April 23, 2025

9 thoughts on “TECH 581 W Computer Network Operations: Laboratory 6, Team 3

  1. This group starts off with an abstract that lays out the purpose of this lab and give a quick brief explanation of the steps involved in this lab. The group’s abstract seemed to be redundant in that it explains twice how each of the systems is going to be tested. The importance of this lab and how it relates to the other labs is given in an introduction to the lab. In this introduction the group explains that this lab is relying on past labs that explain how passive and active reconnaissance works. The group give an excellent job in explaining how use of queries to gain information is not looked at as an attack unless a great amount of queries are done in succession. The group then uses this concept to argue that if a set of queries are done not in succession, but spread out, that this can constitute as a passive scan of a system. The group then explains that they will use this idea to do passive reconnaissance on three systems to gain information which they will use to exploit each of the systems. The group will be using the Windows XP SP0 as the first test, Windows Server 2003 SP 2 for the second test, and Windows XP SP3 for the third test. The group then gives a good introduction to the literature reviews for this lab. They tie this lab to the last lab and gives an overall description of the articles presented in this lab. Then the group goes into an explanation of each of the articles. The explanations are given in a way that shows how each article could be used in securing a network. The explanations do give a summary of the article, but they do not tie each article to the others. Also they do not relate the articles to the current lab directly. Again each of the explanations of the articles do not cover the method used in the article or research in the article, or even explain that they did not cover ether one. The group’s methodology section started off with a very good explanation of how they split the lab up into two parts and how they set up the first part of the lab. They are thorough in explaining the systems that they are going to use and any information that will be used in the tests. They also do a great job in explaining the scope of their penetration tests. They explain what tests will be conducted and which ones will not. The group gave a very detailed explanation of how the tests were to be carried out. They gave rules that the group would follow in doing the test to keep the test as real as possible, like obtaining the IP addresses even though they already knew them. Some results were given in the methodology, but it was only enough to explain other actions that were needed to be done in completing the tests. The group gave the specific commands and parameters used in each step of gathering information in determining the operating system and IP addresses of each of the machines. They then explain how they compromised the Windows XP SP0 machine with little effort using a Metasploit exploit. The group next goes into a very thorough explanation of how they tried to penetrate the Windows Server 2003 system. The group did very good in keeping track of what exploits were tried, but I did not see any actual plan, but a line of attempts at trying to penetrate the system using anything they could as long as it remained in the scope of the rules discussed earlier. The group explained that even though they did a full on assault against the Windows XP SP3 system they could not find any exploitable vulnerabilities. Given this the group gave up on the third system and concluded the methodology. Even though there was not as much research put into the exploiting of the third system, the group concluded that Windows XP SP3 vulnerabilities were identical to Windows 2003; the group did not need to continue. The group gives a very good explanation of why they failed in penetrating two of the three systems. The group explains that the systems were too clean and did not include any user interaction with the computers and no normal usage was done on these computers was done ether. This lack of real world usage tends to lead to the lack of any service from which to exploit the system. The group goes on explaining different means that can introduce vulnerabilities into the systems like flaws in applications, restrictions from policies, and restrictions from firewalls which cause users to bypass security to increase usability. The group gives an excellent explanation of why there is a bias toward the application lay of the OSI model when it comes to vulnerabilities and exploits. The group also gives a very good explanation of why automated active reconnaissance tools like Nessus or Nmap will not provide any more information than doing a passive reconnaissance on a system. They explain that Nessus could be made to detect all the current vulnerabilities if the Nessus team had a vast amount of vigilance and effort to keep the tool up-to-date on the most current vulnerabilities and to make the tool less biased. Next the group explains very nicely how attacks at different parts of the OSI layer model can affect ether lower or upper layers. They also explain that through encryption at lower layers the confidentiality of the information will still be intact, even after a denial of service attack. The only issue the group had with this lab was with confusion between network cards in the virtual environment. They even gave a solution that they used while doing this lab. The conclusion for this group just gave an overview of what was accomplished in this lab. The only thing that could have been improved on in this conclusion would be an explanation of what the group has learned overall in doing this lab.

