AY2021/2022
ETHICAL HACKING & INTRUSION PREVENTION CASE STUDY
ETHICAL HACKING & INTRUSION PREVENTION (CCD2C03) SUBJECT LEVEL: 2
INSTRUCTIONS TO CANDIDATES
1. Part I – Vulnerability Assessment & Penetration Testing (30% Individual)
Vulnerability Assessment & Penetration Testing Scenario
Vaptlab is a cybersecurity company with its core business in the penetration testing. You have joined this company as a cybersecurity analyst as part of Temasek Polytechnic Student Internship Programme. You have been working there for a while and your supervisor is satisfied with your overall performance. Your supervisor is exploring the option of hiring you as a full-time employee. However, before he can do so, the company director wanted to test your knowledge and competencies in ethical hacking.
Your supervisor would like you to perform a penetration test on one of their virtual machines housed within their Cyber Range.
General Requirements
You are provided with the following information to connect to Vaptlab DR infrastructure:
Cyber Range Environment
The environment that are you doing penetration is as shown in the diagram below.
You will be provided with 5 virtual machine samples. These samples contain different types of vulnerabilities. Each team members are to choose 1 unique sample out of the 5. Your task is to perform a vulnerability assessment on it and exploit it’s vulnerabilities. Document your exploitations using the tables provided in Appendix A. Vulnerabilities that are listed but not exploited by you will not be awarded any marks.
You are NOT to perform penetration testing beyond the Case Study scope, such as scanning of other networks and systems. Anyone caught doing so could result in immediate failure of this subject and possible disciplinary action by the school.
2. Part II – Penetration Testing Research (10% Group)
Penetration testing plays an important role in ensuring cybersecurity policies and measures are implemented properly. For this part of the case study, you are to work as a group and research on 1 of the following topics: -
Do note that you are not limited by the above list. If there is a topic that your team would like to research on that is no in the above, please free feel to consult your tutor. You are to produce a 1-2 pages report detailing your research based on your chosen topic.
3. Report Requirements
Your team is to prepare and submit a report as well as present your key findings to the company director covering your Part I and II activities.
1. Each group must provide a softcopy of the report to the tutor during the lab session
2. Your report shall minimally include the following sections
3. For the reporting of Vulnerabilities Assessment Detail by <Student Name> section, do note that all fields in the table are needed for the report submission. Refer to the vulnerabilities assessment detail table in Appendix A for the details. During presentation, you will be asked to demonstrate your exploitation method. If you are unable to demonstrate successfully, the affected vulnerability finding may not be awarded any marks.
4. Marks will be awarded for:
5. Generally, your report must be formatted with the following requirements:
Name the report using the following format: EHIP-P<Practical class number>Group<Group number>, e.g. EHIP-P01-Group01 for Practical class number 01 and Group number 01
6. Be warned that plagiarism is a serious offence!
4. Presentation Requirements
Each group will be given approximately 30 minutes for their presentation. The presentation process is as follows:
Appendix A
Table 1 - Summary of Security Vulnerabilities Assessment by <Student Name>
No. |
Hostname |
OS |
No. of Exploits |
Item No. |
Exploit Name |
1 |
Machine 1 |
Windows |
2 |
5.1 |
SMB service |
5.2 |
PnP service |
Table 2 - Vulnerabilities Assessment Details by <Student Name>
Item No: x.x |
Finding Name |
Risk Rating |
Critical/High/Medium/Low/Info |
CVSSv3 Score |
Base: 5.5 Temporal: 5.0 |
CVSSv3 Vectors |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:C |
Description |
The background information of this finding |
Impact |
What can you do with this finding? |
Affected Assets |
192.168.56.103:445 192.168.56.101:445 |
Technical Details |
|
• This section should document your actual pen-test steps and results • There should be evidence that substantiate every claim made in the Impact section: - o Scan result such as OS version, Service open, App version, IP address, MAC address o User list, passwords, obtain shell, escalated privilege etc. • Other valuable information: - o Screen captures and commands should be included with the description and explanation for them The reader must be able to replicate and demo the result by following your steps in this section. |
|
Recommendation |
e.g. Patch to version x |
References |
State the hyperlinks of the followings (if applicable): - • Tools used • Your references/research of this vulnerability, exploit and resolution here. • CWE/CAPEC/CVE/OWASP references. |
Follow Us