April 28, 2025

9 thoughts on “TECH 581 W Computer Network Operations: Laboratory 7, Team 1

  1. This group’s abstract was very well written. The abstract starts off by explaining the concept of what anti-forensics is and even gives some references to articles on anti-forensics. The abstract also gives some examples of what is involved in performing anti-forensics. The last part of the abstract explains briefly what will be done in this lab by quickly explaining the tasks involved in this lab. The literature review starts off nicely. The literature review starts off by tying all the articles in this lab into this whole course. The beginning explains that the articles given in this lab are a summary of all the labs we have been through so far. They explain that each article points out the most important points in this course. In the rest of the literature review the group does a great job in transitioning from one article to another by giving situations and explanations of what will be talked about in the next article. The group tries to tie each article into some of the others and into this course. The group gives a good explanation of what each article is about and highlights the important parts of each article. The only things that are missing in these reviews is any explanation of the methodology and research of the article, errors or omissions, and what question the article is trying to answer if there is one. Next the group goes through their methodology of how they set up a target computer, how they planned to gain reconnaissance on the target computer assigned to them, and how they attacked the target computer assigned to them. I noticed two big problems with this teams target computer they set up for this lab. The first problem I saw with group one’s lab was that they used Debian Linux for their target computer. The rules that the professor gave us specifically stated “The systems being attacked must be Windows XP, Windows Vista, Ubuntu, or Fedora Core 8 or higher.” Debian was not listed in the approved operating systems. I do not know if the team got permission to use this operating system, but they should have used something else instead of Debian Linux. The second problem with the way this team set up their target computer was that the team did not use ether a NIST document or a vendor document to secure their target computer. The rule for the lab was to use only NIST documents or vendor documents to secure the systems. The team only used a third party firewall to secure the operating system. The team did set up SSH2 to allow for remote desktop connections, but nothing else was done. The group goes on by setting up a plan of attack and explaining that the object of this lab is to hide all the attempts to penetrate the target computer. The group stated that the ideal way to get information without being detected is through passive reconnaissance. They state that passive means of gathering information will not be useful in this scenario because there is no traffic from the target computer. Since the group could not use passive means of gathering information, the group turns to active reconnaissance. The group only tries one Nmap command to attempt to gather information on the target computer. This command fails to report any information so the team gives up. This team should have tried several other methods to try and gain information from the target machine. Next the group talks about what they found during and after the attacks. The only methods of monitoring the attacks against their system was through monitoring the log files on their firewall and watching the /root folder for the exploit file from Team 5. They noted that team 5 had stated that they had penetrated them, but team 5 claimed that the system they exploited was a Windows XP SP0 system. The group states that this could have been from the amount of attacks happening on the network at that time and the amount of ARP poisoning that was being done on the network. The group claims that they were unsuccessful in penetrating team 2’s computer. They say that the target computer they were trying to penetrate also had a firewall up that filtered all the ports and dropped any requests sent to it. The group states that there normally would be a way of detecting the operating system without having to actively requesting the information from the computer. This other method would be through passive scans of the traffic from the target computer, but because there was no traffic coming from the target computer, this was not an option. The group then states that in this lab because there was no need for usability for the target computers, so the target computers were secured very tightly. They also talk about how they were not concerned about opening up SSH for remote connections, because the systems were on a virtual environment and were not used. The group goes on explaining some other methods that could be used to penetrate the target computer. These other methods could not be used because they require the user of the system to be lured into situations that could bypass firewalls and other security measures. Due to the nature of this lab these methods would not be likely. The last part of this group’s results does a great explanation of how this lab shows that usability of a system directly affects the likeliness of an exploit. The only issue the group had was that another computer was using the same address as their system. The group then does a nice job in concluding this lab. They show that the purpose of this lab was not to exploit a system, but to show that if a system is properly secured then it will be protected from most exploits.

