SecurScan Internal Penetration Test Exposure Resolution Checklist 1st Sample Bank Wed Jul 20 14:19:12 2011 1st Sample Bank 1/17 Exposure Resolution Checklist The purpose of this document is to provide 1st Sample Bank with a printable document that can be used to document responses to the discovered exposures found in this report. Each exposure is listed, along with any applicable host IP addresses associated with the exposure. Areas are provided that enable administrators and IT staff to initial when items are responded to. Also there is a manager signoff for oversight verification. This document can be useful when demonstrating to internal or 3rd party auditors 1st Sample Bank's response to the discovered exposures. 1st Sample Bank 2/17 MS-SQL-S Default SA Account Password Section Severity Level Results (Critical) Microsoft's SQL Server & Open Sourced SQL Servers provide a client/server based network database query structure. When SQL is initially loaded on a Microsoft Windows 2000/NT server, it requires the setup of a SA (System Account). This account often has the rights of the local server administrator. The SA account at least has complete access rights to all data stored in the SQL Vulnerability databases. The default SA credentials have SA as the username with a blank password. This Description password combination is common knowledge throughout the hacking community. Being able to authenticate to the SQL server as the SA account provides many unlimited rights to the local SQL databases, as well as many needed rights to control the OS (Operating System) that drives SQL. Given the common knowledge of the default SA account and the associated rights this receives a critical security threat status. Address Yes No Staff Intials Verification 10.0.0.186 ____________ of Resolved Hosts 10.0.0.206 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 3/17 MS-SQL-S SQLExec Code Exploit Section Severity Level Vulnerability Description Verification of Resolved Hosts Results (Critical) Microsoft's SQL Server provides a client/server based network database query structure. When SQL is initially loaded on a Microsoft Windows 2000/NT server, it requires the setup of a SA (System Account). This account often has the rights of the local server administrator. The SA account at least has complete access rights to all data stored in the SQL databases. A default install of SQL server will create standard default databases, known as samples. These sample databases allow knowledgeable intruders to execute arbitrary code on the SQL server, if SA credentials are obtained. Being able to authenticate to the SQL server as the SA account provides many unlimited rights to the local SQL databases, as well as many needed rights to control the OS (Operating System) that drives SQL. Given the common knowledge of the default SA account, the default SQL databases and the associated rights this receives a critical security threat status. Address Yes No Staff Intials 10.0.0.186 ____________ 10.0.0.206 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 4/17 FTP Anonymous READ/WRITE Access Section Severity Level Vulnerability Description Verification of Resolved Hosts Results (High) FTP (File Transfer Protocol) is a protocol that allows uploading & downloading of data between network devices. Some network print servers use this protocol to submit print jobs by uploading the file that needs printing. Anonymous access to such a service could pose as an opportunity for an intruder to flood the print server with garbage print jobs. This could not only tie up network resources for quite some time, but also waste precious paper resources. Since the FTP service allows anonymous access, an intruder does not need a user account or password to launch such an attack. When anonymous FTP access is present, you may be prone to a Denial of Service attack on the FTP service itself. Most network print-servers function correctly without hosting a FTP service. If this service is hosted on another device besides a printer, such as a networked file server, this could allow the intruder to upload malicious programs such as Trojans, as well as steal information anonymously. This security violation receives a High status. Address Yes No Staff Intials 10.0.0.4 ____________ 10.0.0.64 ____________ 10.0.0.224 ____________ 10.0.0.230 ____________ 10.0.0.231 ____________ 10.0.0.232 ____________ 10.0.0.233 ____________ 10.0.0.234 ____________ 10.0.0.235 ____________ 10.0.0.237 ____________ 10.0.0.238 ____________ 10.0.0.244 ____________ 10.0.0.246 ____________ 10.0.0.247 ____________ 10.0.0.248 ____________ 10.0.0.249 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 5/17 Telnet Anonymous Access Section Severity Level Vulnerability Description Verification of Resolved Hosts Results (High) TELNET is the protocol that allows remote configuration of a network device in a shell or DOS screen. This is not typically a concern, but when it's accessible anonymously it can become a severe security violation. Since it can be accessed anonymously, a potential intruder does not need a valid user account or password to configure the network device in any desirable fashion. This receives a High security violation status. Address Yes No Staff Intials 10.0.0.64 ____________ 10.0.0.224 ____________ 10.0.0.232 ____________ 10.0.0.233 ____________ 10.0.0.234 ____________ 10.0.0.237 ____________ 10.0.0.238 ____________ 10.0.0.239 ____________ 10.0.0.242 ____________ 10.0.0.246 ____________ 10.0.0.247 ____________ 10.0.0.248 ____________ 10.0.0.249 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 6/17 NetBIOS Anonymous Enumeration of Users Section Severity Level Vulnerability Description Verification of Resolved Hosts