to monitor
and analyze malicious activities. This setup is handy for identifying attack patterns and gathering
Host Status
Host Availability: The host at 172.20.10.9 is active and reachable, with a response
latency of 0.0030 seconds. This confirms that the host is operational and connected to the
network.
The scan detected four open TCP ports on the target host, each associated with specific
services:
o Significance: This port is typically used for web servers. An open HTTP port
indicates that the host is likely hosting a website or web application. This is a common area of
interest for security assessments, as web services can often contain vulnerabilities that may be
exploited.
systems. An open MSRPC port can be a potential security risk, particularly if the service is
o Significance: NetBIOS is commonly used for file and printer sharing in Windows
networks. An open NetBIOS port can pose a security threat, as it may allow unauthorized access
o Significance: This port is associated with the SMB (Server Message Block)
protocol, which is used for file sharing and network browsing. Attackers often target open SMB
Filtered Ports
Filtered Ports: The scan identified 996 filtered TCP ports. These ports did not
respond to Nmap's probes, likely due to being blocked by a firewall or other network filtering
mechanisms.
CVE-2024-10180 affects the Contact Form 7 – Repeatable Fields plugin for WordPress.
This vulnerability allows for Stored Cross-Site Scripting (XSS) via the plugin’s field_group
shortcode in versions up to and including 2.0.1. The issue arises from insufficient input
with contributor-level access or higher to inject arbitrary web scripts. These scripts execute
bypass via a crafted BZ2 Checksum field in an archive. This vulnerability affects versions before
1294 of several ESET products, including Smart Security Premium, Internet Security, NOD32
Antivirus, and others. The flaw could enable attackers to bypass virus detection mechanisms,
CVE-2019-10180 involves a vulnerability in all pkt-core 10. x.x versions, where the
Token Processing Service (TPS) fails to sanitize several parameters stored for tokens properly.
This oversight can lead to a Stored Cross-Site Scripting (XSS) vulnerability, allowing attackers
to modify token parameters and trick authenticated users into executing arbitrary JavaScript
code.
aside this identifier for a future security announcement. Details will be provided once the issue is
publicized.
of Oracle E-Business Suite. Affected versions include 12.1.3, 12.2.3, 12.2.4, 12.2.5, and 12.2.6.
This easily exploitable vulnerability allows unauthenticated attackers with network access via
HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human
interaction and can result in unauthorized access to critical data or complete control over
CVE-2016-10180 highlights an issue with the D-Link DWR-932B router, where WPS
PIN generation is based on stand(time(0)) seeding. This weak seeding mechanism can be
comments.php in Simplog 0.9.3.2 and possibly earlier versions. Remote attackers can inject
arbitrary web script or HTML via the charms (Name) or email parameters, leading to potential
security breaches.
Simplog 0.9.3.2 and possibly earlier versions. This flaw allows remote attackers to hijack the
authentication of administrators and users, enabling them to change passwords without
authorization.