Security Assessment Report 2021
Security Assessment Report 2021
Business Confidential
DEMO CORP
BUSINESS Page 1 of
CONFIDENTIAL
Table of Contents
Table of Contents ......................................................................................................................................2
Disclaimer ..................................................................................................................................................4
Likelihood .................................................................................................................................6
Impact .......................................................................................................................................6
Scope ........................................................................................................................................................7
Finding IPT-002: Security Miscon guration – Local Admin Password Reuse (Critical) ......................14
Finding IPT-007: Insu cient Hardening – SMB Signing Disabled (Critical) .......................................19
Finding IPT-009: Insu cient Patch Management – Operating Systems (Critical) ..............................21
Finding IPT-011: Insu cient Patching – MS12-020 – Remote Desktop RCE (Critical) ......................23
Finding IPT-014: Insu cient Privileged Account Management – Kerberoasting (High) .....................26
fi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
fi
fi
fi
fi
Finding IPT-015: Security Miscon guration – GPP Credentials (High) ..............................................27
Finding IPT-022: Insu cient SNMP Community String Complexity (Moderate) ................................34
Finding IPT-023: Insu cient Data in Transit Encryption - Telnet (Moderate) ......................................35
Finding IPT-024: Insu cient Terminal Services Con guration (Moderate) .........................................36
ffi
ffi
ffi
ffi
ffi
ffi
fi
fi
Confidentiality Statement
This document is the exclusive property of Demo Corp and TCM Security (TCMS). This
document contains proprietary and con dential information. Duplication, redistribution, or
use, in whole or in part, in any form, requires consent of both Demo Corp and TCMS.
Demo Corp may share this document with auditors under non-disclosure agreements to
demonstrate penetration test requirement compliance.
Disclaimer
A penetration test is considered a snapshot in time. The ndings and recommendations
re ect the information gathered during the assessment and not any changes or modi cations
made outside of that period.
Time-limited engagements do not allow for a full evaluation of all security controls. TCMS
prioritized the assessment to identify the weakest security controls an attacker would exploit.
TCMS recommends conducting similar assessments on an annual basis by internal or third-
party assessors to ensure the continued success of the controls.
Contact Information
Demo Corp
BUSINESS Page 4 of 54
CONFIDENTIAL
fl
fi
fi
fi
Assessment Overview
From February 22nd, 2021 to March 5th, 2021, Demo Corp engaged TCMS to evaluate the
security posture of its infrastructure compared to current industry best practices that included
an internal network penetration test. All testing performed is based on the NIST SP 800-115
Technical Guide to Information Security Testing and Assessment, OWASP Testing Guide (v4),
and customized testing frameworks.
• Reporting – Document all found vulnerabilities and exploits, failed attempts, and
company strengths and weaknesses.
Assessment Components
Internal Penetration Test
An internal penetration test emulates the role of an attacker from inside the network. An
engineer will scan the network to identify potential host vulnerabilities and perform common
and advanced internal network attacks, such as: LLMNR/NBT-NS poisoning and other man-
in-the-middle attacks, token impersonation, kerberoasting, pass-the-hash, golden ticket, and
more. The engineer will seek to gain access to hosts through lateral movement, compromise
domain user and admin accounts, and ex ltrate sensitive data.
Demo Corp
BUSINESS Page 5 of 54
CONFIDENTIAL
fi
fi
Finding Severity Ratings
The following table de nes levels of severity and corresponding CVSS score range that are
used throughout the document to assess vulnerability and risk impact.
Risk Factors
Risk is measured by two factors: Likelihood and Impact:
Likelihood
Likelihood measures the potential of a vulnerability being exploited. Ratings are given based on
the di culty of the attack, the available tools, attacker skill level, and client environment.
Impact
Impact measures the potential vulnerability’s e ect on operations, including con dentiality,
integrity, and availability of client systems and/or data, reputational harm, and nancial loss.
Demo Corp
BUSINESS Page 6 of 54
CONFIDENTIAL
ffi
fi
ffi
ff
fi
fi
Scope
Assessme Detai
nt ls
Scope Exclusions
Per client request, TCMS did not perform any of the following attacks during testing:
• Phishing/Social Engineering
All other attacks not speci ed above were permitted by Demo Corp.
