Preview

SEC 572 Week 1 iLab Network Attacks 0

Better Essays
Open Document
Open Document
1355 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SEC 572 Week 1 iLab Network Attacks 0
Network Attacks iLab 1 – Week 1

Targeted Attack on a Network Device

Submitted to: Dr. Charles Pak
SE572 Network Security
Keller Graduate School of Management
Submitted: September 07, 2014

Table of Contents

Executive Summary 3
Summary of Results 3-4
Details on Attack 5
Name of the Attack 5
Attack Discovery and Resolution Sates 5
Synopsis of the Attack 5
Vulnerable Target(s) for the Attack and Likely Victims 6
Probable Motivation(s) of the Attack 6
Probable Creators of the Attack 7
Deployment, Propagation or Release Strategy of the Attack 7
Published Countermeasures against the Attack 7
Published Recovery Techniques used to return to Normal Operations after the Attack 8
Recommended Incident Reporting Measures 8
Summary 8
References 9

Executive Summary

[Company] has been contracted to conduct a penetration test against [Organization] external web presence. The assessment was conducted in a manner that simulated a malicious actor engaged in a targeted attack against the company with the goals of:
Identifying if a remote attacker could penetrate [Organization] defenses.
Determining the impact of a security breach on:
The confidentiality of the organization’s customer information.
The assessment was conducted in accordance with the recommendations outlined in NIST SP 800-115 (Technical Guide to Information Security testing and Assessment). The results of this assessment will be used by [Organization] to drive future decisions as to the direction of their information security program. All test and actions were conducted under controlled conditions. (Security O. , 2012)
Summary of Results
Network reconnaissance was conducted against the address space provided by [Organization] with the understanding that this space would be considered the scope of this engagement. It was determined that the organization maintains a minimal external presence, consisting of an external web site and a hosted mail service. This constituted a small attack



References: Name of the Attack It is called the Heart Bleed Bug because Bug is in the OpenSSL 's implementation of the TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520) This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users. (Codenomicon, 2014) Probable Creators of the Attack This is an implementation problem, i.e. programming mistake in popular OpenSSL library that provides cryptographic services such as SSL/TLS to the applications and services. (Codenomicon, 2014) Deployment, Propagation or Release Strategy of the Attack Exploitation of this bug does not leave any trace of anything abnormal happening to the logs. (Codenomicon, 2014) Summary Codenomicon. (2014, April 04). Heart Bleed. Retrieved from Heart Bleed: http://heartbleed.com/ CVE Database, N. V. (2014, April 07). National Cyber Awareness System. Retrieved from http://web.nvd.nist.gov/: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160 Security, O

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    However, too many organizations fail to identify the potential threats from information unintentionally leaked, freely available over the Internet, and not normally identifiable from standard log file analysis. Most critically, an attacker can passively gather this information without ever coming into direct contact with the organizations servers – thus being essentially undetectable. Very little information has been publicly discussed about arguably one of the least understood, and most significant stages of penetration testing – the process of Passive Information Gathering. This technical paper and information gathering plan reviews the processes and techniques related to the discovery of leaked information. It also includes details on both the significance of the leaked information, and steps organizations should take to halt or limit their exposure to this threat.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    4. Before you conduct an ethical hacking process or penetration test on a live production network, what…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    1. A written report of the identified vulnerabilities, exploits, and remediation steps covered in this lab;…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw250 Week 1 Ilabs

    • 290 Words
    • 2 Pages

    Answer: Chat session was not possible due availability of students, however I did send out request for chat sessions for three or four days.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    1. Why is it critical to perform a penetration test on a web application prior to production Implementation?…

    • 486 Words
    • 2 Pages
    Good Essays