2. TABLE OF CONTENTS
• Explanation of Penetration Testing
• Reason for Project
• Tools Used
• Results
• Recommendations
3. PENETRATION TESTING
• Penetration Test – an attack on a system(s) with the intention of
finding security weaknesses, potentially gaining access to the
system.
• Steps To The Test:
• Approval from IT, HR, and Security
• Information Gathering
• Exploitation
• Analyze Results
• Provide Recommendations
4. REASON FOR TEST
• Learning Experience
• Find Risks/Threats/Vulnerabilities Within Company
• Testing the ability of network defenders to successfully detect
and respond to the attacks
• Providing evidence to support security status at location
5. TOOLS USED
• Armitage in Metasploit Framewok
• NMAP and MSF Scanning
• Checking for Exploits
• Email Grabber
• TheHarvester
• The Social Engineering Toolkit
• GMAIL – (hris.management@gmail.com)
• Keyloggers (in Kali and Revealer Keylogger)
• SurveyMonkey
6. ARMITAGE RESULTS
• HTTP = Penetrationhttp attack.docx
• WEBAPP = PenetrationWebapp attacks.docx
• SMTP = image to the right (3 different exploits)
• WYSE = image below
7. EMAIL GATHERING/HARVESTING
• 13 emails found using
the console of
Metasploit and only
one was for a person
in the Cromwell
location. The others
were apart of another
location to the
company.
• 66 emails were
found and 48 of
them were unique.
This means that
some of the emails
were found on
different data
sources.
• Therefore, this tool picked
up more emails than the
tool used inside the
Metasploit console.
8. PHISHING AND SPEAR PHISHING
Usernames
• One user called Human Resources (the person the
Phishing Emails were sent from, hypothetically) and
inquired about email.
• One user viewed the email in the secure application
required by the company for accessing email on a mobile
device, Good for Enterprise. This application showed no
sign of the email address that it was sent from and the
address the link was to be directed to. The only way to
find this out is to right-click against the link (to right-
click on a phone you click and hold) then a submenu will
appear and show the address of the link.
• Two people responded to the email address.
• 14/20 people received the emails.
• One user showed up as for accessing my website, but
was never sent an e-mail.
• 11/14 people clicked on the link.
9. KEYLOGGER / WORKSTATION SECURITY /
SURVEY
• Windows XP – Couldn’t see anything after the initial screen to
enter IP Address (used two different keyloggers)
• Windows Vista – Able to see everything from using Revealer
Keylogger.
Averages:
Unlocked = (about) 25
Locked = (about) 17
Being used = (about)
31
https://www.surveymonkey.com/results/SM-XTVBGFR/
10. RECOMMENDATIONS
Risk Training POLP Dual-Auth Group Policy Sys. Conf. Testing Notes
Phishing X X Spam Filtering
User Access X X X X ChangeAuditor/Change Software
RDC X X X X VPN/Idle Time
Workstation Sec. X X
Password Mgmt. X X History/Age(Max+Min)/Complexity
Ports X X Future State - Host Website/Quarterly
System Info. X Intrusion Dection Sys./Apply Lim. Sys In.