Detecting Network Security Vulnerabilities and Proactive Strategies to Mitigate Potential Threats

12/22/2022
by   Aiman Al-Sabaawi, et al.
0

In multi-tier network systems, custom applications, Web services and platform environments, storing data and information assets becomes a challenge for any organisation. Although there are different methods to secure network systems, the best way to test the level of security is to conduct penetration testing. In this paper, we describe how we performed live penetration testing for a particular network, namely, 192.168.3.0/24 (Case Study) by identifying the system vulnerabilities to enable its penetration. After compromising the system, critical data (Flags) must be found, indicating our successful penetration. As professional penetration testers, we used an arsenal of penetration testing tools utilised by malicious actors on the internet, such as Nmap, Nessus, Sparta and Metasploit, etc. Typically, much effort was employed on reconnaissance scanning phases, rather than system exploration, due to their importance in identifying security vulnerabilities in the system environment. The vulnerability analysis highlighted the most critical threats, which token is an advantage to gain access, namely, FTP services, HTTP, and human errors. However, comprising the system is not sufficient because the critical data (Flag) generally requires the administrators rights. Consequently, teams often examine the system to find a way to escalate privilege to the root level. Furthermore, some critical data (Flags) require decryption algorithms or the analysis of captured packets to make them readable. We found eight Flags and identified a system security breach. Mitigation strategies addressing the identified vulnerabilities are recommended to ensure the given networks are secured against future attacks.

READ FULL TEXT

page 4

page 5

page 6

page 7

page 8

page 9

page 10

page 11

research
12/13/2022

Evaluation of Static Analysis on Web Applications

Web services are becoming business-critical components, often deployed w...
research
08/01/2018

Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives

The development of the Internet of Drones (IoD) becomes vital because of...
research
08/11/2020

Identifying Implicit Vulnerabilities through Personas as Goal Models

When used in requirements processes and tools, personas have the potenti...
research
04/19/2019

Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security

The trend toward autonomous robot deployments is on an upward growth cur...
research
07/11/2023

Formal and Fuzzing Amplification: Targeting Vulnerability Detection in 5G and Beyond

Softwarization and virtualization in 5G and beyond require rigorous test...
research
03/16/2021

Blockchain-assisted Undisclosed IIoT Vulnerabilities Trusted Sharing Protection with Dynamic Token

With the large-scale deployment of industrial internet of things (IIoT) ...
research
11/04/2018

Web Security Investigation through Penetration Tests: A Case study of an Educational Institution Portal

Web security has become an important subject; many companies and organiz...

Please sign up or login with your details

Forgot password? Click here to reset