Client Allowances
Demo Corp provided TCMS the following allowances:
Demo Corp
BUSINESS Page 7 of 54
CONFIDENTIAL
fi
Executive Summary
TCMS evaluated Demo Corp’s internal security posture through penetration testing from
February 22nd, 2021 to March 5th, 2021. The following sections provide a high-level overview of
vulnerabilities discovered, successful and unsuccessful attempts, and strengths and
weaknesses.
Time limitations were in place for testing. Internal network penetration testing was permitted for
ten
Testing Summary
The network assessment evaluated Demo Corp’s internal network security posture. From an
internal perspective, the TCMS team performed vulnerability scanning against all IPs provided
by Demo Corp to evaluate the overall patching health of the network. The team also
performed common Active Directory based attacks, such as Link-Local Multicast Name
Resolution (LLMNR) Poisoning, SMB relaying, IPv6 man-in-the-middle relaying, and
Kerberoasting. Beyond vulnerability scanning and Active Directory attacks, the TCMS
evaluated other potential risks, such as open le shares, default credentials on servers/
devices, and sensitive information disclosure to gain a complete picture of the network’s
security posture.
The TCMS team discovered that LLMNR was enabled in the network (Finding IPT-001), which
permitted the interception of user hashes via LLMNR poisoning. These hashes were taken
o ine and cracked via dictionary attacks, which signals a weak password policy (Finding
IPT-005). Utilizing the cracked passwords, the TCMS team gained access to several machines
within the network, which indicates overly permissive user accounts.
With machine access, and the use of older operating systems in the network (Finding
IPT-009), the team was able to leverage WDigest (Finding IPT-003) to recover cleartext
credentials to accounts. The team was also able to dump local account hashes on each
machine accessed. The TCMS team discovered that the local account hashes were being re-
used across devices (Finding IPT-002), which lead to additional machine access through pass-
the-hash attacks.
Ultimately, the TCMS team was able to leverage accounts captured through WDigest and hash
dumps to move laterally throughout the network until landing on a machine that had a Domain
Administrator credential in cleartext via WDigest. The testing team was able to use this
Demo Corp
BUSINESS Page 8 of 54
CONFIDENTIAL
ffl
fi
credential to log into the domain controller and compromise the entire domain. For a full
walkthrough of the path to Domain Admin, please see Finding IPT-025.
Demo Corp
BUSINESS Page 9 of 54
CONFIDENTIAL
In addition to the compromise listed above, the TCMS team found that users could be
impersonated through delegation attacks (Finding IPT-004), SMB relay attacks were possible
due to SMB signing being disabled (Finding IPT-007), and IPv6 tra c was not restricted,
which could lead to LDAPS relaying and domain compromise (Finding IPT-006).
The remainder of critical ndings relate to patch management as devices with critical out-of-
date software (Finding IPT-008), operating systems (Finding IPT-009), and Microsoft RCE
vulnerabilities (Findings IPT-010, IPT-011, IPT-012, IPT-013), were found to be present within
the network.
The remainder of the ndings were high, moderate, low, or informational. For further
information on ndings, please review the Technical Findings section.
During testing, two constants stood out: a weak password policy and weak patching. The
weak password policy led to the initial compromise of accounts and is usually one of the rst
footholds an attacker attempts to use in a network. The presence of a weak password policy
is backed up by the evidence of our testing team cracking over 2,200 user account
passwords, including a majority of the Domain Administrator accounts, through basic
dictionary attacks.
We recommended that Demo Corp re-evaluates their current password policy and considers a
policy of 15 characters or more for their regular user accounts and 30 characters or more for
their Domain Administrator accounts. We also recommend that Demo Corp explore password
blacklisting and will be supplying a list of cracked user passwords for the team to evaluate.
Finally, a Privilege Access Management solution should be considered.
Weak patching and dated operating systems led to the compromise of dozens of machines
within the network. We believe the number of compromised machines would have been
signi cantly larger, however the TCMS and Demo Corp teams agreed it was not necessary to
attempt to exploit any remote code execution (RCE) based vulnerabilities, such as MS17-010
(Finding IPT-012), as the domain controller had already been compromised and the teams did
not want to risk any denial of service through failed attacks.
We recommend that the Demo Corp team review the patching recommendations made in the
Technical Findings section of the report along with reviewing the provided Nessus scans for a
full overview of items to be patched. We also recommend that Demo Corp improve their patch
management policies and procedures to help prevent potential attacks within their network.
