0% found this document useful (0 votes)
142 views3 pages

Kioptrix Level 1 Reporting Penetration Test Findings

Kioptrix Level 1 Reporting penetration test findings

Uploaded by

Jojo Koko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
142 views3 pages

Kioptrix Level 1 Reporting Penetration Test Findings

Kioptrix Level 1 Reporting penetration test findings

Uploaded by

Jojo Koko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Penetration Testing Report

Target: Kioptrix Level 1


Test Conducted by: Muhammed Apdulkawi Aly

Executive Summary:

This report details the findings of a penetration test conducted on the Kioptrix Level 1 virtual
machine. The primary goal of the test was to identify vulnerabilities that could be exploited by
an attacker to gain unauthorized access or escalate privileges.

The assessment revealed several security weaknesses, including outdated software versions,
improper service configurations, and weak credentials. By leveraging these vulnerabilities, we
were able to achieve root-level access to the system.

Scope:

 Target: Kioptrix Level 1 (192.168.152.129)


 Test Type: Black-box “I got no idea how the system's internal workings”
 Tools Used: Nmap, Nikto, Metasploit, Hydra

Methodology:
Reconnaissance:

In this initial phase, we gathered information about the target system, focusing on identifying
live hosts, open ports, and the services running on the target machine. This step helps understand
the attack surface.

 Tool: Nmap
 Objective: Identify open ports and services.
 Command: nmap 192.168.152.129

Vulnerability Analysis:

Identification of exploitable services using nmap scripts.

Exploitation:

Conducted using Metasploit Framework and manual techniques to exploit vulnerabilities.

Post-Exploitation:
Focused on privilege escalation by identifying kernel vulnerabilities and leveraging weak
configurations for root access.

Technical Findings:
1. Service Enumeration (Port Scanning)

Tool Used: Nmap


Command: nmap 192.168.152.129

PORT STATE SERVICE

22/tcp open ssh

80/tcp open http

111/tcp open rpcbind

139/tcp open netbios-ssn

443/tcp open https

32768/tcp open filenet-tms

2. Samba Vulnerability

Tool Used: Metasploit


Exploit Used: use auxiliary/scanner/smb/smb_version

 Vulnerability: Samba 2.2.1a


 Details: The Samba service is vulnerable to command injection, allowing remote
attackers to execute commands with root privileges.
 Impact: Successful exploitation leads to root access to the system.

Exploit Attempt (Samba UsrMap Script):

1. Using Metasploit, we executed the Samba exploit:

use auxiliary/scanner/smb/smb_version
set RHOST 192.168.152.129
run

2. The exploit succeeded, providing a root shell on the target system.


Remediation Recommendations:
1. Update Services: Ensure all services, updated to their latest secure versions to Prevent
known vulnerabilities.
2. Disable Unused Services: If services such as Samba or NetBIOS are not required,
disable them to reduce the attack surface.
3. Network Segmentation: Segment critical services like SSH behind firewalls and limit
access based on need-to-know policies.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy