Ethical Hacking and Defence
Assignment 2
Assessment Notes:
· Kali Linux is available as a virtual machine on the Unit Resources section of Blackboard
Task
You are to infiltrate the provided system and attain root level privileges. Additionally there are five flags, these flags are represented as values and are awarded at each point of system compromise. Look for them in home directories, web pages etc.
You are to write a report outlining each test / attack run against the system and the result. You must follow a process, which should be defined prior to the commencement of testing. Your report should include the flags as well as any credentials you uncover as part of your hacking endeavours.
Note: You must compromise the system over the network, local, physical or other attacks requiring direct interaction with the target system are not valid for the purposes of the assignment.
Example flag: chahNaelia9zohlaseiPaich0QuoWoh8ohfaenaiQuaetaebushoakarai6lainohjongoneesoocahdei6guosiethae7uwuu5Kaid9eisah8EChoo4kaiGh2eit2mu
Postgraduate students: You must also write the following software and include it as part of your submission:
· Basic TCP port scanne
· Password cracker (of the type required to complete the case study)
Submission Requirements
You must include the following in your submission:
· Your report containing:
· Cover Page
· Table of Contents
· Executive Summary
· Defined Methodology
· Testing Log (should allow repeatability)
· Results & Recommendations
· Postgraduate Students:
· Your source code for tools used
· Compilation and usage instructions
· Case Study Virtual Machine
You can download the case study virtual machine here: https:
cloudstor.aarnet.edu.au/plus/s
3wMqazCPkMJT2X
Notes:
· You can log in with the following credentials. These should only be used to run the ifconfig command and determine the virtual machine's IP address. You may not use this account as part of your compromise for case study purposes.
1. username: debug
1. password: debug
. You can unpack the archive with the 7zip software
. You can run the virtual machine with VMWare Workstation or VMWare Fusion which are available for free at the below address
3. http:
vmap.ssci.ecu.edu.au
·
Case Study Flag Hints
Select/highlight the text below in order to view the hints.
Flag 1) Examine the contents of the web server, what username and password might an admin use?
Flag 2) Learn about web shells, how can you disguise one to look like an image?
Flag 3) There is a password you can crack near to flag2.
Flag 4) A user made a mistake entering their password, see where you can find it!
Flag 5) Learn about priv escalation https:
log.g0tmi1k.com/2011/08
asic-linux-privilege-escalation
Are you having trouble finding the IP address of the case study virtual machine? You can log in with the following credentials and run the "ipconfig" command.
Username: debug
Password: debug