Network Hardening of Multilayer Switch

Total Page:16

File Type:pdf, Size:1020Kb

Network Hardening of Multilayer Switch M¨alardalenUniversity School of Innovation Design and Engineering V¨aster˚as,Sweden Thesis for the Degree of Bachelor of Science in Engineering - Computer Network Engineering 15.0 hp NETWORK HARDENING OF MULTILAYER SWITCH David S¨oderman [email protected] Peter Pekkanen [email protected] Examiner: Johan Akerberg˚ M¨alardalenUniversity, V¨aster˚as,Sweden Supervisors: Shunmuga Priyan Selvaraju M¨alardalenUniversity, V¨aster˚as,Sweden Company supervisor: Patrik Lundgren, Westermo Network Technologies, V¨aster˚as May 26, 2021 D S¨odermanP Pekkanen Network Hardening of Multilayer Switch Abstract In today's computer networking and industrial networking, security holds a significant role in keep- ing the entire network safe from malicious users or attackers from remote locations. Using vulner- ability scanners and a port scanner it is possible to detect vulnerabilities on the network equipment before an attacker finds the vulnerability and exploits it. In this thesis network hardening has been conducted through a case study on a multilayer switch, with the intent to discover vulnerabilities related to gaining unauthorized access to the device during operation. The tools included in this process involves vulnerability scanner Nessus, Metasploit project and Nmap to cover a wide scope of known vulnerabilities detectable with these tools. The results gathered from the vulnerability scans detects vulnerabilities on the device of various types that could assist an attacker, as they tried to breach the device, this method to approach network hardening shows that different types of vulnerabilities can be detected on the device. To be able to detect more in-depths vulnerabilities and being able to track distinct attacks such as Denial of Service (DoS) additional tools needs to be added to cover a wider scope of attack vectors on the device. With further enhancements to the set of tools to detect vulnerabilities, it will be able to cover a much larger scope of different attack vectors and contribute more towards finding vulnerabilities. i D S¨odermanP Pekkanen Network Hardening of Multilayer Switch Table of Contents 1. Introduction 1 2. Background 2 2.1. Lynx 5512-E-F4G-T8G-LV...............................2 2.2. Westermo Operating System (WeOS).........................2 2.3. IEC 62443-4-2 draft...................................2 2.4. Metasploit project....................................2 2.5. Nmap...........................................2 2.6. Nessus...........................................3 2.7. Wireshark.........................................3 3. Related Work 3 3.1. The HAVECA-model: a method for continuously securing the internal network against a trusted third party..............................3 3.2. Network Hardening An Automated Approach To Improving Network Security...3 3.3. Penetration Testing: Concepts, Attack Methods, And Defense Strategies.....4 3.4. Protection Against Penetration Attacks Using Metasploit..............4 4. Problem Formulation4 5. Method 6 6. Ethical and Societal Considerations7 7. Vulnerability Testing8 7.1. Typology Mapping....................................8 7.2. Selection Of Exploits...................................8 7.3. Metasploit Exploits....................................9 7.3..1 Setup Process Metasploit............................9 7.4. Nesssus Plugins...................................... 10 8. Results 11 8.1. Metasploit Implementation............................... 11 8.2. Nessus Implementation.................................. 11 8.3. Vulnerabilities....................................... 12 9. Discussion 14 10.Conclusion 15 References 16 A Appendix Metasploit 16 B Appendix Nessus 16 List of Figures 1 Workflow Chart......................................6 2 Topology.........................................8 3 Metasploit Testing Result................................ 11 4 Nessus Testing Results.................................. 12 ii D S¨odermanP Pekkanen Network Hardening of Multilayer Switch 1. Introduction Network hardening is the process that involves securing a network through reducing the possible attack vectors. For example, in a traditional network private active management interface on a router could be exposed to a public network due to misconfiguration of the router. This exposes a major vulnerability for the network device that allows for anyone to connect themselves to the interface and access the management network. Through network hardening, vulnerabilities such as the forementioned vulnerability or other similar vulnerabilities in the system can be detected and resolved before a hacker finds the vulnerability and exploits it. For this thesis, we are performing network hardening on a Lynx-5512-E-F4G-T8G-LV multilayer switch running a Linux kernel as its core, developed by Westermo Network Technologies [1]. he device is a gigabyte multilayer switch, supporting ethernet in layer 2 (Data Link Layer) and IP (Internet Protocol) in layer 3 (Network Layer) according to the OSI-model [2]. The goal is to discover vulnerabilities related to gaining unauthorized access on the device. To achieve our goals, we will study related works in network hardening. This will inform us how previous studies has been performed in network hardening. Once we obtain enough information how its performed, we will adjust the method used in related works and applying the method towards the research questions of this thesis. We will work directly with the device to perform a case study using two vulnerability scanners in various active configurations of the device. These scans are meant to yield data showing possible vulnerabilities on the active configuration of the device. After our case study, we