April 19, 2025

11 thoughts on “TECH 581 W Computer Network Operations: Laboratory 7, Team 5

  1. This group’s abstract is lacking. The abstract mostly is a summary of what is involved in this lab. The beginning of the abstract does mention that this lab takes all the other labs and applies them to an attack against a target opponent. This could have been expanded on and less could have been said about what was involved in this lab. The team could have explained more on anti-forensics, since this was the topic of the lab, and tied anti-forensics to the rest of the course. They could have also explained the importance of anti-forensics. The beginning of the literature review would have made a better abstract. The team’s literature reviews do a very good job of tying each article into another of the articles given in this lab. The literature reviews also do a good job of explaining anti-forensics. The literature reviews do not do a good job of tying the articles into this lab though. Some of the articles are very briefly skimmed over while others are discussed in detail. The team does show some errors and omissions to the articles, but they do not discuss the research or methodology of the articles. In the methodology the team starts off by explaining how they hardened a Windows XP SP3 operating system. They explain that they changed the passwords and usernames of the system. They also opened up two ports, 5828 and 3389. The port 5828 was opened to allow an opening for the professor to remotely connect to their system. The other port, port 3389, was opened to throw the opposing team off. They also updated the operating system to the most current patches. The team then explains the way they attempted to penetrate team 1’s computer. They joined forces with team 2 to hide their attacks. They started off by scanning the target system using Nmap and Nessus to discover any vulnerabilities. They state that they did discover a couple of vulnerabilities on the target system. The team did not know though that the target machine they were exploiting was team 4’s Windows XP SP0 machine, which was not a target machine. The group then explained how they analyzed their machine to watch for any attacks on their system. They explain that they did detect multiple scans and multiple attempts to connect to the system, but none of them were successful. Some of the methodology talking about the analysis of the team’s hardened computer could have been discussed in the findings section. In the findings the team starts off by explaining how they used previous lab results to devise a plan to harden their target computer. They explain that thinking like an adversary allowed them to come up with a method of performing packet capturing on a separate computer to monitor team 4’s activities against their system. In the next part of the results the team confesses to finding out that the computer that they had attacked seemed way too easy to penetrate and that later they found out that machine was one that had gained the same address as the actual system they were trying to penetrate. Last in the results the team fined that they were not compromised and that their means of securing their system utilizing the NIST documents a success. They also make the point that securing a system this well lowers the usability of the system and does not allow for more than normal activities. In the issues the team explains that the IP address given to them was taken by another computer because of a problem with the DHCP pool. They did not consider the fact that there was a lot of ARP poisoning going on in the network. In the teams conclusion the team explains that they learned that a good defense is a good offence.

  2. I do not agree with the first sentence, stating that all that we have learned so far is basically how to attack a system. We have done more than that. We also learned how to protect a system from attack as well, indicated by last week’s lab experiment. I believe the purpose of the final lab is to teach people how to properly protect their systems. An attack was the only good way to prove whether a team learned this or not. If an attack was successful, this means that the team did not learn what they should have. In the abstract when talking about the anti-forensics, the team states that after the file is placed, it will be used. They never talk about what it means if the file is NOT placed in the root folder. The abstract was so much an overview of what the team did, but rather an overview of what every team will be doing. One could place this abstract into other team’s lab reports and would not have seemed out of place. Write the abstract and make it your own. It seems like that this literature review was written before the attack was done. Without a file getting placed on your machine, you are not able to perform the anti-forensics part of the lab.
    Once again, team 5 has a literature review that is LESS than the required amount of 100 words. About 110 words less to be exact. The literature review does have a good introduction into the first article. I would like to have seen the team go into more detail about forensics, this would have made their literature review long enough. Whenever the team discusses “Defense against the Dark Arts” I can’t help but think about Harry Potter. Why? I have no idea. In learning how to defend yourself against the “Dark Arts”, are you not learning how to use them as well? What is stopping people from taking this knowledge and using it for ‘evil’? How well did the team study the system they were attacking before the actual attack? Was any research done before the attack began? The methods section should be written so the lab experiment could be replicated. For people that do not know how to perform what team 5 did; a more detailed methods section is needed, as well as screenshots to show success or failure. What was it like to think like the adversary? For team 5 it might have been more difficult than it was for my team. I know how my adversary would think. Sorry for any issues that team 1 may have given you when attacking our machine. Thanks for sharing our IP address with other teams.

