{"id":791,"date":"2021-05-28T17:45:39","date_gmt":"2021-05-28T15:45:39","guid":{"rendered":"https:\/\/portal.diagnosticsincontrol.com\/?page_id=791"},"modified":"2021-05-31T08:48:35","modified_gmt":"2021-05-31T06:48:35","slug":"diagnostics-penetration-testing-report","status":"publish","type":"page","link":"https:\/\/portal.diagnosticsincontrol.com\/index.php\/diagnostics-penetration-testing-report\/","title":{"rendered":"Diagnostics Penetration Testing Report"},"content":{"rendered":"\n<p style=\"font-size:24px;line-height:0\"><span style=\"color:#b2d34a\" class=\"has-inline-color\">Introduction<\/span><\/p>\n\n\n\n<p>At&nbsp;Realworld, we are always striving to ensure that sensitive and private data is kept private.&nbsp;<\/p>\n\n\n\n<p>With this in mind, Coen issued a challenge to the Diagnostics team to try and break the Diagnostics Collector.&nbsp;&nbsp;<\/p>\n\n\n\n<p>At stake was the integrity of the collector, but also&nbsp;a&nbsp;fabulous&nbsp;1kg of&nbsp;Chocolate&nbsp;Eggs&nbsp;as prize&nbsp;to whomever could break into it and retrieve sensitive information.&nbsp;<\/p>\n\n\n\n<p>The Diagnostics team set out to test the security of the&nbsp;Collector.&nbsp;Could they rise to the challenge and beat the&nbsp;Collector?&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:24px\"><span style=\"color:#b2d34a\" class=\"has-inline-color\">Preparation<\/span><\/p>\n\n\n\n<p>Gert gave the Diagnostics team a head-start with some&nbsp;tips&nbsp;on doing penetration testing (and pictures of his slippers!).&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"916\" height=\"916\" src=\"https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-3.png\" alt=\"Text\n\nDescription automatically generated\" class=\"wp-image-796\" srcset=\"https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-3.png 916w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-3-300x300.png 300w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-3-150x150.png 150w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-3-768x768.png 768w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-3-100x100.png 100w\" sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/figure>\n\n\n\n<p>Armed with this knowledge, the team began to prepare&nbsp;in earnest. At first, it was decided that each member would compete with the others for the fabled eggs, but a twist appeared in the challenge.&nbsp;<\/p>\n\n\n\n<p>There would only be one day in which to accomplish this monumental task!&nbsp;<\/p>\n\n\n\n<p>Given this new information, the team decided to collaborate more than compete, and thus the stage was set for an epic confrontation.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:24px\"><span style=\"color:#b2d34a\" class=\"has-inline-color\">Penetration Testing Day\u00a0<\/span><\/p>\n\n\n\n<p>The day of the testing dawned deceptively quiet. However, the team were ready. Meenakshi had provided yet another advantage to the team through her research, and found the software package Kali, ideal for taking on the tough foe that was the&nbsp;Collector.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"504\" src=\"https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-4-1024x504.png\" alt=\"\" class=\"wp-image-797\" srcset=\"https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-4-1024x504.png 1024w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-4-300x148.png 300w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-4-768x378.png 768w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-4-1536x756.png 1536w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-4.png 1600w\" sizes=\"(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><figcaption>Kali VM<\/figcaption><\/figure>\n\n\n\n<p>Network vulnerability scanning was the&nbsp;logical&nbsp;way to start finding weaknesses in the Collector\u2019s defences.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"716\" height=\"915\" src=\"https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-2.png\" alt=\"\" class=\"wp-image-795\" srcset=\"https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-2.png 716w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-2-235x300.png 235w\" sizes=\"(max-width: 716px) 100vw, 716px\" \/><figcaption>Vulnerability Check (can only identify the open ports, but not penetrate)<\/figcaption><\/figure>\n\n\n\n<p>Once the network vulnerability scanning was complete, it was time to bring out the big guns and try to exploit the Collector. Time and again the team\u2019s attacks were turned aside, but they ploughed on, undeterred, trying new attacks. One could be forgiven for thinking that&nbsp;the team&nbsp;attacking from so far apart on the globe would mean that it was&nbsp;easier for the Collector to defend itself, but this was not the case.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"340\" height=\"72\" src=\"https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image.png\" alt=\"\" class=\"wp-image-793\" srcset=\"https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image.png 340w, https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-300x64.png 300w\" sizes=\"(max-width: 340px) 100vw, 340px\" \/><figcaption>Exploit attacks launched<\/figcaption><\/figure>\n\n\n\n<p>Throughout the day, the team would confer on what was occurring from their respective&nbsp;attacks, and attempt to get past the Collector. They would then shift their focus to better probe the defences.