Simon Turner's Cybersecurity Project Portfolio

Posting my project work as it pertains to computer security

Download as .zip Download as .tar.gz View on GitHub

Network Enumeration Lab

Overview

Lab Instructions: A company hired us to test their IT security defenses, including their IDS and IPS systems. Our client wants to increase their IT security and will, therefore, make specific improvements to their IDS/IPS systems after each successful test. Our goal is to find out specific information from the given situations. The machine is protected by IDS/IPS systems. The idea is to do this quietly so the systems aren’t alerted.

Documentation

First, the client wants to know if we can identify which OS their provided machine is running on. I ran a very general nmap scan of the IP just to see what ports were open. After I did that, I specified a certain port and used -sV to find the details from that specific port (22). I could’ve probably just used -O in hindsight and that would’ve been a quieter way of doing it.

image

After this first test, the administrators tightened up their IDS/IPS and firewall.

After the configurations are transferred to the system, our client wants to know if it is possible to find out our target’s DNS server version.

I remembered that DNS queries are made over UDP port 53 most of the time. I specified that port. I used -sU in order to run a UDP scan. Then I used -sV in order to get the full server version.

image

Our next task is to find the version of the running services, per our client. The admin again, tightened up the firewall and IDS/IPS rules.

This one actually took a good bit of trial and error. I tried running scripts, TCP and UDP port scans, among other things. Either the IDS/IPS services wouldn’t let me run these actions or I wasn’t finding the correct port. After a while, I scanned for all ports using DNS port 53 as the source port and that ended up giving me an open TCP port 50000. This allowed me to bypass firewall rules to look like I was searching from the DNS server.

Screenshot 2024-10-19 at 1 01 39 AM

It was open, so I jumped in using nc from the source port of the DNS server once again, and the flag revealed itself.

Screenshot 2024-10-19 at 1 03 32 AM