  3. Team five continues to have the same issues as team one even with the completion of their final lab in their abstract. That abstract is only one paragraph long. According to the syllabus, any abstract that is less than two paragraphs will be judged as poor scholarship. With the completion if lab seven, and in essence the course, I am then forced to question the scholarship of team five. My math may be wrong, but one is just slightly less than two. I fail to see the problem in providing the required number of paragraphs explaining what the lab will be about. But in that regard team five does do a good job of explaining the purpose and tasks of the lab. The literature review presented by team five is also lacking. Team five does have a very good level of cohesion among the articles presented for review, as they always do. However, the literature review is only 824 words long if you include the introduction paragraph, and 741 words long without that paragraph. The syllabus for course clearly states that each literature review needs to be 1000 to 2000 words long. The size of the literature review presented by team five is lacking. Again, while it does show a high level of cohesion among the articles, I must question the scholarship of the review as not meeting the requirements for a graduate level course. However with the completion of the final lab in the course, I think this once we can let that slide. The methods section presented by team five is also very good in explaining the step they took to complete the lab. I do question some of the methods as possibly actually belonging in the finding section. I also see no discussion of the who and when and the why of their methods. The How and the what of the methods are discussed in detail, but a good academic methods section should include the who, what, where, when why, and how of what is going to be happening in their findings or results section. As such this does not make for a scholarly or academic methods section. I do agree with their methods though as team two was involved in portions of the steps that team five completed. Team two does clearly remember hacking a system using the IP address provided by team one to team five, but team one claims otherwise. Including that information in slightly more detail would have been very good. The methods and the findings presented by team five are much like the methods and findings presented by team two and show that because steps and results are much the same, accurate and reputable processes and procedures were followed. The findings themselves are in line with their methods. The conclusions presented by team five are consistent with the outcome of their lab, and based on them I find that their lab and the work they did in the course were completed in an ethical and professional manner.

  4. In the abstract section, team five gave an overview of what was to be accomplished in this final laboratory exercise of the semester.

    In the literature review section, team five was able to relate the articles to each other. However, some of the summaries seemed to brief and the articles did not always relate back to the course and laboratory assignment.

    In the methodology section, team five stated that they used Windows XP service pack 3 and used NIST documentation and templates to help harden their system. The team enabled Windows Firewall with only two ports allowed through, port 3389 and port 5828. Team five teamed up with team two to attack team one. The teams ran Nessus against the target system and the scan revealed multiple vulnerabilities, of particular interest were MS04-007 and MS04-011. The teams used “windows/shell_bind_tcp” on different ports and were able to get a shell on the target system and place the text file on the C: drive. The groups tried to stop event logging, but this action ended their shell session.

    In the findings section, team five came to the realization that the system that they attacked was far too easy and as it turned out was not the target system after all. Where the Windows Service pack 0 machine with the same IP address as team five’s target came from no one will ever know. Team five had also stated that their machine was never compromised, for the text file that would indicate such an event was not found on their drive.

    In the issue section, team five listed the IP address conflict with team one’s system and the random Windows XP machine that was using the same IP address.

    In the conclusion section, team five stated “Thinking the process over of how we’d proceed with an analysis of our machine if it were compromised gave us ideas for use when we were attacking our target machine. This keeps with a common idea of this entire class, “the defense is the offense,” especially seen in the labs where we research exploits in vulnerability databases, used vendor configuration documentation to find exploits, and used the OSI model for categorizing our exploit tools.” I have to agree for to analyze what is present or absent in the security settings will determine what type of attacks could be conducted.

  5. Team 5’s abstract was well written and really set the stage for what they were going do in lab 7. They explained in detail how lab 7 will work and what is required of all the teams involved. Once again team 5 did a nice job with their introduction and in writing a cohesive literature review in that they tied their lit review back to previous labs. This was good because it shows an understanding that this course has been set up for each lab to build upon the previous lab.
    Team 5 had one of the most detailed methods sections of all the teams. Their findings section was very detailed. I liked how they talked about thinking like the adversary as this is something I need to improve upon as I delve deeper into internet security. I think their conclusion was well written and I agree with their common idea of this class being “the defense is the offense”. Seems like other teams thought this course was designed to teach us penetration testing. Overall this is a good lab, well written and cohesive.

  6. I found team fives write-up for this exercise relatively straight forward both in methodology and results. The literature review, while somewhat brief, did appear to address important points from the articles. In an interesting move, team five compared a current article with one from a previous week: nicely done. I also found team five contemplation of IPSec for use during the exercise interesting.