Results (High) Microsoft Windows 2003/2000/NT and Unix variants running Samba permit Anonymous (NULL) sessions to the NetBIOS (Network Basic Input/Output System) service. The NULL user account was originally intended for backward compatibilty for legacy Windows operating systems as well as one-way trust relationships between domains residing in different forests requiring user and share listings. An attacker can leverage this feature by querying for all available users using a technique called "Sid2User/User2Sid Walking". A SID (Security Identifier) is an alphanumeric character string used during the authentication process to identify an user or group of users. An attcker in possession of an user list for a device or domain can now attempt to brute force the user accounts or launch social engineering attacks. Address Yes No Staff Intials 10.0.0.36 ____________ 10.0.0.95 ____________ 10.0.0.106 ____________ 10.0.0.171 ____________ 10.0.0.174 ____________ 10.0.0.180 ____________ 10.0.0.199 ____________ 10.0.0.206 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 7/17 NetBIOS-DS Anonymous Enumeration of Users Section Severity Level Vulnerability Description Verification of Resolved Hosts Results (High) Microsoft Windows 2003/2000/NT and Unix variants running Samba permit Anonymous (NULL) sessions to the NetBIOS (Network Basic Input/Output System) service. The NULL user account was originally intended for backward compatibilty for legacy Windows operating systems as well as one-way trust relationships between domains residing in different forests requiring user and share listings. An attacker can leverage this feature by querying for all available users using a technique called "Sid2User/User2Sid Walking". A SID (Security Identifier) is an alphanumeric character string used during the authentication process to identify an user or group of users. An attcker in possession of an user list for a device or domain can now attempt to brute force the user accounts or launch social engineering attacks. Address Yes No Staff Intials 10.0.0.36 ____________ 10.0.0.95 ____________ 10.0.0.106 ____________ 10.0.0.171 ____________ 10.0.0.174 ____________ 10.0.0.180 ____________ 10.0.0.199 ____________ 10.0.0.206 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 8/17 Telnet Blank Password Section Severity Level Results (High) Communications devices often offer Telnet services to allow remote clients to configure the device remotely. Sometimes Telnet is protected with a password only pass phrase. With this type of authentication only one network credential is needed to log in, the password. Most forms of authentication use username and password combinations credentials to grant or deny access. Vulnerability When a communications device is using a password only authentication mechanism, the password Description should be formatted to meet a strong password policy, such as referenced in the Password Strength Guide. This vulnerability is triggered when there is a blank password set on the communications device. Since this allows anyone, a valid user or an intruder, to configure the device remotely it receives a high threat status. Address Yes No Staff Intials Verification of Resolved Hosts 10.0.0.4 ____________ 10.0.0.230 ____________ 10.0.0.231 ____________ 10.0.0.235 ____________ 10.0.0.244 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 9/17 Telnet Anonymous Access (TCP 9999) Section Severity Level Vulnerability Description Verification of Resolved Hosts Results (High) TELNET is the protocol that allows remote configuration of a network device in a shell or DOS screen. This is not typically a concern, but when it's accessible anonymously it can become a severe security violation. Since it can be accessed anonymously, a potential intruder does not need a valid user account or password to configure the network device in any desirable fashion. This receives a High security violation status. Address Yes No Staff Intials 10.0.0.51 ____________ 10.0.0.52 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 10/17 SNMP PRIVATE Community String Section Severity Level Results (High) SNMP is a network management protocol used to gather statistical data on network resources. When a networked device has SNMP enabled it can send performance data to a management station. SNMP provides the ability to configure a network device remotely. The community string on an SNMP device can be looked at as the password that allows such access to information and Vulnerability configuration abilities over the network. With the proper community string any management Description station, authorized or unauthorized can view and perhaps configure the network device. The most common or default community string for SNMP devices in the networking industry is "PRIVATE". Usually the private community string allows read and write access. This upgrades the threat to a high level status the configuration or uptime of the device could be compromised. Address Yes No Staff Intials Verification of 10.0.0.97 ____________ Resolved Hosts 10.0.0.99 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 11/17 FTP Anonymous READ Access Section Severity Level Vulnerability Description Verification of Resolved Hosts Results (Medium) FTP (File Transfer Protocol) is a protocol that allows uploading & downloading of data between network devices. When a FTP service allows anonymous access, an intruder does not require a username or password to access the FTP server. This could lead to information stealing from the FTP server without any authentication necessary. Since this FTP Server allows read access only, the intruder is limited to only retrieving information from the FTP server. This information could