  2. Team three as usual presents a lab report that is complete and mostly within the bounds of the syllabus. Team three has always presented an abstract that does explain an overview of the lab and the steps of the process. With that in mind team three has still never written an abstract that falls within the bounds of the syllabus. The abstract is not the required length of two paragraphs. According to the syllabus an abstract of anything less of two paragraphs will be judged as poor scholarship. The introduction that team three presents is a very good introduction to the lab exercise and does a very good job of putting the reader in the mindset of the literature review and process of the lab. The literature review that team three presents explains the articles that were required reading for lab six. While they do not contain headings that break up the articles reviewed, they still do not show the level of cohesion required. Like team one they break the articles down in terms of category of tools and how they can be used to break into a target system. This amounts to a list of analyzed articles explaining tools rather then a review of the state of the literature on the overall topic. Team three also do not relate any of the articles reviewed to the steps of the lab, this was also one of the requirements of syllabus. Team three’s literature does not encompass an academic or scholarly review of the state of the literature on the topic. Hopefully team four will show a level of cohesion in the literature review for lab seven that is respectable for high-level graduate student. The methods section provided by team three is rather complete and does a very good job of explaining the how and what of the process they will be performing. I do like how team three included a fourth machine in their penetration testing exercise for comparison. I did the same for the team two lab, as this shows a level of dedication to the outcome of the lab. However team three does not explain the when and why of the methods. They fail to explain when they expect to receive results on their tests, as well as why they are looking for the results they are attempting to achieve. Like team one they include some information in their methods section that would better fit in their results section. The methods section is meant to explain their process, the results section is meant to explain the outcome of their methods. Like the other teams, team three was unable to explain any machine other then the windows XP SP0 machine. This adds to credence and believability of their results. I agree with their point that a NESSUS scan is generally no more informative than a passive network scan and some research. This also makes for a much more “secure” attacker, as they don’t need to give away any information to gain target information. I did fail to find any discussion in the number of exploits attempted until success or failure. Their discussion on OSI layers is also a point I agree upon; exploiting a lower layer implicitly exploits the upper layers. In their issues section they list multiple nics on the VMs as a confusing issue. This should never be a problem for technologists. They did fail to mention the inability to attack two of their three systems successfully; this seems to be an oversight, as any issues should be recorded. I agree with team three’s conclusions.

  3. The introductory paragraph is a good synthesis of all of the previous lab activities and ties them in to this week’s lab. The literature review lacks cohesion and synthesis between the assigned readings and the lab activities. In spite of this, each of the papers is dealt with insightfully and the group gives their opinion on whether or not they agree with the some of the opinions stated in the readings. It seemed because of the higher number of assigned readings, each paper wasn’t handled in a lot of detail. Because of this, some of the paper’s write ups are very brief and the group doesn’t have the chance to tie them all together.

    The methodologies are very detailed and cover a wide range of possible exploit scenarios. I like how the group identified which areas of the system they intended to test as well as methods they didn’t consider utilizing because of biases using the team members in setting up the environment. The identification of the XP SP0 host by NetBIOS name should have been discussed a little more. There’s bias from knowing the details of the machines already but the default NetBIOS name was “XPSP0VM.” This wouldn’t likely be encountered in a real world scenario. The compromise of the XP SP0 machine lacked detail surrounding what payload was used and what was done once the host was compromised. The analysis of the failed attempt on the server 2003 virtual machine was a good application of previous labs. Even though the exploit didn’t work, it showed that there was a good level of depth put into the vulnerability assessment.

    The findings section contains a good assessment of the issues with the test environment, primarily, the lack of users and therefore applications. Quite a few of the vulnerability exploits contained within Metasploit target programs installed on the operating systems. The assessment of the Windows firewall however isn’t necessarily true in my experience. The user unblocking applications in the windows firewall is only allowing those programs outbound. The only time ports are opened inbound is when the user adds exceptions to the firewall. As for the conclusion that nothing Nessus found wasn’t already known, the one benefit of Nessus is the ability to run the scans remotely. If you’re targeting a remote system, monitoring its network traffic is going to be pretty much impossible. If you’re on a LAN this is a completely different scenario but distance from the target is an advantage to the attacker. Using the distance factor makes attribution often impossible.

