11
PENETRATION TESTING AT GKN AEROSPACE CONDUCTED BY: MATTHEW HART

Penetration Test

Embed Size (px)

Citation preview

Page 1: Penetration Test

PENETRATION TESTING AT GKN AEROSPACE

CONDUCTED BY: MATTHEW HART

Page 2: Penetration Test

TABLE OF CONTENTS

• Explanation of Penetration Testing

• Reason for Project

• Tools Used

• Results

• Recommendations

Page 3: Penetration Test

PENETRATION TESTING

• Penetration Test – an attack on a system(s) with the intention of

finding security weaknesses, potentially gaining access to the

system.

• Steps To The Test:

• Approval from IT, HR, and Security

• Information Gathering

• Exploitation

• Analyze Results

• Provide Recommendations

Page 4: Penetration Test

REASON FOR TEST

• Learning Experience

• Find Risks/Threats/Vulnerabilities Within Company

• Testing the ability of network defenders to successfully detect

and respond to the attacks

• Providing evidence to support security status at location

Page 5: Penetration Test

TOOLS USED

• Armitage in Metasploit Framewok

• NMAP and MSF Scanning

• Checking for Exploits

• Email Grabber

• TheHarvester

• The Social Engineering Toolkit

• GMAIL – ([email protected])

• Keyloggers (in Kali and Revealer Keylogger)

• SurveyMonkey

Page 6: Penetration Test

ARMITAGE RESULTS

• HTTP = Penetration\http attack.docx

• WEBAPP = Penetration\Webapp attacks.docx

• SMTP = image to the right (3 different exploits)

• WYSE = image below

Page 7: Penetration Test

EMAIL GATHERING/HARVESTING

• 13 emails found using

the console of

Metasploit and only

one was for a person

in the Cromwell

location. The others

were apart of another

location to the

company.

• 66 emails were found and 48 of them were unique. This means that some of the emails were found on different data sources.

• Therefore, this tool picked up more emails than the tool used inside the Metasploit console.

Page 8: Penetration Test

PHISHING AND SPEAR PHISHING

Usernames

• One user called Human Resources (the person the Phishing Emails were sent from, hypothetically) and inquired about email.

• One user viewed the email in the secure application required by the company for accessing email on a mobile device, Good for Enterprise. This application showed no sign of the email address that it was sent from and the address the link was to be directed to. The only way to find this out is to right-click against the link (to right-click on a phone you click and hold) then a submenu will appear and show the address of the link.

• Two people responded to the email address.

• 14/20 people received the emails.

• One user showed up as for accessing my website, but was never sent an e-mail.

• 11/14 people clicked on the link.

Page 9: Penetration Test

KEYLOGGER / WORKSTATION SECURITY / SURVEY

• Windows XP – Couldn’t see anything after the initial screen to

enter IP Address (used two different keyloggers)

• Windows Vista – Able to see everything from using Revealer

Keylogger. Averages:Unlocked = (about) 25Locked = (about) 17Being used = (about) 31

https://www.surveymonkey.com/results/SM-XTVBGFR/

Page 10: Penetration Test

RECOMMENDATIONS

Risk Training POLP Dual-Auth Group Policy Sys. Conf. Testing Notes

Phishing X X Spam Filtering

User Access X X X X ChangeAuditor/Change Software

RDC X X X X VPN/Idle Time

Workstation Sec. X X

Password Mgmt. X X History/Age(Max+Min)/Complexity

Ports X X Future State - Host Website/Quarterly

System Info. X Intrusion Dection Sys./Apply Lim. Sys In.

Page 11: Penetration Test

QUESTIONS?