&nbsp;But the day was wearing on.&nbsp;<\/p>\n\n\n\n<p>Was there still time to crack the Collector?&nbsp;<\/p>\n\n\n\n<p style=\"line-height:1.5\"><\/p>\n\n\n\n<p style=\"font-size:24px\"><span style=\"color:#b2d34a\" class=\"has-inline-color\">The End of the Day<\/span>\u00a0<\/p>\n\n\n\n<p>When the smoke cleared from the final attacks by the team, the Collector stood whole and unbroken.&nbsp;In a last meeting for the day, Coen declared the Collector victorious!&nbsp;It had protected its secrets.&nbsp;<\/p>\n\n\n\n<p>No one from the team would be able to lay claim to the Chocolate Eggs.&nbsp;<\/p>\n\n\n\n<p>The data was safe!&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"194\" height=\"122\" src=\"https:\/\/portal.diagnosticsincontrol.com\/wp-content\/uploads\/2021\/05\/image-1.png\" alt=\"\" class=\"wp-image-794\"\/><figcaption>No active sessions shows that no attack succeeded<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p style=\"font-size:24px\"><span style=\"color:#583f99\" class=\"has-inline-color\">Epilogue: Report<\/span>&nbsp;<\/p>\n\n\n\n<p>In&nbsp;all&nbsp;seriousness,&nbsp;the&nbsp;Diagnostics&nbsp;Team are&nbsp;very&nbsp;proud&nbsp;to&nbsp;say&nbsp;that&nbsp;the&nbsp;Diagnostics&nbsp;Collector is secure.&nbsp;<\/p>\n\n\n\n<p>Penetration&nbsp;Testing&nbsp;failed&nbsp;to&nbsp;retrieve&nbsp;any&nbsp;sensitive&nbsp;information.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:18px\"><span style=\"color:#583f99\" class=\"has-inline-color\">TESTERS\u00a0<\/span><\/p>\n\n\n\n<p>Meenakshi&nbsp;Sundareswari&nbsp;<\/p>\n\n\n\n<p>Koen van&nbsp;Keulen&nbsp;<\/p>\n\n\n\n<p style=\"font-size:18px\"><span style=\"color:#583f99\" class=\"has-inline-color\">SOFTWARE USED<\/span>\u00a0<\/p>\n\n\n\n<p>Several different software penetration tools were used.&nbsp;<\/p>\n\n\n\n<p>Kali \u2013 this included a whole suite of different tools (including Nmap, Spike, ZAP and Metasploit&nbsp;below, along with a lot of others).&nbsp;<\/p>\n\n\n\n<p>NMap&nbsp;\u2013 to check ports, and for vulnerability checks.&nbsp;<\/p>\n\n\n\n<p>Spike \u2013 check vulnerability.&nbsp;&nbsp;<\/p>\n\n\n\n<p>ZAP \u2013 check vulnerability.&nbsp;<\/p>\n\n\n\n<p>Metasploit \u2013 to try exploits.&nbsp;<\/p>\n\n\n\n<p style=\"font-size:18px\"><span style=\"color:#583f99\" class=\"has-inline-color\">REPORT TABLE\u00a0<\/span><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>SOFTWARE USED<\/strong>&nbsp;<\/td><td><strong>ATTACK\/OTHER<\/strong>&nbsp;<\/td><td><strong>RESULT<\/strong>&nbsp;<\/td><td><strong>CONCLUSION<\/strong>&nbsp;<\/td><\/tr><tr><td>NMap&nbsp;<\/td><td>Check Ports&nbsp;443, 22, 8000 and&nbsp;Vulnerability scan&nbsp;<\/td><td>Ports Identified \u2013 no penetration&nbsp;<\/td><td>Ports are secured\/Vulnerability cannot be penetrated&nbsp;<\/td><\/tr><tr><td>Spike&nbsp;<\/td><td>ssl&nbsp;test 443&nbsp;(vulnerability scan)&nbsp;<\/td><td>No Penetration&nbsp;<\/td><td>Vulnerability cannot be penetrated&nbsp;<\/td><\/tr><tr><td>ZAP&nbsp;<\/td><td>web test 8000&nbsp;(vulnerability scan)&nbsp;<\/td><td>No Penetration&nbsp;<\/td><td>Vulnerability cannot be penetrated&nbsp;&nbsp;<\/td><\/tr><tr><td>Metasploit&nbsp;<\/td><td>Exploit attacks&nbsp;<\/td><td>No Penetration and&nbsp;no data retrieved&nbsp;<\/td><td>Exploits cannot penetrate the&nbsp;Diagnostics Collector&nbsp;protection, and&nbsp;the&nbsp;data is secure.&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Introduction At&nbsp;Realworld, we are always striving to ensure that sensitive and private data is kept private.&nbsp; With this in mind, Coen issued a challenge to the Diagnostics team to try and break the Diagnostics Collector.&nbsp;&nbsp; At stake was the integrity of the collector, but also&nbsp;a&nbsp;fabulous&nbsp;1kg of&nbsp;Chocolate&nbsp;Eggs&nbsp;as prize&nbsp;to whomever could break into it and retrieve sensitive &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/portal.diagnosticsincontrol.com\/index.php\/diagnostics-penetration-testing-report\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Diagnostics Penetration Testing Report&#8221;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-791","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/portal.diagnosticsincontrol.com\/index.php\/wp-json\/wp\/v2\/pages\/791"}],"collection":[{"href":"https:\/\/portal.diagnosticsincontrol.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/portal.diagnosticsincontrol.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/portal.diagnosticsincontrol.com\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/portal.diagnosticsincontrol.com\/index.php\/wp-json\/wp\/v2\/comments?post=791"}],"version-history":[{"count":7,"href":"https:\/\/portal.diagnosticsincontrol.com\/index.php\/wp-json\/wp\/v2\/pages\/791\/revisions"}],"predecessor-version":[{"id":804,"href":"https:\/\/portal.diagnosticsincontrol.com\/index.php\/wp-json\/wp\/v2\/pages\/791\/revisions\/804"}],"wp:attachment":[{"href":"https:\/\/portal.diagnosticsincontrol.com\/index.php\/wp-json\/wp\/v2\/media?parent=791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}