Penetration Testing on Virtual Machines
Penetration Testing on Virtual Machines
1
Sarthak Baluni, 2Shivansu Dutt, 3Pranjal Dabral, 4Srabanti Maji, 5Anil Kumar, 6Alka Chaudhary
1,2,3,4,5
DIT University, Dehradun, Uttarakhand, India
6
Amity University, Noida, Uttar Pradesh, India
1
1000011210@dit.edu.in, 21000010958@dit.edu.in, 31000010834@dit.edu.in, 4srabanti.maji@dituniversity.edu.in,
5
dahiyaanil@yahoo.com, 6alka.chaudhary0207@gmail.com
2
Authorized licensed use limited to: Ministry of Higher Education (HQ). Downloaded on December 22,2023 at 13:02:25 UTC from IEEE Xplore. Restrictions apply.
regarding that framework plus whatever will come handy to 1) Scope of working inclusive of:
break inside. This will help with making the strategy and 1. Assessing the vulnerabilities as well as pen-test
uncover possible targets.
2. Collaborative dashboards to report and manage
Stage 3: Assessing the Vulnerabilities vulnerabilities
Inside the phase, our app would be examined to find 3. Consultations for best and safe practices
security flaws using examination of our security foundation
as well as design. That analyzer looks to find some open gap 2) We have various test methods based on what we
if not then security holes which could give advantage require:
regarding breaking inside that framework 1. Regarding web pages
Stage 4: Exploitation 2. For web apps
When that analyzer has outfitted regarding all 3. After completion of pen test, we set up definite
information on weaknesses existing inside that framework, vulnerabilities record to give an elevated perspective
that person would begin taking advantage of those. That of safety status. With their definite reports and
would come handy for recognizing that idea regarding those weakness, the management stage. The record
security loopholes and that process expected for taking contains the below pointers
advantage of those. 4. Details of the vulnerability
Stage 5: After Exploit Step 5. Videos, screenshots and POC of the found
The fundamental goal for penetration testing is to mimic vulnerabilities
a certifiable assault where assailants will be causing genuine 6. Well fitted steps to fixing security bugs and better
harm after taking advantage of those security defects inside execution.
that framework. Accordingly, once that analyser gains access
into that framework, they would utilize every suitable way 3) Virtualization software and machines
for raising their honours. 1. *Oracle Virtual Box (virtualization software)
Stage 6: Maintaining access 2. *Kali Linux Wallaby’s nightmare (machine)
When assailants gain admittance into that framework, B. Info-Gathering Step
they attempt for keeping a way open for additional abuse In this step, we gather as much data as we can about the
using indirect accesses as well as rootkits. The equivalent is web application as one could reasonably be expected and get
finished by analysers as well. They introduce malware as all the understanding of its reasoning. The assembled data
well as different projects for keeping the framework tainted will be utilized to make a base of information to follow up on
as well as checking whether those programs are identified as in later advances. We ought to assemble all the data we find
well as eliminated by that app. regardless of whether it appears to be useless and
Stage 7: Reporting insignificant since no one at the start knows which pieces of
data are required [5].
Every work done during the pen-test has to be recorded
in a definite format along with procedures as well as plans TABLE I. WEB APPLICATION PEN- TESTING TOOLS
for fixing the blemishes regarding the security.
A. Access-gaining Methodology [4]
We utilize a blend of assessing the vulnerabilities as well
as pen test for checking and observing every security defects
inside the app. We not just implement test which are
standardized yet additionally well-fitted test considering the
app, for getting as better result as possible.
Information gathering
Vulnerabilities analysis
Vulnerabilities Exploits
3
Authorized licensed use limited to: Ministry of Higher Education (HQ). Downloaded on December 22,2023 at 13:02:25 UTC from IEEE Xplore. Restrictions apply.
1) Nmap Scanning
At its center, Nmap is a network filtering tool which
make use of internet protocol packets for recognizing each of
the devices linked with a network and to provide data on the
services and operating systems. Execution is shown in Fig. 2.
Fig. 4. Running Dir buster to find hidden web pages in the web server.
3) DirBuster
Dir Buster is a multi-strung java tool made by OWASP
that is intended to attack directories via brute-force and
documents on internet and server of apps as shown in figure
4. It is accessible at a Kali Dir buster GitLab (proposed)[7].
4
Authorized licensed use limited to: Ministry of Higher Education (HQ). Downloaded on December 22,2023 at 13:02:25 UTC from IEEE Xplore. Restrictions apply.