will construct an attack graph, giving us an overview of the detected vulnerabilities. Working with the attack graph, we will systematically analyse the vulnerabilities and propose solutions how each vulnerability can be resolved. Previous works have not been related to this specific device. This leaves an opportu- nity for a study to be conducted in network hardening for this specific device as expected by the industrial case provider. Yielding interesting data on how to approach hardening on a network device running a Linux kernel as its core, that is not as widely known for the public. The method of testing our network device will also apply to other Linux systems that performs networking on both layer 2 and layer 3 following the OSI-model [2]. The results of the thesis will also assist the company to certify the device according to the IEC 62443-4-2 cybersecurity standard, and further improvement of the security on the device. The thesis is organized as follows: Section 2 introduces the device to perform the network harden- ing on, the IEC 62443-4-2 standard and the tools used to perform the vulnerability scans. Section 3 analyses previous works related to network hardening. Section 4 explains the purpose of the thesis and introduces the research questions to answer and the limitations. Section 5 describes the method of choice for the thesis. Section 6 explains the ethical and societal considerations. Section 7 presents the topology and how the vulnerability scans are performed on the network device. Section 8 presents the results and implications of each vulnerability discovered. Section 9 discusses the work that has been performed and the challenges faced throughout the thesis. Section 10 concludes the thesis and presents future directions. 1 D S¨odermanP Pekkanen Network Hardening of Multilayer Switch 2. Background This section will describe the device to perform network hardening on, the IEC standard and the tools used in this thesis to perform hardening on the device. 2.1. Lynx 5512-E-F4G-T8G-LV Lynx 5512-E-F4G-T8G-LV [1] is a high-performance industrial gigabit multilayer switch developed by Westermo Network Technologies. Ideal implementations of this device are within an industrial network, to handle big data and to accomplish high bandwidth requirements within the industrial network. The device is designed to withstand temperatures between -40°C and 70°C, making it ideal to withstand harsh environments within various industrial networks. The device runs the operating system (OS) Westermo Operating System 5 (WeOS5) [3]. 2.2. Westermo Operating System (WeOS) The OS on the Lynx is developed with a Linux kernel as its core. The OS is developed towards being simple to configure and support both new and legacy networking protocols. The OS is capable of handling both layer 2 and layer 3 functionality within a computer network according to the OSI-model [2]. Within layer 2 the device offers various types of services common within a computer network, such as layer 2 switching, Quality of Service (QoS), Internet Protocol (IP) host services and network services. Layer 3 functionality of the device is developed to support IP Routing. Regarding layer 3 security on the device, it supports Secure Sockets Layer (SSL), Virtual Private Network (VPN), specifically OpenVPN and Generic Routing Encapsulation (GRE). 2.3. IEC 62443-4-2 draft For this thesis, the access to the standard IEC 62443-4-2 [4] is restricted. This restriction causes the problem of only getting access to a draft of the standard from July 2015. Moving on with this thesis it will be based on the draft. IEC 62443-4-2 is a standard for security for industrial automation and control systems. The standard provides a series of detailed technical control system requirements necessary to secure an industrial system. Using the information within the standard,
Recommended publications
  • Oracle with Metasploit
    Oracle Penetration Testing Using the Metasploit Framework Chris Gates & Mario Ceballos Metasploit Project Abstract Over the years there have been tons of Oracle exploits, SQL Injection vulnerabilities, and post exploitation tricks and tools that had no order, methodology, or standardization, mainly just random .sql files. Additionally, none of the publicly available Pentest Frameworks have the ability to leverage built- in package SQL Injection vulnerabilities for privilege escalation, data extraction, or getting operating system access. In this whitepaper we will present an Oracle Pentesting Methodology and give you all the tools to break the "unbreakable" Oracle as Metasploit auxiliary modules. We've created your version and SID enumeration modules, account bruteforcing modules, ported all the public (and not so public) Oracle SQL Injection vulnerabilities into SQLI modules (with IDS evasion examples for 10g/11g), modules for OS interaction, and modules for automating some of our post exploitation tasks. The modules are currently only supported under Linux and OSX. Oracle Penetration Testing Methodology Locate a system running Oracle. Determine Oracle Version. Determine Oracle SID. Guess/Bruteforce USERNAME/PASS. Privilege Escalation via SQL Injection. Manipulate Data/Post Exploitation. Cover Tracks. Locating an Oracle System You will typically find most Oracle installations by performing port scanning in the target netblock. The Oracle listener default port is 1521 but can listen on an port generally in the 1521-1540 range. You can also discover oracle instances by scanning other common Oracle ports. Review http://www.red- database-security.com/whitepaper/oracle_default_ports.html for common Oracle ports. Generally running a service scan will NOT give you the Oracle TNS Listener version but updated fingerprints for new versions of Nmap may yield versions in some situations.