  2. Team one begins their report for lab seven, as they have in the past, with the abstract that explains what they will be doing in lab seven. The abstract does do a good job of explaining what will be covered, but is otherwise lacking. Based on the syllabus, any abstract that is less than two paragraphs will be judged as poor scholarship on the part of the lab team. This abstract is clearly not two paragraphs. While the abstract is one long paragraph that does not make up for the lack, and it does in fact make the abstract harder to read. Team one then moves into their literature review based on the articles and papers provided to help gain a better understanding of the lab topics. The literature review does not create any cohesion among the articles presented, and is nothing more than a listing of the chosen readings with APA style citations. Team one doesn’t even make an attempt to break up their article listing with heading that explains the title of the article they are reviewing. Because there is no apparent cohesion among the articles reviewed the literature review does not present a good overview of the state of the literature. The level of scholarship in this review is very poor, and has not seemed to have improved much since day one of the course. This does not make for a very academic literature review by any means, and I’m sorry that team one was not able to overcome that flaw in their lab reports. The methods section by team on is also lacking right from the beginning. They fail to ever mention what vendor or standards organization based document they chose to secure their system with. They mention that debian was chosen due to the and I quote “renowned security associated with Linux operating systems.” This statement serves no other purpose then to possibly exclaim how well team one can use Linux. I find this statement both offensive and inaccurate. Linux actually has a track record no better, and possibly even worse than that of Windows. Because new bugs are reported for open source based software almost daily, one was released for BIND 9 today even (7/29/2009), I question the inclusion of that statement at all. The section explaining the iptables firewall rules proves that Linux is even less usable then windows systems, which would contradict team ones discussion on usability versus security. The system secured by team two was actually quite useable after the lock down, and network services were available, assuming the correct type of NMAP scan would have been run. I also find the section on spoofing the source address in NMAP invalid. Because of it, I question team one’s ability to actually manage an IP network. If the source address of NMAP scan is set to the address of the target host, how will you know what ports are actually open? The target will only communicate with itself. The conclusions provided by team one are weak. “If everyone followed the recommended guidelines, there would be more secure systems, which makes everyone safer in the long run. “ I’m glad team one understands this fairly trivial and elementary concept.

  3. In the abstract of the laboratory report, team one gave a description of what anti-forensics is and how it relates to the laboratory assignment. Team one also emphasized that lab seven is a compilation of all of the previous labs.

    In the literature review section, team one gave summaries of each of the articles but did not always relate each of the articles to the lab assignment or relate the articles to each other.

    In the methodology section, team one explained why they chose Debian Linux as their system to harden. The group added iptables firewall to their Linux flavor to enhance its security. Group one took the SSH2 route for allowing remote access. Group one used an IP address of 205.215.116.50, which was given to team five. After configuring their Debian Linux virtual machine, team one turned its attention to team two’s virtual machine, which had an IP address of 205.215.116.52. Team one used nmap during the reconnaissance phase of the attack. The team set nmap for sneaky and scanned ports 1024 and below. Nmap was unable to determine what operating system team two was using because all of the ports appeared to be filtered.

    In the findings section, team one described how team five had claimed that they had successfully exploited their system, but they could not find the file proclaiming a successful exploit in their root directory. Team five had also claimed that the system was running Windows XP, which clearly was not the case since the group was running Debian Linux. Team one tried to explain the phenomenon by identifying different occurrences on the network that could have resulted in team five’s claim. Team one went back to describing why the teams were unsuccessful in their attempts to exploit the target systems.

    In the issues section, team one listed only one problem, someone else used the same IP address as their system, so team five attacked the wrong system.

    In the conclusion, team one stated “The team does not believe that the purpose of the lab was to truly be able to exploit another machine, but more the ability to learn how to protect our own systems. “However, I must disagree for all of the previous labs had conditioned the class for seeking out vulnerabilities in target systems and exploiting them with an arsenal of tools that were discovered throughout the different labs throughout the semester. The team stated “This lab showed that by following simple guidelines a system can be secure from a good amount of exploits.’ However, team one never described what guidelines they used in hardening their Debian Linux virtual machine. Team one also stated “The reason why so many systems are easily exploited is because not everyone secures their system properly. “ However, judging by the exploits discovered in the previous labs, it is not how the system is configured but how the system is used by the users and what applications are being run by the system.

