Begineer & Intermediate Task (Rohit Roy)
Begineer & Intermediate Task (Rohit Roy)
Begineer & Intermediate Task (Rohit Roy)
SHADOWFOX
BATCH NO :2nd May
OBJECTIVE : Find all the ports that are open on the website http://testphp.vulnweb.com/
EXECUTIVE SUMMARY:
The purpose of this assessment was to analyze the security posture of the
website "www.vulnweb.com" by identifying any open ports that could potentially be
exploited by malicious actors. This assessment aims to provide valuable insights into the
website's vulnerabilities and assist in implementing necessary security measures.
INTRODUCTION:
ANALYSIS:
Port 21/tcp (FTP):
The FTP (File Transfer Protocol) service is open on port 21, indicating the possibility of
transferring files to and from the server. It is crucial to ensure that proper access controls and
security measures are implemented for FTP to prevent unauthorized access and data breaches.
Port 80/tcp (HTTP):
The HTTP service is open on port 80, which typically indicates the presence of a web server.
The server is running Nginx version 1.19.0. It is essential to keep web servers updated with the
latest security patches to mitigate potential vulnerabilities.
SECURITY
SECURITY MEASURES:
• Regularly update software and apply security patches to mitigate known vulnerabilities.
• Implement strong access controls and authentication mechanisms, especially for services like FTP.
• Employ firewalls to restrict access to unnecessary ports and services.
• Conduct regular security assessments, including port scanning, to identify and address
Scanning:
• Link: http://testphp.vulnweb.com/
The port scan revealed two open ports on the target website
www.vulnweb.com - port 21/tcp for FTP and port 80/tcp for HTTP
running Nginx version 1.19.0. It is imperative for the website
administrators to prioritize security measures and implement
appropriate controls to safeguard against potential threats and
breaches.
ACKNOWLEDGMENT OF LIMITATIONS
This report is generated for informational purposes only. The port scan
was conducted within ethical boundaries and without malicious intent.
It is recommended to obtain proper authorization before performing any
security assessments on external systems. This concludes the report on
the port scan of the website www.vulnweb.com.
TASK 2
OBJECTIVE:
Brute force the website http://testphp.vulnweb.com/ and find the
directories that are present in the website.
EXECUTIVE SUMMARY:
A brute force attack is a type of cyber attack in which an attacker attempts to gain
TASK 3
OBJECTIVE:
OBJECTIVE:
Executive Summary:
This report summarizes the findings of a network traffic analysis conducted on
http://testphp.vulnweb.com/ using Wireshark. The investigation uncovered critical
vulnerabilities, notably the transmission of login credentials in plain text, posing a
significant security risk.
INTRODUCTION:
The objective of this report is to document the process of intercepting network
traffic on the website http://testphp.vulnweb.com/ using Wireshark to uncover
the credentials transmitted during the login process. This analysis aims to highlight
the importance of securing sensitive information transmitted over the network
and enhancing overall cybersecurity measures.
REQUIREMENTS SOFTWARE AND HARDWARE:
Software:
• Firefox
• Kali linux
• Wireshark
Hardware:
Standard computer system with network connectivity Step 1: Open Wireshark tool
in in Linux virtual machine. and start capturing the network.
Step 2:
After starting the packet capturing we will go to the website and login the
credential on that website. Here I am giving
Username: test
Password: test
Step 3:
Stop Capture the packets
Step 4:
Wireshark has captured some packets but we specifically looking for HTTP packets. so in the
display filter option we use some command to find all the captured HTTP packets.
CONCLUSION:
OBJECTIVE:
• VeraCrypt Tool
• Crack Station Hash Online Tool
• Windows Operating System
Hardware:
SECURITY MEASURES:
• Ensure all decryption activities are conducted within legal and ethical boundaries.
• Obtain proper authorization before attempting to decrypt files or crack passwords.
• Exercise caution when handling sensitive information.
• Consider implementing robust encryption practices to safeguard data
OUTPUT:
Through the described process, the encrypted file was successfully decrypted
using the decoded password obtained from the encoded.txt file. The secret code,
"never give up," was extracted from the decrypted file. It's essential to emphasize
the importance of ethical conduct and legal compliance when handling encrypted
files and passwords.
ACKNOWLEDGMENT OF LIMITATIONS:
It's important to note that attempting to crack passwords or decrypt files without
proper authorization may violate laws and ethical guidelines. This report assumes
the process was conducted within legal and ethical boundaries with proper
authorization.
TASK 2
OBJECTIVE:
The objective of this report is to determine the entry point address of the
VeraCrypt executable using the PE Explorer tool.
INTRODUCTION:
In today's digital landscape, encryption is vital for protecting sensitive data.
VeraCrypt is a leading encryption software known for its strong security features.
This report focuses on using the PE Explorer tool to find the entry point address of
VeraCrypt's executable file. This address is crucial for understanding how
VeraCrypt starts running. By pinpointing this address, we gain valuable insights
into VeraCrypt's inner workings, enhancing our ability to analyze and secure
sensitive information.
REQUIREMENT SOFTWARE AND HARDWARE:
Software:
• PE Explorer • Windows OS
Hardware:
• Computer with sufficient processing power and memory to run the PE Explorer too smoothly.
METHODOLOGY:
Step 1:
• Click on "Open File" to initiate a dialogue box for selecting the file.
Step 3:
Identify Entry Point Address: • Within the header information, locate the entry
point address of the VeraCrypt executable. • Note down the address for further
reference.
ANALYSIS RESULTS:
SECURITY MEASURES:
OUTPUT:
Using the PE Explorer tool, the entry point address of the VeraCrypt
executable was successfully identified. This address serves as a critical
reference point for understanding the execution flow of the VeraCrypt
application.
ACKNOWLEDGMENT OF LIMITATIONS:
The information provided in this report is intended for educational and research
purposes only. Any use of the techniques described herein should be conducted in
accordance with applicable laws, regulations, and ethical guidelines. The author
and associated parties shall not be held responsible for any misuse or
unauthorized use of the information presented in this report. Readers are
encouraged to exercise caution and discretion when applying the methods
discussed swamy ganesh
TASK 3
OBJECTIVE:
The objective is to demonstrate the execution of a reverse shell payload on a
victim's machine, showcasing the process of crafting, delivering, and exploiting
the payload. Through this exercise, we aim to emphasize the importance of
proactive cybersecurity measures and raise awareness about the risks associated
with unsecured systems. By understanding the techniques used by attackers,
organizations can better protect their assets and mitigate potential security
breaches.
INTRODUCTION:
Software:
Hardware:
• Attacker Machine: Multi-core processor, 8 GB RAM recommended.
• Victim Machine (Windows): Dual-core processor, 4 GB RAM
recommended.
Note:
Part One
3. In the browser tab, type the IP address of the Kali machine (e.g.,
10.60.0.7).
4. Access the HTTP web server directory and locate the payload.exe file.
5. Click on payload.exe and proceed through any download caution
notifications, keeping the file and allowing it to run.
Part Four
This Meterpreter session will have complete control over the Windows
victim machine.
1. After executing the payload, the Kali machine receives a
request and creates a Meterpreter session with the Windows
victim machine.
:I
Use the command “keyscan_dump” to reveal the logged
keystrokes. 6.
.
Conclusion
We just performed a reverse shell attack using Metasploit Framework to
gain access to the Windows 10 target machine from the Kali Linux
attacker.