VI. RESULT AND DISCUSSION
A. LFI (Local -File-Inclusion)
Following are the few ways to stop LFI attacks:
Assigning ID’s– One way is to save the paths of the files
in a database which is secure and then provide an ID for
every one of them, using this method the users only get to
see their ID’s without being able to view the path or alter it.
Whitelisting – Using secured and verified whitelist files
Fig. 5. Checking for the possibility of LFI. is highly recommended and everything else is to be
completely ignored.
Use databases – Files should not be included on the web
server because there is a possibility that it can be
compromised; use of the database is highly recommended.
Instructions for the better use of server– Server should
receive, download, and send headers on their own instead of
carrying out file execution in a specified directory.
Fig. 6. LFI vulnerability confirmed.
B. Dirty cow (dirty copy on write)
Dirty cow (dirty copy on write) Install new patches immediately using the references
We used Metasploit framework for script injection below. If your distribution is not listed, you should consult
through web delivery. Once inside the server we took the your vendor or check if temporary mitigation is available for
help of dirty cow exploit to generate a race condition, thus your distribution in the original advisory by EGI Software
gaining access to the system as shown in figure 7 and 8 [9]. Vulnerability Group.
The System Tap content will automatically apply the fix
while the framework is running, without the need of a reboot.
This is finished by capturing the weak framework call, which
permits the framework to keep functioning to its true form
without being compromised.
VII. CONCLUSION
Pen test is a complete technique for identifying all
vulnerable things inside the framework. It gives advantages
like prediction for monetary loss; consistence for industrial
controllers, customers furthermore, people who invest
money; protecting corporate photo; proactive disposal for
identified chances. Those testers can browse among the three
types that are (black box, white box, and grey box) which
depends on the measurement of datasets that are available to
Fig. 7. Initializing dirty cow exploit. individual testing. These individuals could also browse both
inward &outward test that depends on the targets needed to
be acquired. Penetration testing are of three types:
organization, app, as well as social design. This paper
portrays a 3-step approach including testing plan, endlessly
testing investigation stage. The testing step is done in 3 steps:
gather data, examine the vulnerabilities, as well as exploiting
the vulnerabilities. This step should be feasible physically or
by making use of automated apparatuses. The tester must
pursue a proper configuration for initiating those
experimental results. One of the best significant pieces of the
testing investigation stage is that planning of remedy that
incorporates every fundamental remedial method for the
recognized vulnerabilities. The last record needs to contain
sufficient points and matter for permitting those doing
remedy for recreating and following the assault design as
well as separate discoveries
ABBREVIATIONS
x Pen-testing-penetration testing.
x Apps-application.
5
Authorized licensed use limited to: Ministry of Higher Education (HQ). Downloaded on December 22,2023 at 13:02:25 UTC from IEEE Xplore. Restrictions apply.
REFERENCES [5] Nmap – Free Security Scanner for Network Explorer,
http://nmap.org/
[1] Pen-Testing - What, Why & How [A Complete Guide]
https://www.getastra.com/blog/security-audit/penetration-testing/ [6] Metasploit, http://www.metasploit.com/
[7] “Dir buster_ Brute-force directories”,
[2] “An overview of Pen-Testing”
https://www.kali.org/tools/dirbuster/
https://www.researchgate.net/publication/274174058_An_Overview_
of_Penetration_Testing [8] Local-File Inclusion (LFI) — Web Application Pen-Testing
https://medium.com/@Aptive/local-file-inclusion-lfi-web-
[3] What, Why & How? https://www.getastra.com/blog/security-
application-penetration-testing-cc9dc8dd3601
audit/penetration-testing/
[9] Dirty Cow- https://dirtycow.ninja/
[4] “Penetration Testing” overview-
https://www.researchgate.net/publication/274174058_An_Overview_ [10] Shewmaker_J. (2008). “Introduction to Pen-Testing,” (book)
of_Penetration_Testing.
6
Authorized licensed use limited to: Ministry of Higher Education (HQ). Downloaded on December 22,2023 at 13:02:25 UTC from IEEE Xplore. Restrictions apply.