  4. The abstract is a bit confusing, it appears that the lit review is started in between the information that does belong in the abstract. The literature review from group one is probably their best to date. Still each paper is treated in its own paragraph with little cohesion between the sources and little mention of the literature’s ties to the lab activities. The review starts out with identifying a common thread throughout the literature provided and tying the literature back to previous labs. The first paper mentioned was E. Casey’s “Investigating Sophisticated Security Breaches.” While the previous paragraph identified a common theme of prevention and investigation of security breaches, this section was more of a summary of the paper than a discussion on how the content relates to the theme of the lab. The second paper mentioned regarding mobile blackbox testing also suffered from the same lack of application to the lab activities. The third paper, “Defense Against the Dark Arts,” begins with an odd, general statement that “…security is of interest to everyone.” This makes this section seem as if it’s the beginning of another literature review or possibly written by another author and just pasted in to the larger lit review. Either way, the section makes mention of the course as a whole but gets the course number and course title wrong.

    The methodology for team one makes no mention of the NIST or vendor guidelines used to secure the system. Instead the team makes sweeping statements regarding the “renowned security associated with Linux operating systems.” The team mentions good principles of approaching the attack from an anti-forensic principle prior to any actual work being done. My biggest issue with the methodologies was the method with which the target system was scanned. The group used nmap and set the “-S” flag on the scan to set a source IP of the scan packets. If the source IP of the packets is changed, how do you expect to get any back? This error makes any scanning results suspect and invalidates the assessment that the target machine had no ports open. I found a good example of IP obfuscation with nmap using decoys at http://www.hackinthebox.org/modules.php?op=modload&name=News&file=article&sid=10640&mode=thread&order=0&thold=0.

    The findings indicated the issues that my team, team five, had with exploiting the wrong machine. I’m not sure I agree with the reasoning of another machine pulling the same IP address from DHCP unless this host pulled the .50 address and then was set to that IP manually, DHCP wouldn’t allow this. The conclusion that the attack against team two was unsuccessful because of the security measures they employed is invalid due to the reasons I mentioned above regarding the methodologies. I also take issue with the assessment that there was “no usability out of the machines.” If usability isn’t a concern, we may as well just unplug the machines.

  5. There are a number of positive points with regard to team one’s lab write up. The literature review is nicely done, with reference to application of the information in the articles within the scope of the course. The use of a Linux based machine set this group out from the rest of the teams, and shows a degree of innovation. The considerations with respect to remote login and SSH version two show that some research was done with regard to security issues.

    However, fundamental problems exist with this team’s write-up, mostly with regard to methodology. Foremost, no security document used in “hardening” the team’s defenses was ever mentioned. While this may indicate that the team felt no additional measures were required to harden the base Linux machine used, it also might simply betray a lack of research. This probably should have been an issue specifically discussed in the report. Furthermore, the ‘Debian’ variant of the Linux distribution used by the team is not specifically mentioned in the lab instructions as being allowed in the exercise. While it is true that an ‘Ubuntu’ variant is allowed, and that ‘Ubuntu’ is based on the ‘Debian’ distribution, this seems to technically violate the exercise rules, and also should have been discussed and defended in the team’s report.

