FCIS-Book-Testing-Report
FCIS-Book-Testing-Report
Table of Contents
1 Executive Summary...........................................................................................................3
2 Assessment Overview........................................................................................................5
2.1 Planning.........................................................................................................................6
2.2 Discovery.......................................................................................................................6
2.3 Attack.............................................................................................................................6
2.4 Reporting.......................................................................................................................6
3 Finding Severity Ratings....................................................................................................7
4 Scope of Engagement........................................................................................................8
4.1 Targets...........................................................................................................................8
4.2 Scope Exclusions.........................................................................................................8
5 Findings Table.....................................................................................................................9
6 Technical Findings............................................................................................................10
2 Assessment Overview
From Dec 2nd, 2023 to Dec 17th, 2023, FCIS book engaged You to evaluate
the security posture of its infrastructure compared to current industry best
practices that included an external penetration test. All testing performed is
based on the NIST SP 800-115 Technical Guide to Information Security
Testing and Assessment, OWASP Testing Guide (v4), and customized testing
frameworks.
Phases of penetration testing activities include the following:
Planning – Customer goals are gathered and rules of engagement
obtained.
Discovery – Perform scanning and enumeration to identify potential
vulnerabilities, weak areas, and exploits.
Attack – Confirm potential vulnerabilities through exploitation and
perform additional discovery upon new access.
Reporting – Document all found vulnerabilities and exploits, failed
attempts, and company strengths and weaknesses.
2.2 Discovery
Information Gathering: Collect relevant information about the internal
infrastructure, including IP ranges, domain names, and network
architecture.
Open Source Intelligence (OSINT): Utilize publicly available sources to
gather additional information about employees, technology stack, and
potential weak points.
Vulnerability Scanning: Perform automated vulnerability scans on the
identified systems to uncover known security vulnerabilities.
Network Mapping: Create a comprehensive map of the internal
network, identifying live hosts, open ports, and services.
2.3 Attack
Manual Vulnerability Assessment: Conduct an in-depth manual
assessment of the identified vulnerabilities to validate their severity
and potential impact.
Exploitation: Attempt to exploit the identified vulnerabilities to
determine their feasibility and potential impact on the internal
systems.
Privilege Escalation: If necessary, attempt to escalate privileges to gain
deeper access into the systems and network.
Lateral Movement: Explore the internal network for lateral movement
opportunities, simulating an attacker's attempt to pivot within the
environment.
Data Exfiltration (If Agreed Upon): Simulate the extraction of sensitive
data from the internal systems to demonstrate potential data
breaches.
2.4 Reporting
Reporting the findings of the penetration tests is integral to the fulfilment of
the previously mentioned strategic motivations and driving forces behind
engaging in such a process. Hence, once the above tasks are completed, a
The following table defines levels of severity and corresponding CVSS score
range that are used throughout the document to assess vulnerability and risk
impact.
CVSS V3
Severity Definiti
Score
on
Range
Exploitation is straightforward and usually results in
Critical 9.0-10.0 system-level compromise. It is advised to form a plan of
action and patch immediately.
Risk Factors
Risk is measured by two factors: Likelihood and Impact:
Likelihood
Likelihood measures the potential of a vulnerability being exploited. Ratings are
given based on the difficulty of the attack, the available tools, attacker skill level,
and client environment.
Impact
Impact measures the potential vulnerability’s effect on operations, including
confidentiality, integrity, and availability of client systems and/or data,
reputational harm, and financial loss.
4.1 Targets
Assessm Detai
ent ls
Per client request, you will not perform any of the following attacks during
testing:
• Denial of Service (DoS)
• Phishing/Social Engineering
All other attacks not specified above were permitted by FCIS book.
Risk Finding
FLAG{lYQcDZ2c2IVNdk7Uf0pycjS5sE6IaNzGgkxnlOYoyl1XvoqYove+6
RcFFNr0R5L+U/URtL+YokeXnUyfC+vAMiItlPOcIhZCtHaDYLFiMQA=}
Description:
A flag can be obtained when we check the src code of the login
page
Recommend
ations
Steps to reproduce: -
1- The below screenshot shows how an attacker can get the flag.
Steps to reproduce: -
1- The below screenshot show how an attacker can get the flag.
Steps to reproduce: -
2-
1-
2-
3-
2- B
y unhashing we get the admin password (adminadminadmin)
3-
1-
2-
3-
Description:
1.1 Attackers are able to add cmd.php file as a
profile pic
Description:
Description:
Steps to reproduce:
Steps to reproduce:
Steps to reproduce:
2-