HTB Academy Report Template
HTB Academy Report Template
HTB Academy Report Template
Report of Findings
HTB Certified Penetration Testing Specialist (CPTS) Exam Report
Candidate Name: <FULL NAME HERE>
Trilocor Robotics
Month Day, Year
Version 1.0
2
Statement of Confidentiality
The contents of this document have been developed by Hack The Box. Hack The Box considers
the contents of this document to be proprietary and business confidential information. This
information is to be used only in the performance of its intended use. This document may not be
released to another vendor, business partner or contractor without prior written consent from
Hack The Box. Additionally, no portion of this document may be communicated, reproduced,
copied or distributed without the prior consent of Hack The Box.
The contents of this document do not constitute legal advice. Hack The Box’s offer of services
that relate to compliance, litigation or other legal interests are not intended as legal counsel and
should not be taken as such. The assessment detailed herein is against a fictional company for
training and examination purposes, and the vulnerabilities in no way affect Hack The Box
external or internal infrastructure.
3
Engagement Contacts
Trilocor Contacts
Assessor Contact
4
Executive Summary
Trilocor Robotics Ltd. (“Trilocor” herein) contracted <ASSESSOR NAME> to perform a Network
Penetration Test of Trilocor’s externally facing network to identify security weaknesses,
determine the impact to Trilocor, document all findings in a clear and repeatable manner, and
provide remediation recommendations.
Approach
<ASSESSOR NAME> performed testing under a “black box” approach from <START DATE> to
<END DATE> without credentials or any advance knowledge of Trilocor’s externally facing
environment with the goal of identifying unknown weaknesses. Testing was performed from a
non-evasive standpoint with the goal of uncovering as many misconfigurations and
vulnerabilities as possible. Testing was performed remotely from <ASSESSOR NAME>‘s
assessment labs. Each weakness identified was documented and manually investigated to
determine exploitation possibilities and escalation potential. <ASSESSOR NAME> sought to
demonstrate the full impact of every vulnerability, up to and including internal domain
compromise. If <ASSESSOR NAME> were able to gain a foothold in the internal network as a
result of external network testing, Trilocor allowed for further testing including lateral movement
and horizontal/vertical privilege escalation to demonstrate the impact of an internal network
compromise.
5
Scope
The scope of this assessment was one external IP address, two internal network ranges, the
TRILOCOR.LOCAL Active Directory domain, and any other Active Directory domains owned by
Trilocor discovered if internal network access were achieved.
In-Scope Assets
6
Network Penetration Test Assessment Summary
<ASSESSOR NAME> began all testing activities from the perspective of an unauthenticated user
on the internet. Trilocor provided the tester with network ranges but did not provide additional
information such as operating system or configuration information.
Summary of Findings
During the course of testing, <ASSESSOR NAME> uncovered a total of <NUMBER (#)> findings
that pose a material risk to Trilocor’s information systems. <ASSESSOR NAME> also identified
<one informational finding> that, if addressed, could further strengthen Trilocor’s overall
security posture. Informational findings are observations for areas of improvement by the
organization and do not represent security vulnerabilities on their own. The below table provides
a summary of the findings by severity level.
Finding Severity
5 1 1 7
Table 2: Severity Summary
Below is a high-level overview of each finding identified during testing. These findings are
covered in depth in the Technical Findings Details section of this report.
Finding
Severity Level Finding Name
#
7
Internal Network Compromise Walkthrough
During the course of the assessment <ASSESSOR NAME> was able gain a foothold via the
external network, move laterally, and compromise the internal network, leading to full
administrative control over the TRILOCOR.LOCAL Active Directory domain and <INSERT DOMAIN
NAME> Active Directory domain. The steps below demonstrate the steps taken from initial
access to compromise and does not include all vulnerabilities and misconfigurations discovered
during the course of testing. Any issues not used as part of the path to compromise are listed as
separate, standalone issues in the Technical Findings Details section, ranked by severity level.
The intent of this attack chain is to demonstrate to Trilocor the impact of each vulnerability
shown in this report and how they fit together to demonstrate the overall risk to the client
environment and help to prioritize remediation efforts (i.e., patching two flaws quickly could
break up the attack chain while the company works to remediate all issues reported). While
other findings shown in this report could be leveraged to gain a similar level of access, this
attack chain shows the initial path of least resistance taken by the tester to achieve domain
compromise.
Detailed Walkthrough
<ASSESSOR NAME> performed the following to fully compromise the TRILOCOR.LOCAL domain.
1. <LIST HIGH LEVEL STEPS>
2.
8
Detailed reproduction steps for this attack chain are as follows:
<FILL IN DETAILED ATTACK CHAIN STEPS>
9
<ASSESSOR NAME> then performed the following to fully compromise the <INSERT OTHER
INTERNAL DOMAIN NAME(S)> domain.
1. <LIST HIGH LEVEL STEPS>
2.
10
Detailed reproduction steps for this attack chain are as follows:
<FILL IN DETAILED ATTACK CHAIN STEPS>
11
Remediation Summary
As a result of this assessment there are several opportunities for Trilocor to strengthen its
external and internal network security. Remediation efforts are prioritized below starting with
those that will likely take the least amount of time and effort to complete. Trilocor should ensure
that all remediation steps and mitigating controls are carefully planned and tested to prevent
any service disruptions or loss of data.