    [Show full text]
  • Software Assurance
    Information Assurance State-of-the-Art Report Technology Analysis Center (IATAC) SOAR (SOAR) July 31, 2007 Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance Distribution Statement A E X C E E C L I L V E R N E Approved for public release; C S E I N N I IO DoD Data & Analysis Center for Software NF OR MAT distribution is unlimited. Information Assurance Technology Analysis Center (IATAC) Data and Analysis Center for Software (DACS) Joint endeavor by IATAC with DACS Software Security Assurance State-of-the-Art Report (SOAR) July 31, 2007 IATAC Authors: Karen Mercedes Goertzel Theodore Winograd Holly Lynne McKinley Lyndon Oh Michael Colon DACS Authors: Thomas McGibbon Elaine Fedchak Robert Vienneau Coordinating Editor: Karen Mercedes Goertzel Copy Editors: Margo Goldman Linda Billard Carolyn Quinn Creative Directors: Christina P. McNemar K. Ahnie Jenkins Art Director, Cover, and Book Design: Don Rowe Production: Brad Whitford Illustrations: Dustin Hurt Brad Whitford About the Authors Karen Mercedes Goertzel Information Assurance Technology Analysis Center (IATAC) Karen Mercedes Goertzel is a subject matter expert in software security assurance and information assurance, particularly multilevel secure systems and cross-domain information sharing. She supports the Department of Homeland Security Software Assurance Program and the National Security Agency’s Center for Assured Software, and was lead technologist for 3 years on the Defense Information Systems Agency (DISA) Application Security Program. Ms. Goertzel is currently lead author of a report on the state-of-the-art in software security assurance, and has also led in the creation of state-of-the-art reports for the Department of Defense (DoD) on information assurance and computer network defense technologies and research.
    [Show full text]
  • Metasploit Framework «Back|Track-[IT]
    Metasploit Framework www.backtrack.it «Back|Track-[IT] www.backtrack.it (c) 2009 brigante - fiocinino [email protected] [email protected] Metasploit Framework Metasploit Framework www.backtrack.it Metasploit Framework www.backtrack.it Questo documento è rivolto a tutti coloro che vogliono conoscere cos'é, come viene utilizzato e cosa comporta l' uso del “Metasploit Framework”, parte del Metasploit Project. Metasploit è più di un semplice progetto per la sicurezza informatica, è un vero è proprio insieme di strumenti, (appunto denominato Framework), che ha praticamente rivoluzionato l' intero mondo della sicurezza informatica. Come per la stragrande maggioranza della nostra documentazione verrà, anche in questo documento, dato spazio sia alla parte teorica che alla parte pratica e descrittiva, con svariati esempi e con la descrizione dettagliata alcuni nostri video, reperibili naturalmente dall' apposita sezione del nostro portale. “Che cos'é Metasploit” Metasploit Project nasce con l' intento di fornire informazioni su vulnerabilità, sviluppo di sistemi di rilevamento di intrusioni e semplificare le operazioni di penetration testing. Il sub-project più conosciuto è il Metasploit Framework, un' insieme di strumenti per lo sviluppo e l'esecuzione di exploits, di shellcodes, auxiliary, opcode noto per lo sviluppo di strumenti di elusione ed anti- rilevamento. Uno dei principali Goals del “Metasploit Project” è quello di mirare principalmente a fornire informazioni utili allo sviluppo di nuove tecniche di pentesting e di firme per
    [Show full text]
  • Metasploit Pro User Guide
    4.11 USER GUIDE Getting Started First things first. If you haven't installed Metasploit yet, check out this these instructions if you're a commercial user. Otherwise, if you already have Metasploit installed, congratulations! You've come to the right place to get started. What's Metasploit? Metasploit is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts: Metasploit Pro, Express, Community, and Nexpose Ultimate. Metasploit Framework The Metasploit Framework is the foundation on which the commercial products are built. It is an open source project that provides the infrastructure, content, and tools to perform penetration tests and extensive security auditing. Thanks to the open source community and Rapid7's own hard working content team, new modules are added on a regular basis, which means that the latest exploit is available to you as soon as it's published. There are quite a few resources available online to help you learn how to use the Metasploit Framework; however, we highly recommend that you take a look at the Metasploit Framework Wiki, which is maintained by Rapid7's content team, to ensure that you have the most up to date information available. You can also use the sidebar navigation on the left to view the documentation that is available on this site; just click on the Metasploit Framework topic or search for the topic you want. Either way, if you are unable to find what you need, let us know, and we will add it to the documentation back log.
