论文标题

检测网络安全漏洞和主动策略以减轻潜在威胁

Detecting Network Security Vulnerabilities and Proactive Strategies to Mitigate Potential Threats

论文作者

Al-Sabaawi, Aiman, Alrowidhan, Thamer A.

论文摘要

在多层网络系统,自定义应用程序,Web服务和平台环境中,存储数据和信息资产成为任何组织的挑战。尽管有不同的方法可以保护网络系统,但测试安全级别的最佳方法是进行渗透测试。在本文中,我们描述了如何通过识别系统脆弱性以使其渗透率来描述192.168.3.0/24(案例研究)的实时渗透测试。损害系统后,必须找到关键数据(标志),表明我们的成功穿透。作为专业的穿透测试人员,我们使用了恶意演员在互联网上使用的渗透测试工具的库,例如NMAP,NMAP,NESSUS,SPARTA和METASPLOIT等。通常,由于它们在确定系统环境中的安全性漏洞中,而不是系统探索的侦察和扫描阶段,而不是系统探索的重要性。脆弱性分析强调了最关键的威胁,代币是获得访问权限的优势,即FTP服务,HTTP和人类错误。但是,组成系统还不够,因为关键数据(FLAG)通常需要管理员权利。因此,团队经常检查系统以找到一种将特权升级到根级的方法。此外,一些关键数据(标志)需要解密算法或捕获数据包的分析以使其可读。我们找到了八个标志,并确定了系统安全漏洞。建议采用解决确定漏洞的缓解策略,以确保给定网络确保未来的攻击。

In multi-tier network systems, custom applications, Web services and platform environments, storing data and information assets becomes a challenge for any organisation. Although there are different methods to secure network systems, the best way to test the level of security is to conduct penetration testing. In this paper, we describe how we performed live penetration testing for a particular network, namely, 192.168.3.0/24 (Case Study) by identifying the system vulnerabilities to enable its penetration. After compromising the system, critical data (Flags) must be found, indicating our successful penetration. As professional penetration testers, we used an arsenal of penetration testing tools utilised by malicious actors on the internet, such as Nmap, Nessus, Sparta and Metasploit, etc. Typically, much effort was employed on reconnaissance & scanning phases, rather than system exploration, due to their importance in identifying security vulnerabilities in the system environment. The vulnerability analysis highlighted the most critical threats, which token is an advantage to gain access, namely, FTP services, HTTP, and human errors. However, comprising the system is not sufficient because the critical data (Flag) generally requires the administrators rights. Consequently, teams often examine the system to find a way to escalate privilege to the root level. Furthermore, some critical data (Flags) require decryption algorithms or the analysis of captured packets to make them readable. We found eight Flags and identified a system security breach. Mitigation strategies addressing the identified vulnerabilities are recommended to ensure the given networks are secured against future attacks.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源