• No results found

Client-Side Penetration Test Report

N/A
N/A
Protected

Academic year: 2021

Share "Client-Side Penetration Test Report"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Client-Side Penetration Test Report

This report presents the results of client-side penetration tests conducted by CORE Impact Professional . Unlike remote network attacks, client-side attacks require an end user to perform an action to trigger a compromise of their computer. The report includes detailed information on deployed social engineering attacks such as those that launch exploits via malicious web servers and emails. These attack vectors attempt to compromise end -user systems by exploiting known client-side vulnerabilities or by taking advantage of gaps in end -user security awareness. Once a computer is compromised, an attacker can establish a beachhead to infiltrate further into the organization’s back-end network.

Client-side attacks are arguably the most difficult to protect against because they take advantage of the human element in a network. In addition to maintaining computers at the current patch level, the best way to protect against these types of attacks is to educate end users on the latest social engineering attack trends and to continuously raise security awareness by testing the end-user community with controlled client-side penetration tests

Introduction

Workspace Summary

Report 3 Name:

Exact Time: 56 minutes 36 seconds 42 minutes 45 seconds Running Time: 5/1/2012 1:00:00PM Finished: 5/1/2012 12:04:24PM Started:

Total number of hosts and mobiles compromised through email-borne attacks:

Total number of hosts and mobiles compromised through malicious web server attacks:

Total number of unique hosts and mobiles compromised through client-side attacks: 1 1 0

Total number of compromised hosts and mobiles using decouple: 0

All successful client-side attacks

Percentage of successful email-borne attacks: Total number of emails sent:

Total number of email addresses targeted:

Total number of hosts and mobiles compromised through email-borne attacks:

0 0

0.00% 0

Summary of email-borne attacks

Total number of unique user hits on the malicious web sites: Total number of malicious web sites deployed:

Total number of hosts and mobiles compromised through malicious web server attacks:

Percentage of successful malicious web server attacks:

1

0

0.00% 6

Number of successful malicious web server attacks: Number of malicious web server attacks:

0 4

Summary of malicious web server attacks

(2)

Total number of unique client-side vulnerabilities successfully exploited: Total number of client-side vulnerabilities successfully exploited:

Total number of hosts and mobiles successfully exploited by client-side vulnerabilities:

2 2 1

Summary of exploited client-side vulnerabilities

Successful client-side exploits per operating system

0 1 2 Windows 2 unknown

Operating System & Version

Exploits

* Unknown operating systems are not shown

Total* 2

Windows 2

unknown 2

Most successful email-borne attacks

- No successful email-borne attacks.

(3)

Most successful malicious web server attacks

0 1 2 3 4 h ttp :// 1 0 .4 .4 4 .1 1 /p a cks 0 e cNS 1 e o jYSBzCzrKKY 2 g a a Exploit accessed Exploit successful

Unit

Web Sites with Highest Number of Compromised Hosts and Mobiles

* The number of successful exploit attempts is, at most, equal to the number of exploit access attempts, never greater.

Details of non-trojan based email-borne attacks

No email templates used.

Details of trojan-based email-borne attacks

No email templates used

Details of malicious web server attacks

Web site: http://10.4.44.11/packs0ecNS1eojYSBzCzrKKY2gaa

Exploits:

NOCVE-9999-9999: One Link Multiple Clientsides Exploit. ·

Total number of compromised hosts and mobiles:

List of hosts and mobiles that were compromised: None 0

Vulnerability description Not available.

Additional exploit information

http://www.securityfocus.com/bid/13097 http://xforce.iss.net/xforce/xfdb/20059 http://www.securityfocus.com/archive/1/395515 http://www.securitytracker.com/alerts/2005/Apr/1013676.html msie 6.0. Browsers identified:

Total number of unique hits on the URL: Total number of exploits accessed: 1

1

(4)

Details of Phishing attacks

No phishing attacks deployed.

Unique email messages sent

NOCVE-9999-9999: One Link Multiple Clientsides Exploit.

Exploit Name:

Online games <html> <head> <%headinsert%> </head> <body> <%bodyinsert%>

<p class="MsoNormal" style="text-align: center;" align="center"><b><span style="font-size: 18pt; color: rgb(153, 0, 0);">ONLINE GAMES: PLAY FOR FREE</span></b></p>

<span style="font-size: 12pt; font-family: &quot;Times New Roman&quot;;"><br>

Bored of your job? Need a break? Not allowed to install games on your company's workstation?<br> We have the solution for you! Click on the link below and start playing games online,

no installation required!!!<br> <br>

<%linkbegin%>Click To Play<%linkend%><br> <br>

Afraid your boss might come back and see you goofing around? Don't worry! <br> >From our game page you are just a click away from your predefined "escape" page! Nobody will ever notice!</span>

<%imagetag%> </body> </html>

(5)

Index

Page Description

Introduction

Workspace Summary (Report 3)

Successful client-side exploits per operating system Most successful email-borne attacks

Most successful malicious web server attacks Details of non-trojan based email-borne attacks Details of trojan-based email-borne attacks Details of malicious web server attacks Details of Phishing attacks

Unique email messages sent

1 1 2 2 3 3 3 3 4 4

References

Related documents

This document reports the findings of a preliminary visit conducted by a Head of Department from Reaseheath College who visited Xinjiang Agricultural Vocational College on 29 June

We advance current state of the art models by developing an improved model framework that leverages existing deep topologies to create an ensemble model for automatic hate

Firm size is positively countries that have strong creditor rights and efficient related to the size of the banking system and the legal systems.. This suggests

By making an overarching committee to review all these areas, the College will reduce costs, streamline services, and ensure that every decision made contributes in a positive way

Health risk behaviors are associated with demographic and job characteristics such as gender, age group, job, or work type (21,22]. Therefore, we need to consider the

compare the auction mechanism to conventional forms of taxation and show that under certain conditions, not only will a majority of the guild members prefer to be taxed via the

About 95 percent of federal contracts that are competitively bid are awarded based on a best value approach in which the federal government considers both price and a number of

Version 1.0 Author: Dave Chaffey © E-consultancy 2007 Your Design Objectives To generate: · Sales · Leads · Brand favourability Accessibility implementation guidelines Audience