    Furthermore, the execution of the attack against this teams designated target appeared to be less than enthusiastically pursued. How is it that this team never checked for open ports above 1024 in their scans? This appears more as a lack of effort rather than an attempt at stealth. Additionally, if no login in means was detected by this team on the opponent’s machine, why wasn’t this issue pursued further, either by ‘rules violation’ complaints or a greater degree of target probing? This lack of thoroughness appears to indicate that this team put very little effort into actually exploiting their opponent. It should be apparent that the ‘stealth’ aspect of the exercise is more directly applicable to the events ‘after’ an actual intrusion has occurred on the target machine: after all, the team being attacked already knows that a threat exists on the network. If this team, as mentioned, was using spoofed addresses to perform scans, why would they hold back from more intensive interrogation of ports? The defending team would be hard pressed to prove that they were being attacked by a specific opponent, with the worst consequence being an hour lost in offensive activities, after which two hours of target exposure would be guaranteed. It is apparent that team one gave very little thought to an offensive strategy this exercise.

    Finally, the circumstances of team one’s machine being replaced by another during the scope of the exercise is ‘highly’ suspicious. My team, aware that IP addresses were being assigned by DHCP, periodically checked to insure that our machine was indeed accessible to our opponents at the advertised IP address. That team one did not notice this change, or mis-configured their machine could indicate incompetence: although I do not think the members of team one incompetent. I suspect team one may know a bit more about the incident than what they revealed. What is the probability of team one’s machine being replaced by a machine running Windows XP with no service packs installed? What fortunate set of circumstances led to this machine assuming team one’s IP address in the middle of an obvious attack? No, it seems much more likely that all the traffic to team one’s machine was being intentionally diverted to this honey pot. Third parties could have been involved in this misdirection, but the question is: who? Teams five and two seem out of the question, and I can vouch for the active members of team three that we did not aid team one. Team four may have collaborated with team one in this regard; however, this seems unlikely, but if true would hint at active participation by team one. I believe at the very least, team one should show a bit more curiosity as to how this occurred, if they were not directly involved. To wave one’s hands and blame it on mysterious “ARP poisoning,” and then to assert that “…it ultimately did not affect the final outcome of the lab” borders on outrageous.

  6. Team 1 began their abstract with a discussion about anti forensics and the attackers attempt to erase or disguise the traces of their intrusion and to make an investigators work difficult. They then go onto discuss what is going to occur within the lab. Next they provide the literature review and an overall theme for not only lab seven but they tie in all the labs. The team and a nice review that discussed the subjects of the literature this week rather then telling the readers of the lab what happened in each paper. This allows for further though and was a good change for the last lab. The team then goes into the methodology section. Within the section they provided what was done to harden their system. Then they stated what the plan of attack against team 2 was. In the findings section they provided all the results from their attempts against the targeted system. Within this section they also state that they where unsuccessful in penetrating the system. Knowing this does it still mean that a windows system is unsecure. Or is it just what is done with an operating system that makes it unsecure? The team then goes onto discuss their issues and conclude that lab. The conclusion was a week part of the lab and could have had a little more provided, but overall the team did a good job.

  7. Team 1 begins with an abstract introducing the concepts of Lab 7. They state that it is a compiliation of all of the previous labs. And, that lab 7 gives them the opportunity to use the tools that they’ve learned to both attack an adversaries system and defend their own.

    In Team 1’s literature review they relate the articles assigned to this lab by stating that they all pertain to protecting a system from exploit and conducting a forensic analysis of exploits that have occurred. They also state that two of the articles are applicable to the overall concept of this course. The first article they reviewed is “Investigating Sophisticated Security Breaches” (Casey, 2006). They give a description of the article that gives us insight into intrusion detection. They relate it to the various labs they have done up until this point. They include the article “A Protocol Preventing Blackbox Tests of Mobile Agents” (Jansen & Karygiannis, 1998). They describe the article as presenting a protocol for preventing testing attacks against blackbox protected mobile agents. They provide a good description of the article but don’t include an assessment of how it relates to our current lab assignment. The next article that they review is “Defense Against the Dark Arts” (Bailey, Clark, & Coleman, 2008). The article describes a method for teaching computer security. They relate the article to this course by stating that it teaches how to detect and defend against attacks. Similarly, “Cyberattacks: A Lab-Based Introduction to Computer Security” (Holland-Minkley, 2006) describes a class that teaches students how to defend against exploits.