Demo Corp
BUSINESS Page 10 of
CONFIDENTIAL
fi
fi
fi
fi
fi
ffi
fi
fi
On a positive note, our testing team triggered several alerts during the engagement. The
Demo Corp Security Operations team discovered our vulnerability scanning and was alerted
when we attempted to use noisy attacks on a compromised machine. While not all attacks
were discovered during testing, these alerts are a positive start. Additional guidance on
alerting and detection has been provided for ndings, when necessary, in the Technical
Findings section.
Overall, the Demo Corp network performed as expected for a rst-time penetration test. We
recommend that the Demo Corp team thoroughly review the recommendations made in this
report, patch the ndings, and re-test annually to improve their overall internal security
posture.
device The following identi es the key weaknesses identi ed during the
assessment:
2. Critically out-of-date operating systems and weak patching exist within the network
8. Local admin accounts had password re-use and were overly permissive
Demo Corp
BUSINESS Page 11 of
CONFIDENTIAL
fi
fi
fi
fi
fi
fi
fi
Vulnerability Summary & Report Card
The following tables illustrate the vulnerabilities found by impact and recommended
remediations:
13 5 6 0 1
fi
fi
fi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
Kerberoasting services.
IPT-015: Security High Apply vendor patching. Do not
Miscon guration – GPP use GPP cpasswords.
Credentials
IPT-016: Insu cient Authentication High Enable authentication on the VNC
- VNC Server.
IPT-017: Default Credentials on High Change default credentials or
Web Services disable unused accounts.
IPT-018: Insu cient Hardening – High Restrict access and conduct web
Listable Directories app assessment.
IPT-019: Unauthenticated SMB Moderate Disable SMB share or require
Share Access authentication.
IPT-020: Insu cient Patch Moderate Upgrade to SMBv3 and apply
Management – SMBv1 latest patching.
IPT-021: IPMI Hash Disclosure Moderate Disable IPMI over LAN if it is not
needed.
IPT-022: Insu cient SNMP Moderate Disabled SNMP if not required.
Community String Complexity
IPT-023: Insu cient Data in Moderate Migrate to TLS protected
Transit Encryption - Telnet protocols.
IPT-024: Insu cient Terminal Moderate Enable Network Level
Services Con guration Authentication (NLA) on the remote
RDP server.
Demo Corp
BUSINESS Page 13 of
CONFIDENTIAL
fi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
ffi
fi
IPT-025: Steps to Domain Admin Information Review action and remediation
al steps.
Demo Corp
BUSINESS Page 14 of
CONFIDENTIAL
Technical Findings
Internal Penetration Test Findings
Finding IPT-001: Insu cient LLMNR Con guration (Critical)
Description: Demo Corp allows multicast name resolution on their end-user networks.
TCMS captured 20 user account hashes by poisoning LLMNR tra c and
cracked 2 with commodity cracking software.
The cracked accounts were used to leverage further access that led to the
compromise of the Domain Controller.
Risk: Likelihood: High – This attack is e ective in environments allowing
multicast name resolution.
Evidence
Remediatio
n
Demo Corp
BUSINESS Page 15 of
CONFIDENTIAL
ffi
ff
ffl
fi
fi
fi
ffi
Figure 2: of “production”
Cracked hash
Disable multicast name resolution via GPO. For full mitigation and detection guidance,
please reference the MITRE guidance here.
The cracked hashes demonstrate a de cient password complexity policy. If multicast name
resolution is required, Network Access Control (NAC) combined with application whitelisting
can limit these attacks.
Demo Corp
BUSINESS Page 16 of
CONFIDENTIAL
fi
Finding IPT-002: Security Miscon guration – Local Admin Password Reuse (Critical)
TCMS leveraged this attack to gain access to ~50 machines within the
main
o ce. This led to further account access and the eventual compromise of
the domain controller.
Risk: Likelihood: High – This attack is e ective in large networks with local
admin password reuse.
https://tcm-sec.com/pentest-tales-001-you-spent-how-much-on-security/
Evidence
Remediation
Utilize unique local admin passwords. Limit local admin users via least privilege. Consider
implementing a PAM solution. For full mitigation and detection guidance, please reference
the MITRE guidance here.
Demo Corp
BUSINESS Page 17 of
CONFIDENTIAL
ffi
fi
ff
Finding IPT-003: Security Miscon guration – WDigest (Critical)
Description: Demo Corp permitted out-of-date operating systems within their network,
including Windows 7, 8, Server 2008, and Server 2012.