    [Show full text]
  • An Encrypted Payload Protocol and Target-Side Scripting Engine
    An Encrypted Payload Protocol and Target-Side Scripting Engine Dino A. Dai Zovi [email protected] Abstract into the remote process and then triggering the vulnera- Modern exploit payloads in commercial and open-source bility (the injection vector) in order to cause the remote penetration testing frameworks have grown much more process to execute the injected code (the payload). Tra- advanced than the traditional shellcode they replaced. ditionally, these payloads have been written in processor- These payloads permit interactive access without launch- specific assembly language, assembled, and extracted by ing a shell, network proxying, and many other rich fea- hand into reusable machine code components. These tures. Available payload frameworks have several lim- payloads were typically small and executed an operating itations, however. They make little use of encryption to system shell, causing them to be commonly referred to secure delivery and communications, especially in earlier as shellcode. Common shellcode variants included func- stage payloads. In addition, their richer features require tionality such as restoring dropped privileges, breaking a constant network connection to the penetration tester, out of chroot environments, and attaching the shell to making them unsuitable against mobile clients, such as an inbound or outbound network connection. This style laptops, PDAs, and smart phones. of payload construction was both labor and skill inten- This work introduces a first-stage exploit payload that sive. is able to securely establish an encrypted channel using With the growth of commercial penetration testing ElGamal key agreement and the RC4 stream cipher. The services and especially commercial penetration test- key agreement implementation requires only modular ing products, exploit payloads have gotten considerably exponentiation and RC4 also lends itself to an implemen- more capable and complex.
    [Show full text]
  • The Use of Metasploit Tool in Development Lifecycle
    Masaryk University Faculty of Informatics The use of Metasploit tool in development lifecycle Bachelor’s Thesis Miroslav Maceček Brno, Spring 2016 Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Miroslav Maceček Advisor: RNDr. Petr Švenda, Ph.D. i Acknowledgement I would like to express my gratitude to my collegues and friends for their support. I woul like to thank to my advisor RNDr. Petr Švenda, Ph.D. for his patience. iii Abstract This bachelor thesis explore the use of Metasploit in the web applica- tion development process. Firstly, it describes structure and general workflow of an open source Metasploit Framework. It also describes most extensive plugin for web application testing Wmap. This plu- gin is tested against application Mutillidae II, which contains a lot of known vulnerabilities. The success of this test is evaluated afterwards. This text describe a couple different ways of creating customized test scenarios, which evaluates OwnCloud and LimeSurvey applications. iv Keywords Metasploit, penetration testing, web application, development process, Mutilidae II v Contents 1 Introduction ............................ 1 2 Metasploit ............................. 3 2.1 Metasploit Framework Components ............. 3 2.1.1 Libraries . 3 2.1.2 Interfaces . 3 2.1.3 Modules . 4 2.1.4 Mixins and Plugins . 5 2.2 General Workflow ....................... 5 3 Wmap Plugin ........................... 7 3.1 List of modules ........................ 7 3.1.1 wmap_ssl . 7 3.1.2 wmap_server .
