Preview

SEC 572 Week 1 iLab Network Attacks 0

Better Essays
Open Document
Open Document
1355 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SEC 572 Week 1 iLab Network Attacks 0
Network Attacks iLab 1 – Week 1

Targeted Attack on a Network Device

Submitted to: Dr. Charles Pak
SE572 Network Security
Keller Graduate School of Management
Submitted: September 07, 2014

Table of Contents

Executive Summary 3
Summary of Results 3-4
Details on Attack 5
Name of the Attack 5
Attack Discovery and Resolution Sates 5
Synopsis of the Attack 5
Vulnerable Target(s) for the Attack and Likely Victims 6
Probable Motivation(s) of the Attack 6
Probable Creators of the Attack 7
Deployment, Propagation or Release Strategy of the Attack 7
Published Countermeasures against the Attack 7
Published Recovery Techniques used to return to Normal Operations after the Attack 8
Recommended Incident Reporting Measures 8
Summary 8
References 9

Executive Summary

[Company] has been contracted to conduct a penetration test against [Organization] external web presence. The assessment was conducted in a manner that simulated a malicious actor engaged in a targeted attack against the company with the goals of:
Identifying if a remote attacker could penetrate [Organization] defenses.
Determining the impact of a security breach on:
The confidentiality of the organization’s customer information.
The assessment was conducted in accordance with the recommendations outlined in NIST SP 800-115 (Technical Guide to Information Security testing and Assessment). The results of this assessment will be used by [Organization] to drive future decisions as to the direction of their information security program. All test and actions were conducted under controlled conditions. (Security O. , 2012)
Summary of Results
Network reconnaissance was conducted against the address space provided by [Organization] with the understanding that this space would be considered the scope of this engagement. It was determined that the organization maintains a minimal external presence, consisting of an external web site and a hosted mail service. This constituted a small attack



References: Name of the Attack It is called the Heart Bleed Bug because Bug is in the OpenSSL 's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520) This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. (Codenomicon, 2014) Probable Creators of the Attack This is an implementation problem, i.e. programming mistake in popular OpenSSL library that provides cryptographic services such as SSL/TLS to the applications and services. (Codenomicon, 2014) Deployment, Propagation or Release Strategy of the Attack Exploitation of this bug does not leave any trace of anything abnormal happening to the logs. (Codenomicon, 2014) Summary Codenomicon. (2014, April 04). Heart Bleed. Retrieved from Heart Bleed: http://heartbleed.com/ CVE Database, N. V. (2014, April 07). National Cyber Awareness System. Retrieved from http://web.nvd.nist.gov/: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160 Security, O

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    4. Before you conduct an ethical hacking process or penetration test on a live production network, what…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    1. A written report of the identified vulnerabilities, exploits, and remediation steps covered in this lab;…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw250 Week 1 Ilabs

    • 290 Words
    • 2 Pages

    Answer: Chat session was not possible due availability of students, however I did send out request for chat sessions for three or four days.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Huffman Trucking

    • 4242 Words
    • 17 Pages

    Existing security functionality will be measured by comparing performance parameters currently available in/on the existing security applications with current global standards. A determination of how much security required…

    • 4242 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Robot/intermediary process is a form of attack that is lunched on one computer but attacks another computer.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    1. Why is it critical to perform a penetration test on a web application prior to production Implementation?…

    • 486 Words
    • 2 Pages
    Good Essays