    Despite the numerous positive aspect of team five’s report, a few deficiencies exist. As far as application of the article to the exercise or the course in general, no more than a trivial reference was made. While I have no problem with the description of this team’s defense plan, I believe in the offensive end this team actually showed that very little ‘planning’ was done. The description of offensive based activities unfolds more as “what happened” rather than “how we proposed to accomplish the goal.” In fact, the offensive plan appeared to: be “do nothing for two days, then hit a target of opportunity with team two.” I realize that this may indeed not be all that was done, however as no mention of reconnaissance or research was made preceding this attack, one is left to wonder. I ask: would it not have made sense to actively scan the target at the very beginning of the exercise, so that this information could be used to prepare an effective attack? Even if the target detected this scan, and reacted by going off line for an hour, the consequences were quite negligible when measured against the valuable information which would be gained.

    Further, I admit to being somewhat unsure what was being said in regards to the “second machine” used for traffic capturing in the results section. Did this mean that such tools as Ettercap were used to intercept the traffic to your own “defended” VM? If so, how would securing this machine insure that “same method to exploit” your machine could not be used by the other team? Couldn’t the opposing offensive team capture traffic in the same manner as you described? Did you mean to imply that you secured your second machine from being “turned against” you in offensive way? I believe this section to be very sparse on details: a more precise wording or more information would have made this section easier to understand.

    Finally, while I see that team five expressed some suspicions with regard to the strange circumstances involving the attack on team one; I feel they likely should have devoted much more discussion to this issue. Evidently, the machine attacked was a VMware based host, as team five did not indicate that this was found to be otherwise. If this is the case, team five failed to ask the crucial question: why would this machine be in use on the network during this exercise? What team would think of putting such a vulnerable machine on the network for any purpose at such a time as this, other than for use as a dedicated target? Furthermore, even if the confusion originated from DHCP problems, this is certainly the fault of team one for not maintaining a reachable address. The original assertion made on Sunday; that insuring correct addressing “is the responsibility of the team who reported the IP address to us” is absolutely correct: you should not have backed down from this statement. From all appearances, team five has been the victim of underhanded dealings: but if they will not stand up for themselves, who else will? Certainly, this incident presents an opportune time to apply a bit of the forensic concepts associated with the laboratory goals.

  7. The team’s abstract is well written. The literature does a good job of tying the various articles together and tries to relate them to the class. I would have liked to see more detailed discussions of each article. Your review really doesn’t say much about them other than the piece by Casey. Also, one of the required readings was skipped completely. Is anti-forensics its own field, or is it a subset of forensics? What was different about what Holland-Minkley did? Are there flaws in Bailey et al that go beyond the dissent of institutions? What was it that Upton et al were really doing?

    The methods section is well written and repeatable. Why leave a port open? I understand it was supposed to be a diversion, but why take the risk? The extra machine capturing traffic was a nice touch. But was it a specified step for security in the NIST document?

    The findings were adequate for the report. Do you feel that a less clean environment would have changed your results? Did you consider that someone may have ARP poisoned the network and redirected your attack to their own attacking machine when you were able to easily exploit team one? Isn’t watching network traffic a form of forensics?

    The conclusion is a bit unclear. It wraps up the class, but not really the experiment. What did you learn here? What would you have done differently?

  8. Team 5 begins their abstract by describing the red teaming exercise that will be conducted during lab 7. Each team will have their own system to defend, and another team’s system to attack. Each team will use anti-forensics to hide their own attack, and forensics to investigate the attack on their own system.

    Team 5 continues the discussion of forensics and anti-forensics in their literature review. They discuss using kernel root kits for anti-forensics and refer to the article by Casey on how root kits can be used to hide an intrusion. He also includes several other ways that an attacker can hide that were included in the Casey article. He also refers to the article by Bailey, Coleman, & Davidson on how programs can be obfuscated during execution by changing so that pattern recognizers cannot detect them. They also discussed the article “Defense Against the Dark Arts”, which describes a course in computer viruses. They mention that the article does not include any objections from the academic community.

    Team 5 again discusses the Casey article and how it discusses advanced methods and tools that can be used to investigate security breaches. Examples of advanced techniques include capturing data from RAM and virtual memory. Team 5 makes a good point that it isn’t enough for an attacker to cover their tracks by deleting a file, but would need to overwrite the space on the disk that the file occupies.