Short Term
[Finding 2] – Set strong (24+ character) passwords on all SPN accounts
<FILL IN AS APPROPRIATE>
Enforce a password change for all users because of the domain compromise
Medium Term
[Finding 1] – Disable LLMNR and NBT-NS wherever possible
<FILL IN AS APPROPRIATE>
Long Term
Perform ongoing internal network vulnerability assessments and domain password audits
Perform periodic Active Directory security assessments
Educate systems and network administrators and developers on security hardening best
practices compromise
Enhance network segmentation to isolate critical hosts and limit the effects of an internal
compromise
<FILL IN AS APPROPRIATE>
12
Technical Findings Details
<EXAMPLE HIGH, MEDIUM, LOW, INFO FINDINGS>
1. LLMNR/NBT-NS Response Spoofing - High
CWE CWE-522
13
mitigate, or at least alleviate, the scope of MiTM activity.
External
https://attack.mitre.org/techniques/T1557/001/
References
Detailed Reproduction Steps: <SHOW ALL STEPS, NOT JUST A SINGLE SCREENSHOT>
Running the Responder tool to attempt to obtain user account password hashes.
__
.----.-----.-----.-----.-----.-----.--| |.-----.----.
| _| -__|__ --| _ | _ | | _ || -__| _|
|__| |_____|_____| __|_____|__|__|_____||_____|__|
|__|
<SNIP>
<SNIP>
<SNIP>
14
Successfully cracking a password hash with Hashcat to reveal the clear text password value.
<SNIP>
BSMITH::TRILOCOR:7eccd965c4b98ebc:73d1b2c8c5f9861eefd31bb45085a651:010100000000000000b588d9f766d801191bb2236
a5faaa50000000002000800330042004b005a0001001e00570049004e002d0054005700570058005400470044003900340043005
6XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX004700440039003400430056002e003300
42004b005a002e004c004f00430041004c0003001400330042004b005a002e004c004f00430041004c0005001400330042004b005
a002e004c004f00430041004c000700080000b588d9f766d801060004000200000008003000300000000000000001000000002000
002cae5bf3bb1fd2f846a280aef43a8809c15207bfcb4df5a580ba1b6fcaf6bbce0a0010000000000000000000000000000000000009
00280063006900660073002f003100390032002e003100360038002e003100390035002e00310036003800000000000000000000
000000:<REDACTED>
15
2. Insecure File Shares - Medium
CWE CWE-284
Description (Incl. The tester uncovered multiple file shares where all Domain Users have
Root Cause) read/write access.
An attacker who gains a foothold in this domain can use this access to
Security Impact search for files containing sensitive data such as credentials and potentially
write malicious files to the file shares.
Review file share privileges to ensure that users are granted access in
Remediation
accordance with the principal of least privilege.
External
https://attack.mitre.org/techniques/T1135/
References
SMB 192.168.195.205 445 MS01 [*] Windows 10.0 Build 17763 x64 (name:MS01) (domain:TRILOCOR.LOCAL)
(signing:False) (SMBv1:False)
SMB 192.168.195.205 445 MS01 [+] TRILOCOR.LOCAL\asmith:<REDACTED>
SMB 192.168.195.205 445 MS01 [+] Enumerated shares
SMB 192.168.195.205 445 MS01 Share Permissions Remark
SMB 192.168.195.205 445 MS01 ----- ----------- ------
SMB 192.168.195.205 445 MS01 ADMIN$ Remote Admin
SMB 192.168.195.205 445 MS01 Backups READ
SMB 192.168.195.205 445 MS01 C$ Default share
SMB 192.168.195.205 445 MS01 IPC$ READ Remote IPC
SMB 192.168.195.205 445 MS01 Migration Data READ
SMB 192.168.195.205 445 MS01 Software READ,WRITE
16
3. Directory Listing Enabled - Low
CWE CWE-548
Description (Incl. The web application exposes a directory listing of some files in the web root
Root Cause) and subfolders.
The severity of this finding depends on the sensitivity of the files exposed
on the web server. If the directory exposes only files intended for public
Security Impact consumption, then the risk is lower but if an attacker can gain access to
sensitive information such as configuration files, they may be able to use
these to gain further access to the application or web server.
https://attack.mitre.org/techniques/T1083/
External
References https://www.acunetix.com/blog/articles/directory-listing-information-
disclosure/
17
Figure 4: Directory Listing
18
4. Enhance Security Monitoring Capabilities - Info
CWE CWE-693
It appeared that Trilocor did not notice “noisy” activities during the course
Description (Incl.
of testing. The tester was also not blocked when using standard open-
Root Cause)
source penetration testing tools.
External
https://attack.mitre.org/tactics/TA0005/
References
19
Appendices
Appendix A – Finding Severities
Each finding has been assigned a severity rating of high, medium, or low. The rating is based off
of an assessment of the priority with which each finding should be viewed and the potential
impact each has on the confidentiality, integrity, and availability of Trilocor’s data.
20
Appendix B – Host & Service Discovery
IP Address Port Service Notes
<FILL IN AS
APPROPRIATE>
21
Appendix C – Subdomain Discovery
URL Description Discovery Method
<FILL IN
DISCOVERED
VHOSTS/SUBDOMAIN
S>
22
Appendix D – Exploited Hosts
Host Scope Method Notes
<FILL IN AS
APPROPRIATE>
23
Appendix E – Compromised Users
Username Type Method Notes
<FILL IN AS
APPROPRIA
TE>
24
Appendix F – Changes/Host Cleanup
Host Scope Change/Cleanup Needed
<FILL IN AS
APPROPRIATE
>
25
Appendix G – Flags Discovered
Flag Host Flag Value Flag Location Method Used
#
1. NIX01 <MD5 HASH> Web root Unrestricted file upload
(example)
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Table 10: Flags Discovered
26