    [Show full text]
  • Metasploit Framework - Guide for Pentesters Ii
    Metasploit Framework - guide for pentesters ii Copyright © 2012 Software Media Sp. z o.o. SK Editor in Chief: Ewa Dudzic [email protected] Managing Editor: Aleksandra Cacko [email protected] DTP: Andrzej Kuca, Lalit Agarwal, Aleksandra Cacko Art Director: Andrzej Kuca [email protected] Graphics and cover: Ireneusz Pogroszewski Proofreaders: Edward Werzyn, Gareth Watters Top Betatesters: Stefanus Natahusada, Steven Wierckx Special Thanks to the Beta testers and Proofreaders who helped us with this issue. Without their assistance there would not be a PenTest e-book. Senior Consultant/Publisher: Pawel Marciniak Production Director: Andrzej Kuca Publisher: Software Media 02-682 Warszawa, ul. Bokserska 1 http://pentestmag.com/ First edition Issue 2/2012 (2) ISSN 2084-1116 Whilst every effort has been made to ensure the high quality of the e-book, the editors make no warranty, express or implied, concerning the results of content usage. All trademarks presented in the magazine were used only for informative purposes. All rights to trade marks presented in the magazine are reserved by the companies which own them. DISCLAIMER! The techniques described in our articles may only be used in private, local networks. The editors hold no responsibility for misuse of the presented techniques or consequent data loss. Metasploit Framework - guide for pentesters iv Contents 1 Metasploit: An Introduction 1 What is Metasploit? . .1 Architecture of Metasploit: . .2 Platform Used for demonstration . .2 Metasploit Interfaces: . .3 Good Practices for using Metasploit: . .3 Updating via Msfupdate . .3 Port scanning via Nmap . .4 Meterpreter: Metasploit’s Payload . .4 What typically payloads allow you to do after execution of exploit? .
    [Show full text]
  • Anex: Automated Network Exploitation Through
    ANEX: AUTOMATED NETWORK EXPLOITATION THROUGH PENETRATION TESTING A Thesis presented to the Faculty of California Polytechnic State University, San Luis Obispo In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Eric Francis Dazet June 2016 c 2016 Eric Francis Dazet ALL RIGHTS RESERVED ii COMMITTEE MEMBERSHIP TITLE: ANEX: Automated Network Exploitation through Penetration Testing AUTHOR: Eric Francis Dazet DATE SUBMITTED: June 2016 COMMITTEE CHAIR: Bruce Edward DeBruhl II, Ph.D. Assistant Professor of Computer Science COMMITTEE MEMBER: Zachary J. Peterson, Ph.D. Associate Professor of Computer Science COMMITTEE MEMBER: Phillip Nico, Ph.D. Professor of Computer Science iii ABSTRACT ANEX: Automated Network Exploitation through Penetration Testing Eric Francis Dazet Cyber attacks are a growing concern in our modern world, making security evalua- tion a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a sys- tem's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration testing tools are not as effective as manual tests. They are not as flexible as manual testing, cannot discover every vulnerability, and can lead to a false sense of security. The development of better automated tools can help organizations quickly and frequently know the state of their security measures and can help improve the manual penetration testing process by accelerating repetitive tasks without sacrificing results.
    [Show full text]
  • Metasploit Framework
    . Metasploitation A CanSecWest Presentation Original Presenter: HD Moore Presentation and Additional Information: Tyler Reguly Who is this guy? Who am I? Graduate of Fanshawe College ± Computer Systems Technology 3-year diploma Previously worked at Fanshawe College in student support and as a Sys Admin for a small marketing company Worked doing quasi-International web development for the past 5 years. Now at nCircle as a Vulnerability and Exposure Research Engineer Also a moderator on AntiOnline.com Maintain the ComputerDefense.org blog. © Toronto Area Security Klatch 2005 www.TASK.to Why are we here? The goal tonight? Cover information introduced by H.D. Moore at CanSecWest. We¶ll provide you with background information on the Metasploit project and Metasploit Framework. Basic Framework usage Functional differences between Framework versions Various Metasploit Project Web Fuzzers Brief overview of other sections of the Metasploit Project © Toronto Area Security Klatch 2005 www.TASK.to Meta-what? What is Metasploit? Metasploit itself is nothing« it¶s not even a word« but it¶s come to mean so much more. Metasploit has come to be synonymous with the Metasploit Framework. Metasploit is actually The Metasploit Project. Whose goal is to provide information that will be useful in Pentration Testing, IDS Signature Development and exploit research. The Metasploit Framework is one aspect of the Metasploit Project. Other parts of the project include: MSRT, MAFIA, Hamachi, etc. © Toronto Area Security Klatch 2005 www.TASK.to Metasploit Framework The framework is an open-source platform for developing, testing and using exploit code. (Point µn Click Hacking) The current ³stable´ version is version 2.5 Primarily written in perl, sections that are written in C, python and assembly.