    Team 5 began their methodology section with the three main parts of lab 7. The three parts included set up a target system to be attacked, attempt to attack another team’s system, and finally perform an analysis of their own system to examine the nature of the breach if any had occurred. They described the system that they set up to be attacked as a Windows XP SP3 and secured it using the NIST guidelines for securing it. They used the security template file SSLF to expedite securing the machine.

    Next, Team 5 describes their attack against Team 1’s target system. They state that they were able to find two vulnerabilities which they were able to exploit. After placing the file in the root system they attempted to stop the event logging so that they could delete the event log files. At that time their shell sessions hung and they were unable to reconnect.

    In the final step, their analysis of their target machine showed several port scans and attempts to compromise the system using Metasploit. They did not, however, find the required file in the root directory of their target machine.

    In their findings section, Team 5 discusses the exploit of Team 1’s target system. They determined that they had not, in fact breached the security of Team 1’s target, but had compromised a system that had spoofed the IP address of Team 1’s target. Team 5 also determined that their own target machine had not been compromised because the required file had not been placed into the root directory.

    Team 5 concluded by discussing the amount of knowledge gained in this lab. Although their target system was not breached, they determined a plan for conducting the forensic investigation in the event that it had. They also learned to think like an attacker when hardening their system.

  9. I think that group 5’s write-up for lab 7 was fair. The abstract for this lab was good and provided a good overview of the lab. The literary review was very good, in terms of summarizing the readings. Group 5 chose to write the literature review as one big comprehensive review, which is good; however most of the required questions were not answered. It seemed as if the literary review was nothing more than a summary of the required readings and did not include any speculation about the research methodology or any errors or omissions, though they did they indicate how it relates to the laboratory. All of the citing for the literary review was done well and all of the pages were included. For this lab, the group answered all of the required questions and provided a good amount of detail about the steps they performed to attack the target systems. The team accurately covered the methods and findings of the lab. However, the team should have done the forensic analysis of their system, being as the point of the lab is anti-forensics not attacking. Overall, most of the required questions were answered and answered well. Finally, the conclusion was adequate and summarizes what was covered.

  10. This team also did Windows XP SP3 as there machine to harden for attacks from another group. Like team four, they used a document from NIST to secure there machine. The team also changed the password to the administrator account to 12-character password with a mixture of upper and lower case letters, numbers and symbols which adds complexity to the password and is more difficult for password guesses. The team also renamed the and give it more of a general user name to mask the administrative privileges. Windows firewall, which seems to be a constant with Windows XP teams, was enabled and configured for only two ports. Finally the team ran Windows update to ensure that the machine is fully patched.
    The team used a popular tool among the teams, Nmap. They discovered two vulnerabilities that the team found interesting. They used the windows/shell_bind_tcp payload which allowed them to successfully established a shell session and placed files on the root of the machine there were exploiting. However when the team attempted to stop the logging service to delete the event that took place, there shell connection was not responsive. This team seem to have had a partial success.

  11. @mvanbode @nbakker – I have a hard time believing your criticism of “poor scholarship” of the lit review and/or abstract when you’re reduced to counting words and paragraphs.

    @gdekkerj – The second machine was simply another VM we brought up with the ability to log network traffic using Wireshark. The purpose for this machine was to capture all network traffic related to our target machine for use in the event it was compromised so it wasn’t as much for defensive purposes as for forensics. While we were suspicious of the ease with which we compromised the machine, we weren’t certain what to make of it. We thought maybe they had made it intentionally easy to compromise to make it more like a honeypot.

    @mborton – The port was left open to facilitate easy access to the instructor if needed. We knew that few vulnerabilities exist in terminal services that could lead to remote execution of arbitrary code and our accounts were secured enough against brute-force or password guessing. The capture machine wasn’t specified by NIST, we interpreted the requrement of securing by the NIST (or vendor) guide only to apply to the target machine, not the entire system. ARP poisoning was considered but we thought it was likely just a misconfiguration. One thing I still question is why was (what we now know was team 4’s xp sp0 machine) the system still on?

    @prennick – a review of your peer review…of sorts. I was hoping to see more from you on our asserted (yet incorrect) compromise of your team’s machine. How was the networking configured on your team’s target machine? Did your team notice any unusual network traffic that would have indicated ARP poisoning?

    Thanks all!

Comments are closed.