possibly be confidential information. Since that does not directly lead to system compromise, but could possibly it receives a medium threat status. Address Yes No Staff Intials 10.0.0.4 ____________ 10.0.0.64 ____________ 10.0.0.224 ____________ 10.0.0.230 ____________ 10.0.0.231 ____________ 10.0.0.232 ____________ 10.0.0.233 ____________ 10.0.0.234 ____________ 10.0.0.235 ____________ 10.0.0.237 ____________ 10.0.0.238 ____________ 10.0.0.242 ____________ 10.0.0.244 ____________ 10.0.0.246 ____________ 10.0.0.247 ____________ 10.0.0.248 ____________ 10.0.0.249 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 12/17 SNMP PUBLIC Community String Section Severity Level Results (Medium) SNMP is a network management protocol used to gather statistical data on network resources. When a networked device has SNMP enabled it can send performance data to a management station. SNMP provides the ability to configure a network device remotely. The community string Vulnerability on an SNMP device can be viewed as the password that allows such access to information and Description configuration abilities over the network. With the proper community string any management station, authorized or unauthorized can view and perhaps configure the network device. The most common or default community string for SNMP devices is PUBLIC. Usually the public community string allows read-only access, but in some cases will grant full access to the device. Address Yes No Staff Intials Verification of Resolved Hosts 10.0.0.4 ____________ 10.0.0.51 ____________ 10.0.0.52 ____________ 10.0.0.64 ____________ 10.0.0.75 ____________ 10.0.0.97 ____________ 10.0.0.99 ____________ 10.0.0.216 ____________ 10.0.0.224 ____________ 10.0.0.230 ____________ 10.0.0.231 ____________ 10.0.0.234 ____________ 10.0.0.235 ____________ 10.0.0.244 ____________ 10.0.0.246 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 13/17 NetBIOS Anonymous Enumeration of Shares Section Results Severity Level (Medium) Microsoft Windows 2003/2000/NT and Unix variants running Samba permit Anonymous (NULL) sessions to the NetBIOS (Network Basic Input/Output System) service. The NULL user account Vulnerability was originally intended for backward compatibilty for legacy Windows operating systems as well as one-way trust relationships between domains residing in different forests requiring user and Description share listings. An attacker can leverage this feature by querying for all available shares and potentially access or modify the data within. Address Yes No Staff Intials Verification of Resolved Hosts 10.0.0.4 ____________ 10.0.0.36 ____________ 10.0.0.95 ____________ 10.0.0.106 ____________ 10.0.0.171 ____________ 10.0.0.174 ____________ 10.0.0.180 ____________ 10.0.0.199 ____________ 10.0.0.206 ____________ 10.0.0.230 ____________ 10.0.0.231 ____________ 10.0.0.235 ____________ 10.0.0.244 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 14/17 NetBIOS-DS Anonymous Enumeration of Shares Section Results Severity Level (Medium) Microsoft Windows 2003/2000/NT and Unix variants running Samba permit Anonymous (NULL) sessions to the NetBIOS (Network Basic Input/Output System) service. The NULL user account Vulnerability was originally intended for backward compatibilty for legacy Windows operating systems as well as one-way trust relationships between domains residing in different forests requiring user and Description share listings. An attacker can leverage this feature by querying for all available shares and potentially access or modify the data within. Address Yes No Staff Intials Verification of Resolved Hosts 10.0.0.36 ____________ 10.0.0.95 ____________ 10.0.0.106 ____________ 10.0.0.171 ____________ 10.0.0.174 ____________ 10.0.0.180 ____________ 10.0.0.199 ____________ 10.0.0.206 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 15/17 HTTP Anonymous READ Access Section Results Severity Level (Low) HTTP (Hyper Text Transfer Protocol) is the network language which allows for viewing websites on the Internet and on intranets. Internal websites sometimes are intended to be viewed Vulnerability anonymously, thus letting every user on the network view the contents freely. If this is not the Description intended use of the web site, measures should be taken to secure the HTTP service. Address Yes No Staff Intials Verification of Resolved Hosts 10.0.0.4 ____________ 10.0.0.11 ____________ 10.0.0.41 ____________ 10.0.0.64 ____________ 10.0.0.66 ____________ 10.0.0.71 ____________ 10.0.0.73 ____________ 10.0.0.186 ____________ 10.0.0.201 ____________ 10.0.0.206 ____________ 10.0.0.210 ____________ 10.0.0.230 ____________ 10.0.0.231 ____________ 10.0.0.233 ____________ 10.0.0.235 ____________ 10.0.0.237 ____________ 10.0.0.238 ____________ 10.0.0.239 ____________ 10.0.0.242 ____________ 10.0.0.244 ____________ 10.0.0.247 ____________ 10.0.0.249 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 16/17 HTTP Active on Switch/Router Section Results Severity Level (Low) Switches and routers can host network services known as HTTP services. These services generally provide internal and external websites. Routers/Switches use these services to provide Vulnerability a GUI (Graphical User Interface) for administrators to remotely configure the device. Several Description known vulnerabilities exist in devices running HTTP services that are easy to exploit. It is best practice to disable HTTP services on all network communications devices in an environment. Address Yes No Staff Intials Verification of 10.0.0.80 ____________ Resolved 10.0.0.81 ____________ Hosts 10.0.0.82 ____________ Manager Signature: ____________________________________________ Date: _________________ 1st Sample Bank 17/17
© Copyright 2025