    [Show full text]
  • Buffer Overflows and Software Security
    ECE590 Computer and Information Security Fall 2019 Buffer Overflows and Software Security Tyler Bletsch Duke University What is a Buffer Overflow? • Intent ▪ Arbitrary code execution • Spawn a remote shell or infect with worm/virus ▪ Denial of service • Steps ▪ Inject attack code into buffer ▪ Redirect control flow to attack code ▪ Execute attack code 3 Buffer Problem: Data overwrite int main(int argc, char *argv[]) { char passwd_ok = 0; char passwd[8]; strcpy(passwd, argv[1]); if (strcmp(passwd, "niklas")==0) passwd_ok = 1; if (passwd_ok) { ... } } Layout in memory: longpassword1 • passwd buffer overflowed, overwriting passwd_ok flag ▪ Any password accepted! 7 Another Example: Code injection via function pointer char buffer[100]; void (*func)(char*) = thisfunc; strcpy(buffer, argv[1]); func(buffer); arbitrarycodeX • Problems? ▪ Overwrite function pointer • Execute code arbitrary code in buffer 8 Stack Attacks: Code injection via return address • When a function is called… ▪ parameters are pushed on stack ▪ return address pushed on stack ▪ called function puts local variables on the stack • Memory layout arbitrarystuffX • Problems? ▪ Return to address X which may execute arbitrary code 9 Demo cool.c #include <stdlib.h> #include <stdio.h> int main() { char name[1024]; printf("What is your name? "); scanf("%s",name); printf("%s is cool.\n", name); return 0; } 10 Demo – normal execution 11 Demo – exploit 12 How to write attacks • Use NASM, an assembler: ▪ Great for machine code and specifying data fields attack.asm %define buffer_size 1024
    [Show full text]
  • Code Security
    Chapter 8 Code Security Introduction to IT Security 378 Software security is hard ■ One of the main problems in software engineering at the moment □ often poor programming because of lacking education/awareness in developers and bad tooling (languages/platforms making mistakes too easy to make and impact of mistakes too severe) □ often due to project deadlines ■ Unclear how to practically write correct and secure code, even with increased project resources □ formal validation is extremely costly, not clear how to do on complex code bases ■ Therefore many security relevant errors in currently deployed code ■ Classification of security problems: “Common Weakness Enumeration” (CWE) at https://cwe.mitre.org/ ■ Publicly known software vulnerabilities: “Common Vulnerabilities and Exposures” (CVE) at https://cve.mitre.org/ Introduction to IT Security 379 CWE/SANS Top 25 most dangerous software errors Insecure Interaction Between Components ■ CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ■ CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') ■ CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ■ CWE-434 Unrestricted Upload of File with Dangerous Type ■ CWE-352 Cross-Site Request Forgery (CSRF) ■ CWE-601 URL Redirection to Untrusted Site ('Open Redirect') http://www.sans.org/top25-software-errors/ Introduction to IT Security 380 CWE/SANS Top 25 most dangerous software errors Risky Resource Management ■ CWE-120 Buffer
    [Show full text]
  • Network Exploitation Using Metasploit Framework
    NETWORK EXPLOITATION USING METASPLOIT FRAMEWORK MRS.B.SINDHIYA M.PHIL ASSISTANT PROFESSOR E.VIJAY DEPARTMENT OF COMPUTER SCIENCE MSC SHOLAR SRI KRISHNA ARTS AND SCIENCE COLLEGE DEPARTMENT OF COMPUTER SCIENCE COIMBATORE, INDIA. SRI KRISHNA ARTS AND SCIENCE COLLEGE [email protected] COIMBATORE, INDIA. [email protected] ABSTRACT vendors, who develop patches for them. The countermeasures for each and every attack have In computer networks, network attack is referred as to be precise in order to keep information security "any attempt to destroy, expose, alter, disable, steal intact. or gain unauthorized access to or make unauthorized use of an asset. 1. INTRODUCTION The proposed Network Exploitation using An exploit is a piece of software, a chunk Metasploit framework aims at finding the of data, or sequence of commands that takes weakness of any network (LAN) and working advantage of a bug, glitch or vulnerability in order towards the main objective of compromising the to cause unintended or unanticipated behavior to target network for exploitation. This helps in occur on computer software, hardware, or identifying how network are configured weakly something electronic (usually computerized). which are prone to network attacks by third Such behavior frequently includes such things as parties or anonymous people and what measures gaining control of a computer system or allowing can be done in order to overcome these types of privilege escalation or a denial-of-service attack. attacks, Computer Network Exploitation (CNE): The Metasploit Framework is a penetration Includes enabling actions and intelligence testing toolkit, exploit development platform, and collection via computer networks that exploit research tool.
    [Show full text]