Upload
matt-hart
View
87
Download
0
Tags:
Embed Size (px)
Citation preview
PENETRATION TESTING AT GKN AEROSPACE
CONDUCTED BY: MATTHEW HART
TABLE OF CONTENTS
• Explanation of Penetration Testing
• Reason for Project
• Tools Used
• Results
• Recommendations
PENETRATION TESTING
• Penetration Test – an attack on a system(s) with the intention of
finding security weaknesses, potentially gaining access to the
system.
• Steps To The Test:
• Approval from IT, HR, and Security
• Information Gathering
• Exploitation
• Analyze Results
• Provide Recommendations
REASON FOR TEST
• Learning Experience
• Find Risks/Threats/Vulnerabilities Within Company
• Testing the ability of network defenders to successfully detect
and respond to the attacks
• Providing evidence to support security status at location
TOOLS USED
• Armitage in Metasploit Framewok
• NMAP and MSF Scanning
• Checking for Exploits
• Email Grabber
• TheHarvester
• The Social Engineering Toolkit
• GMAIL – ([email protected])
• Keyloggers (in Kali and Revealer Keylogger)
• SurveyMonkey
ARMITAGE RESULTS
• HTTP = Penetration\http attack.docx
• WEBAPP = Penetration\Webapp attacks.docx
• SMTP = image to the right (3 different exploits)
• WYSE = image below
EMAIL GATHERING/HARVESTING
• 13 emails found using
the console of
Metasploit and only
one was for a person
in the Cromwell
location. The others
were apart of another
location to the
company.
• 66 emails were found and 48 of them were unique. This means that some of the emails were found on different data sources.
• Therefore, this tool picked up more emails than the tool used inside the Metasploit console.
PHISHING AND SPEAR PHISHING
Usernames
• One user called Human Resources (the person the Phishing Emails were sent from, hypothetically) and inquired about email.
• One user viewed the email in the secure application required by the company for accessing email on a mobile device, Good for Enterprise. This application showed no sign of the email address that it was sent from and the address the link was to be directed to. The only way to find this out is to right-click against the link (to right-click on a phone you click and hold) then a submenu will appear and show the address of the link.
• Two people responded to the email address.
• 14/20 people received the emails.
• One user showed up as for accessing my website, but was never sent an e-mail.
• 11/14 people clicked on the link.
KEYLOGGER / WORKSTATION SECURITY / SURVEY
• Windows XP – Couldn’t see anything after the initial screen to
enter IP Address (used two different keyloggers)
• Windows Vista – Able to see everything from using Revealer
Keylogger. Averages:Unlocked = (about) 25Locked = (about) 17Being used = (about) 31
https://www.surveymonkey.com/results/SM-XTVBGFR/
RECOMMENDATIONS
Risk Training POLP Dual-Auth Group Policy Sys. Conf. Testing Notes
Phishing X X Spam Filtering
User Access X X X X ChangeAuditor/Change Software
RDC X X X X VPN/Idle Time
Workstation Sec. X X
Password Mgmt. X X History/Age(Max+Min)/Complexity
Ports X X Future State - Host Website/Quarterly
System Info. X Intrusion Dection Sys./Apply Lim. Sys In.
QUESTIONS?