Impact: Very High – WDigests credentials are stored in clear text, which
can permit the theft of sensitive accounts, such as Domain
Administrators.
System: All systems older than Windows 10 and Server 2016
Tools Used: Metasploit, Kiwi
References: https://stealthbits.com/blog/wdigest-clear-text-passwords-stealing-
more-than- a-hash/
Evidence
Remediation
Disable WDigest via GPO. For full mitigation and detection guidance, please reference the
guidance here.
Demo Corp
BUSINESS Page 18 of
CONFIDENTIAL
fi
ff
Finding IPT-004: Insu cient Hardening – Token Impersonation (Critical)
https://docs.microsoft.com/en-us/windows-server/
identity/ad- ds/manage/how-to-con gure- protected-
accounts
Evidence
Demo Corp
BUSINESS Page 19 of
CONFIDENTIAL
ffi
fi
Figure 6: Shell access as Domain Admin “sup”
Remediatio
n
Restrict token delegation. For full mitigation and detection guidance, please reference the MITRE
guidance here.
Demo Corp
BUSINESS Page 20 of
CONFIDENTIAL
Description: TCMS dumped hashes from the domain controller and proceeded to
attempt common password guessing attacks against all users.
Impact: Very High - Domain admin accounts with weak passwords could
lead to an adversary critically impacting Demo Corp ability to operate.
System: All
Tools Used: Manual Review
References: NIST SP800-53 IA-5(1) - Authenticator Management https://
www.cisecurity.org/white-papers/cis-password-policy-guide/
Evidence
Remediatio
n
Implement CIS Benchmark password requirements / PAM solution. TCMS recommends that
Demo Corp enforce industry best practices around password complexity and management. A
Demo Corp
BUSINESS Page 21 of
CONFIDENTIAL
ff
ffi
password lter to prevent users from using common and easily guessable passwords is also
recommended. Additionally, TCMS recommends that Demo Corp enforce stricter password
requirements for Domain Administrator and other sensitive accounts.
Demo Corp
BUSINESS Page 22 of
CONFIDENTIAL
fi
Finding IPT-006: Security Miscon guration – IPv6 (Critical)
Description: Through IPv6 DNS poisoning, the TCMS team was able to successfully
relay credentials to the Demo Corp domain controller.
Risk: Likelihood: High – IPv6 is enabled by default on Windows networks. The
tools and techniques required to perform this task are trivial.
Evidence
Remediatio
n
1. IPv6 poisoning abuses the fact that Windows queries for an IPv6 address even in IPv4-
only environments. If you do not use IPv6 internally, the safest way to prevent mitm6 is
to block DHCPv6 tra c and incoming router advertisements in Windows Firewall via
Group Policy. Disabling IPv6 entirely may have unwanted side e ects. Setting the
following prede ned rules to Block instead of Allow prevents the attack from working:
a. (Inbound) Core Networking - Dynamic Host Con guration Protocol for IPv6(DHCPV6-
In)
3. Relaying to LDAP and LDAPS can only be mitigated by enabling both LDAP signing
and LDAP channel binding.
Demo Corp
BUSINESS Page 23 of
CONFIDENTIAL
fi
ffi
fi
fi
fi
ff
Consider Administrative users to the Protected Users group or marking them as Account is
sensitive and cannot be delegated, which will prevent any impersonation of that user via
delegation.
Demo Corp
BUSINESS Page 24 of
CONFIDENTIAL
Description: Demo Corp failed to implement SMB signing on multiple devices. The
absence of SMB signing could lead to SMB relay attacks, yielding
system-level shells without requiring a user password.
Risk: Likelihood: High – Relaying password hashes is a basic technique not
requiring o ine cracking.
[ le removed]
Tools Used: Nessus, Nmap, MultiRelay, Responder
References: CIS Microsoft Windows Server 2012 R2 v2.2.0 (Page 180) https://
github.com/lgandx/Responder/blob/master/tools/MultiRelay.py
Evidence
Remediatio
n
Enable SMB signing on all Demo Corp domain computers. Alternatively, as SMB signing can
cause performance issues, disabling NTLM authentication, enforcing account tiering, and
limiting local admin users can e ectively help mitigate attacks. For full mitigation and detection
guidance, please reference the MITRE guidance here.