    In the methodology section, Team 1 describes the system that they designed to be attacked and the methods that they used attack their target computer. Team 1 begins their methodology section by describing the system that they chose for the Lab 7 read teaming exercise, Debian Linux. They secured their system with the Iptables firewall and only allowed access to port 22 for remote access. They describe several options for achieving their objectives of breaching their target system. They used Nmap to conduct a slow port scan of the first 1024 ports of their target computer. They also spoofed their source IP address and port. These scan options were set to hide their scan attempts. The result of the scan indicated that all ports were filtered. Because of this they felt that no further attack could be possible. They explain their inability to breach Team 2’s system as due to the security methods that Team 2 had in place in their system.

    Although Team 3 claimed to have breached Team 1’s target system, they described the system as being a Windows XP SP0 machine, rather than the Debian Linux system that Team 1 actually had. Team 1 provided a good explanation for this phenomenon as being possibly due to ARP poisoning within the laboratory environment. Team 1 included a discussion on the tradeoff between security and usability. Since the teams were using fully patched systems with no applications running, no user interaction and firewalls in place, the systems were extremely secure. I agree with Team 1 that the security of the system is affected by the usability of the system.

  8. Group one presents a complete lab marred by omissions and contradictions.

    The Abstract is odd. Why do you start talking about Casey’s article? Wasn’t there an actual point to the lab beyond attack and defense?

    The introduction to the team’s literature review claims that the common tie in the articles is that they are all about exploiting systems or being able to detect the exploiters. I don’t think that’s completely accurate. The group makes an attempt to link the articles to the lab, but does so in very superficial ways. There is a total absence of any evaluative material what so ever. The group summarizes the articles, but missed key points. What is the “mobile agent that Hohl and Rothermel were talking about? What was their solution, really? Bailey et al state clearly in their paper what their motivation was, and it had little to do with the serious problem of viruses. Also, it was Bailey, Coleman & Davidson, not Bailey, Clark and Coleman. Holland-Minkley was targeting non-major undergraduate students with her curriculum. Do you really think she will push it to this level? How does what Upton et al do compare to what we’ve done?

    The methods section is detailed and complete. Is Linux really known for security any more than the other options? Can you back that academically? The group documents what it did to provide security well. What Document did you use as a basis? The group’s attack method is also well documented. Why did you only scan the lower ports? Couldn’t team 2 have configured something exploitable with a higher port number? I like that you point out the real point of the attack phase. Where is that in the rest of the report? Maybe you should have had more discussion before you all wrote your separate pieces.

    The findings section contains the group’s forensic methods. Why isn’t this in the methods section? The findings section is otherwise detailed and well written.

    The conclusion states that the lab was about protecting systems, but earlier the group states the lab is about anti-forensics, (which is the title, by the way,) which is it? Also you say that if everyone followed guidelines their systems would be safe. What guidelines did you follow? If this is true, why the discussion of usability versus security earlier? It’s contradictory.

  9. For lab seven, team one decided to use the Linux distribution, Debian as there virtual machine to be exploited, which was the only team to use a Linux OS. They picked this operating system because of the renowned security that is associated with Linux operating systems. The team protected themselves by the use of a firewall type software called iptables. Part of the team’s security was to have iptables drop all packets that was not part of an established connection. This being that the machine would not respond with a single reject packet from any node. An example would be if a node where to ping the ip address the node would receive a request time out error and for most users this means nothing is there.
    Team one also given the opportunity to exploit team two. They had a great approach, they first asked themselves questions such as, what is the target OS? Is there any open ports? To answer these questions the team used nmap to scan the host. The team set nmap option “Sneaky” to help avoid detection. In turn using that option will slow nmap’s scan to avoid possible detection. Team one only scanned ports 1024 and below. After the scan the team discovered that all 1024 ports were filtered and no operating system could be identified. This team reported unsuccessful in there quest.

Comments are closed.