  4. Had the team broken up their abstract paragraph they would meet the required length of the abstract. Break up your ideas into separate paragraphs; use some of your introduction in the abstract to get the required length. Like always, the team has a great introduction. Why are they the only team that does this? Is it because it is not required and this team does more work? It looked like the team tried to make a cohesive literature review, but it still looked like a list. One article was talked about cited, and then the next one. Combine the articles. If they have similar focal points, compare them to each other as well as contrast them. Most of the required topics that are required in the literature review were not answered. The team talks about how the articles relate to the lab experiment, but that is about all of the requirements. It did not seem like the team needed to cite much in their literature review. Should I assume that the sentence before the citation is what is from the article?
    It was awfully nice that the team gave everyone their IP addresses. We will be needing those for the next lab experiment, when the teams attack each other. This team seemed to do the most work, or at least write the most in their methods section. Just like other teams, this team was unable to compromise any machine other than their Windows XP SP 0 host. Failure is an option. There is no need for disappointment, be happy that you tested your system and could not compromise it. This might look better for lab experiment number 7 when other people are trying to compromise your system. The main issue that this team found was that the systems were not “real” enough. Get some user activity and try again. Make sure that we will not be able to compromise your system. This team is one of the few teams that finds issues and also finds ways around them. Good job on including that in the problems and issues. The conclusion seems on the long side. Cut it down some for the next lab report. I liked that this team included pictures from the lab experiment. That is a good way for them to prove that they actually performed the lab and did not just make it up. Once again the tags were not included

  5. Team 3’s abstract is well written and gives a good overview of what they will be attempting in lab 6. As always team 3’s introduction is good, and is a summary of all of the previous lab activities and how they tie into lab 6. The literature review is not as cohesive as perhaps it should be however, each article is summarized in detail and the group compares and contrast the articles and gives their opinions on the information presented stated in the articles.
    Team 3’s methods section is very detailed. I like the approach team 3 took in dividing the lab into two separate testing domains. This helped to identify the areas they intended to test as well as methods they didn’t intend to use. I also like the fact that they eliminated the use of account cracking during the penetration tests, because as a team they couldn’t determine a way to simulate a realistic environment with hypothetical user accounts. Any methods they used involved biases inherent to members of the team choosing the account parameters, even if blind methods were to be employed.
    Their results and discussion section describes the issues with the test environment, primarily the fact that it lacks users and usage, so in their opinion it was really is not a good model of a real network system. Many of the vulnerability exploits contained within Metasploit target programs installed on the operating systems.
    There conclusions section was quite detailed and their screen shots, charts, and tables were well done.

  6. Team three starts with their abstract and explains what is going to happen within the lab. They also explain that their will be literature related to the lab and results of the experiments and thoughts on them. They then go onto their introduction section and discuss the previous labs and the concepts that are address in each. They then discuss a previous conversations related to the presence of any real risk to an attacker. Then the team goes into what are passive attacks, and their point of view on when a passive attack will become an aggressive attack. The idea of passive and aggressive attacks where well aid out within the section. After this section the team goes into the literature review and start with an overview of this week articles. They did a cohesive literature review that went over the various point of the literature and compared them with each other. They also included the way the articles relate to this weeks lab exercises. Next the group goes into the methodology section. Within the section they describe what is occurring during the hands on section of the lab. There were parts of the methodologies section that could have gone into the results section. Next the team discusses their results and findings. When going over this section they did a good job explaining some of the reasons while their attacks where not as successful as they hoped. There findings where more of an overview of what occurred during the section. It did not break down the results for each system well. It made me want to know how long the attacks against the exploits took how many attempts where there. When one tool failed was there another tool that might pick up the slack where the other failed. The team then discussed their issues, which they had little problems. They concluded their lab by giving an overview of each systems main exploit they chose. They also included why in their lab the aggressive attack did not work as well as expected. An unexpected addition of a table was a nice layout of the exploits they did attack, what the patch is for the exploit, and what the usage of that exploit is. Over all the team did a good job, and provided a good amount of detail. Where the team could improve was with the use of tools and could they be used in another way.

  7. In the abstract section of the laboratory report, team three gave a brief overview of what was to be accomplished in the lab six assignment.

    In the introduction section, group three reiterated their definition of passive reconnaissance in that it contained three concepts of uncertainty, invariant risk, and limitation of scope, for passive reconnaissance was used to determine what operating systems were being used by the targeted virtual machines. The group also went into explanation about the attacker’s behavior while attacking a system, for if his/her behavior differs from that of a legitimate user, he/she will be more likely be detected.