Demo Corp
BUSINESS Page 25 of
CONFIDENTIAL
fi
fi
ffl
ffi
ff
fi
Finding IPT-008: Insu cient Patch Management – Software (Critical)
Description: Demo Corp permitted various deprecated software in their network. This
includes:
Above lists all critical and high-rated deprecated software, the majority of
which permit serious vulnerabilities, such as remote code execution. For a
full
Remediation
Update to the latest software version. For a full list of vulnerable systems, versions, and patching
Demo Corp
BUSINESS Page 26 of
CONFIDENTIAL
ffi
requirements, please see the below document.
[ le removed]
Demo Corp
BUSINESS Page 27 of
CONFIDENTIAL
fi
Finding IPT-009: Insu cient Patch Management – Operating Systems (Critical)
Description: Demo Corp permitted various deprecated software in their network. This
includes:
[ le removed]
Tools Used: Nessus
References: NIST SP800-53 r4 MA-6 – Timely
Maintenance NIST SP800-53 r4 SI-2 – Flaw
Remediation
Remediation
Demo Corp
BUSINESS Page 28 of
CONFIDENTIAL
fi
fi
ffi
fi
Finding IPT-010: Insu cient Patching – MS08-067 - ECLIPSEDWING/NETAPI (Critical)
Description: Demo Corp permitted an unpatched system on the internal network that
is vulnerable to MS08-067. TCM Security con rmed that the vulnerability
likely exists but did not attempt the exploit to prevent any denial of
service.
Risk: Likelihood: High – Considered one of the most exploited vulnerabilities in
Microsoft Windows as it ships natively with Windows XP.
Evidence
Remediatio
n
Demo Corp
BUSINESS Page 29 of
CONFIDENTIAL
ffi
fi
Figure 10: MS08-067
Unpatched
Apply the appropriate Microsoft patches to remediate the issue. More information on
patching MS08-067 can be found here: https://docs.microsoft.com/en-us/security-
updates/SecurityBulletins/2008/ms08-067
Demo Corp
BUSINESS Page 30 of
CONFIDENTIAL
Finding IPT-011: Insu cient Patching – MS12-020 – Remote Desktop RCE (Critical)
Description: Demo Corp permitted an unpatched system on the internal network that
is vulnerable to MS12-020. TCM Security con rmed that the vulnerability
likely exists but did not attempt the exploit to prevent any denial of
service.
Risk: Likelihood: High – The vulnerability is easily discoverable and
exploitable with open-source tools.
Evidence
Remediation
Demo Corp
BUSINESS Page 31 of
CONFIDENTIAL
ffi
fi
Figure 11: MS12-020
Unpatched
Apply the appropriate Microsoft patches to remediate the issue. More information on
patching MS12-020 can be found here: https://docs.microsoft.com/en-us/security-
updates/securitybulletins/2012/ms12-020
Demo Corp
BUSINESS Page 32 of
CONFIDENTIAL
Description: Demo Corp permitted several unpatched systems on the internal network
that are vulnerable to MS17-010 (EternalBlue). TCM Security con rmed
that the vulnerability likely exists but did not attempt the exploit to prevent
any denial of service.
Risk: Likelihood: High – Malicious actors have used SMB exploitations like
EternalBlue in recent breaches.
administrator access.
System: 10.x.x.x
Evidence
Remediatio
n
Apply the appropriate Microsoft patches to remediate the issue. More information on
patching MS17-010 can be found here: https://docs.microsoft.com/en-us/security-
Demo Corp
BUSINESS Page 33 of
CONFIDENTIAL
ffi
fi
updates/securitybulletins/2017/ms17-010
Demo Corp
BUSINESS Page 34 of
CONFIDENTIAL
Description: Demo Corp permitted several unpatched systems on the internal network
that are vulnerable to CVE-2019-0708 (BlueKeep). TCM Security
con rmed that the vulnerability likely exists but did not attempt the exploit
to prevent any denial of service.
Risk: Likelihood: High – The vulnerability is easily discoverable and
exploitable with open-source tools.
administrator access.