    In the literature review section of the laboratory report, team three had an issue with the firewall penetration testing article when they stated “One issue that I had with his article is that it states that a demilitarized zone is necessary to operate a web server through a firewall. Many routers now have the ability to forward a single port through a firewall to a web server or other service, eliminating the need to have a demilitarized zone.” When the group discussed the password article, I had to disagree with the statement “Password recovery tools such as John the Ripper will continually guess the password until successful.” for these cracking tools are only as good as the password lists that are used by these tools. If the password is not in the password list, then the tool would not break the password. In general, it seemed that team three needed to correlate the articles to the laboratory assignment.

    In the methodology section of the laboratory report, team three used the ‘lanmap’ tool which was run on the nUbuntu machine until and used the ‘nbtstat’ tool built into the Windows XP tool host in conjunction with ‘Nete’ to do passive reconnaissance on the targeted virtual machines to determine what operating systems were being used. Team three listed what machines were to be targeted when they stated “Windows XP SP 0 (192.168.3.3) as a target, Windows Server 2003 SP 2 (192.168.3.4) as a target also, Windows XP SP 3 (192.168.3.100) as a tool host, and nUbuntu (192.168.3.101) as an observer.” However, I was not sure what system they were going to delegate as their third target. Team three was able to exploit Windows XP service pack 0 with the metasploit tool set, just as many of the other teams have done as well. The group also seemed to have trouble exploiting Windows Server 2003.Team three like most of the other groups were not able to exploit Windows XP Service Pack 3.

    In the results section, team three concluded that their group like most of the teams had a very low success rate for exploiting the operating systems with the exception of Windows XP Service pack 0. Team three attributed the low success rate to the way that the test environment was configured. Team three stated “Foremost, the environment is too clean. It lacks users and usage, so it really is not a good model of a real network system. There are no services running, no traffic moving in and out. There is a complete lack of intermittent devices that could be used as preliminary targets with the ultimate goal of compromising the system.” I have to agree with their observation, for in actuality the machines are sitting there doing nothing.

    In the issues section, team three described an interface problem when they stated that they found having two network interfaces running for a virtual machine created dual connections between hosts on different subnets.

    In the conclusion section, team three restated their results of the laboratory assignment and concluded “that the use of active tools does not contribute substantially to the effectiveness of penetration testing if careful research and information gathering is done in preparation.”

  8. I think that group 3’s write-up for lab 6 was good. The abstract and introduction for this lab was very good. The literary review was somewhat very good. Group answered all of the required questions for the literature review. All of the citing for the literary review was present, but not proper throughout the lab. The literature review was cited properly throughout. The author and year of the reference was included and all of the page numbers were present. For this lab, the group answered all of the desired questions. The group used many interesting methods for finding the OS of the target machine. Some of the attempts to discover the OS were not passive though. Many scans were port scans, rather than analyzing local traffic. However, information about exploits used was done well and was very detailed. Finally, the conclusion to this laboratory was also well done because it accurately sums up their procedures and findings.

  9. This teams starts off with a well written abstract and introduction. They indicated what is going to happen and illiterate more on the lab portion. This team, like teams 2 and team 4 choose Winodws XP Sp0, Sp3, and Sever 2003. This team like others used a combination of tools to identify the specific operating system. They used lanmap and nbtstat to retrieve NetBIOS name and IP. Team 1 said that relining on NetBIOS name to identity the host is not a grantee. A windows server system could be named XP-home. Like other teams that scan against a Windows Server 2003 system found it difficult to footprint the operating system. The team uses the tool lanmap is which is different from any other team’s tool for footprinting. This was ran until a “reasonable” network map was generated. What is considered reasonable and why is the tool network mapping? Like other groups, the team was able to easily penetrate the Windows XP Sp0 machine. They did indicate that the environment was “too clean” which is true. This is often not the case for production equipment. Users log in, web browse, modify settings, etc., which with that kind of activity is often an available exploit. Even with the aid of Metasploit, the team was unable to exploit Windows Server 2003 since the patches were up to date. If the patches were not current, the Metasploit exploit discovered by this team would have exploited the system.

Comments are closed.