System: 10.x.x.x
Tools Used: Nessus, Nmap
References: NIST SP800-53 r4 MA-6 – Timely
Maintenance NIST SP800-53 r4 SI-2 – Flaw
Remediation
Evidence
Remediatio
n
Apply the appropriate Microsoft patches to remediate the issue. More information on
patching CVE- 2019-0708 can be found here: https://support.microsoft.com/en-us/topic/
customer-guidance-for- cve-2019-0708-remote-desktop-services-remote-code-execution-
vulnerability-may-14-2019- 0624e35b-5f5d-6da7-632c-27066a79262e
Demo Corp
BUSINESS Page 35 of
CONFIDENTIAL
fi
ffi
Finding IPT-014: Insu cient Privileged Account Management – Kerberoasting (High)
Description: TCMS retrieved all user service principal names (SPNs) from the Demo
Corp domain controller using a domain user-level account (IPT-001) in a
Kerberoasting attack. Retrieving these user SPNs permitted TCMS to
crack 4 account passwords.
Evidence
Remediatio
n
Use Group Managed Service Accounts (GMSA) for privileged services. GMSA accounts can
be used to ensure passwords are long, complex, and change frequently. Where GMSA is not
applicable, protect accounts by utilizing a password vaulting solution.
TCMS recommends con guring alert logging on domain controllers for Windows event ID
4769 whenever requesting a Kerberos service ticket. These alerts are prone to high false-
positive rates but are a supplementary detective control. Tailor a security information and
event management tool (SIEM) to alert on excessive user SPN requests.
Demo Corp
BUSINESS Page 36 of
CONFIDENTIAL
ffi
fi
ffl
Finding IPT-015: Security Miscon guration – GPP Credentials (High)
Description: Demo Corp utilized “cpasswords” in Group Policy Preference (GPP) which
any domain user can query from a domain controller’s SYSVOL folder.
Microsoft published the key to decrypt these passwords.
Risk: Likelihood: High – Any authenticated user can obtain this information and
decrypt the password with open source tools.
Evidence
Remediatio
n
Apply vendor patching. Do not use GPP cpasswords. Additionally, enabling authentication on
the NFS share will protect the con dentiality of the stored information. Exporting
authentication logs to a SIEM solution will give incident response teams insights to brute
force login attempts.
Demo Corp
BUSINESS Page 37 of
CONFIDENTIAL
fi
fi
Demo Corp
BUSINESS Page 38 of
CONFIDENTIAL
Description: Demo Corp deployed 3 servers that permitted unauthenticated access via
VNC Server.
Risk: Likelihood: High – Discovering unauthenticated VNC servers is trivial
and can be done with open-source tools.
Evidence
[image redacted]
Demo Corp
BUSINESS Page 39 of
CONFIDENTIAL
ffi
Finding IPT-017: Default Credentials on Web Services (High)
Impact: High – Attackers can control devices, destroy data, or shut down
systems.
System: Default credentials were tested on a sample set of web applications, but
suggests checking the following addresses at a minimum:
[ le removed]
Tools Used: Manual Review
References: NIST SP800-53 IA-5(1) - Authenticator Management
Evidence
Remediation
Demo Corp
BUSINESS Page 40 of
CONFIDENTIAL
fi
fi
Figure 17: Dell via default credentials
iDRAC access
Change default credentials or disable unused accounts.
Demo Corp
BUSINESS Page 41 of
CONFIDENTIAL
[ le removed]
Tools Used: Manual Review
References: NIST SP800-53r4 CM-7 - Least Functionality
Evidence
Demo Corp
BUSINESS Page 42 of
CONFIDENTIAL
fi
ffi
Figure 18: Listable directory
Remediatio
n
Demo Corp
BUSINESS Page 43 of
CONFIDENTIAL
Evidence
Remediation
Demo Corp
BUSINESS Page 44 of
CONFIDENTIAL
fi
Disable SMB share or require authentication. Enabling authentication on the share will protect
the con dentiality of the stored information. Exporting authentication logs to a SIEM solution will
give incident response teams insights to brute force login attempts.
Demo Corp
BUSINESS Page 45 of
CONFIDENTIAL
fi
Finding IPT-020: Insu cient Patch Management – SMBv1 (Moderate)
Description: Demo Corp failed to patch SMBv1. This version is vulnerable to multiple
denial of service and remote code execution attacks. TCM Security
con rmed that the vulnerability likely exists but did not attempt the
exploit to prevent any denial of service.
Risk: Likelihood: Moderate – Basic scans would identify the SMB version but
would require an adversary to be on the internal network and identify an
exploit.
Evidence
Remediation
Demo Corp
BUSINESS Page 46 of
CONFIDENTIAL
fi
ffi
fi
Finding IPT-021: IPMI Hash Disclosure (Moderate)
Description: Demo Corp deployed remote host supporting IPMI v2.0. The (IPMI)
protocol is a ected by an information disclosure vulnerability due to the
support of RMCP+ Authenticated Key-Exchange Protocol (RAKP)
authentication. A remote attacker
can obtain password hash information for valid user accounts via the
HMAC from a RAKP message 2 response from a BMC.
Risk: Likelihood: High – Basic network scans will identify this vulnerability.
assessment.
System: Identi ed 34 machines, please see the below le for listing.
[ le removed]
Tools Used: Metasploit
References: https://blog.rapid7.com/2013/07/02/a-penetration-testers-guide-to-ipmi/
Evidence
Remediation
There is no patch for this vulnerability; it is an inherent problem with the speci cation for IPMI
v2.0. Suggested mitigations include:
Demo Corp
BUSINESS Page 47 of
CONFIDENTIAL
fi
fi
ff
fi
ff
fi
Finding IPT-022: Insu cient SNMP Community String Complexity (Moderate)
Description: Demo Corp deployed SNMP with default “public” community strings. This
con guration exposed read-only access to the system’s management
information base (MIB), including the network con gurations.
Risk: Likelihood: High – Basic network scans will identify this vulnerability.
[ le removed]
Tools Used: Nessus, SNMP-Check, Ettercap
References: NIST SP800-53 r4 AC-17(2) - Remote Access Protection of
Con dentiality/Integrity using Encryption
Evidence
Remediation
TCM Security recommends Demo Corp consider the following corrective actions:
Demo Corp
BUSINESS Page 48 of
CONFIDENTIAL
fi
fi
fi
fi
ffi
fi
fi
fi
• Evaluate migration to SNMPv3
Demo Corp
BUSINESS Page 49 of
CONFIDENTIAL
Description: Demo Corp permitted Telnet which does not encrypt data in transit.
Telnet uses plain text authentication and passes all data (including
passwords) in clear text and can be intercepted by an attacker.
Risk: Likelihood: Low – An adversary requires a Man-in-the-Middle position
between the client and server.
[ le removed]
Tools Used: Telnet
References: NIST SP800-53 r4 AC-17(2) - Remote Access |Protection of
Con dentiality / Integrity Using Encryption
Evidence
Remediation
Demo Corp
BUSINESS Page 50 of
CONFIDENTIAL
fi
fi
fi
ffi
fi
Finding IPT-024: Insu cient Terminal Services Con guration (Moderate)
Description: The remote Terminal Services is not con gured to use Network Level
Authentication (NLA) only. NLA uses the Credential Security Support
Provider (CredSSP) protocol to perform strong server authentication
either through TLS/SSL or Kerberos mechanisms, which protect against
man-in-the-middle attacks. In addition to improving authentication, NLA
also helps protect the
[ le removed]
Tools Used: Nessus
References: https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-
server- 2008-R2-and-2008/cc732713(v=ws.11)
Remediation
Enable Network Level Authentication (NLA) on the remote RDP server. This is generally done on
the 'Remote' tab of the 'System' settings on Windows.
Demo Corp
BUSINESS Page 51 of
CONFIDENTIAL
fi
fi
ffi
fi
fi
fi
Finding IPT-025: Steps to Domain Admin (Informational)
The steps below describe how the penetration tester obtained domain administrator access.
Each step also provides remediation recommendations to help mitigate risk.
wdigest
5 Overly-permissive ‘Bartender’ account Limit local administrator
permitted access to a large amount of privileges and enforce least
machines within the
privilege.
network
6 Dumped hashes on accessed machines to nd Disable WDigest via GPO.
cleartext password of Domain Administrator
account
7 Utilized discovered credentials to log into the
domain controller.
Remediation
Demo Corp
BUSINESS Page 52 of
CONFIDENTIAL
fi
ffl
fi
fi
TCMS provides all clients with all report information gathered during testing. This includes
Nessus les and full vulnerability scans in detailed formats. These reports contain raw
vulnerability scans and additional vulnerabilities not exploited by TCM Security.
The reports identify hygiene issues needing attention but are less likely to lead to a
breach, i.e. defense-in-depth opportunities. For more information, please see the
documents in your shared drive folder labeled “Additional Scans and Reports”.
Demo Corp
BUSINESS Page 53 of
CONFIDENTIAL
fi
Last Page
Demo Corp
BUSINESS Page 54 of
CONFIDENTIAL