April 18, 2025

10 thoughts on “TECH 581 W Computer Network Operations: Laboratory 7, Team 3

  1. This team’s abstract could have included more to it. The abstract give a very brief explanation about the purpose of this lab was. They could have explained how this lab ties into all the other labs, why this lab was important, and/or how this lab could be used in situations outside of these labs. Most of the abstract concentrates on the steps involved in performing this lab. In the introduction section of this teams lab report the team explains that to defend against a system you need to know how an attacker attacks a system. They show this by pointing out that to defend their system they will examine how their system is being attacked and defend against another system using information from watching the attacks against their system. Team 3’s literature reviews were written very well. The team was able to tie each article together and show their opinion about each one as well as showing omissions and errors in the articles. The only thing that was missing in the literature reviews was there was very little in tying the articles in with this lab or previous labs. The group then starts their methodology off by explaining their plan for how they were going to secure their target computer. The team chose to harden a Windows XP SP3 operating system using the specialized security, limited functionality option in the NIST documents for this operating system. They also set up secure shell for remote access and hardened that opening using OpenSSH. They also disabled unnecessary accounts and changed passwords. The team also explains why they chose to use the SSH. They explain that this SSH would limit anyone that was able to exploit it to gain access and thus prevent them from compromising their system through it. To further secure their system they copied their VM from the standard location and put it in a different drive and ran it from there. They left a fake copy in the standard drive to misguide an attacker into attacking that one and not their real system. The team then explains how they detected an attack from team 2 and requested to bring down their system to make changes. They then changed the passwords in their system and brought their system back online. Team 2 had issues with the changing of the passwords in that they believed that even when the system was brought down no changes could be done to that system. The professor ruled in team 3’s favor and team 3 was not penalized. After sending the professor the necessary information the team rejected any logs from then back to the beginning of the exercise and no attack was discovered from there on. Next team 3 planed out their attack against team 4. They started by researching information from previous labs that team 4 posted for any information that would reveal a vulnerability in their system. Using previous labs they make a guess that team 4 would be using Windows XP SP3 as their target computer. The team then proceeded to scan team 4’s computer using Nmap and Nessus. They believed that the scans would not be detected if they scanned the computers late at night. The scans were detected using firewall log files though. They did not find any open ports to exploit, doing the active scans. Team 3 did not mention that they attempted to set up a passive scan on the target system, in an attempt to capture any packets coming out of the system to use for reconnaissance. If the team would have had a passive scanner on the system at the beginning of the exercise they might have caught some traffic from a couple of web browsing that happened early on in the exercise. The team did come up with a clever idea of stealing the VM from team 4’s files and using that VM to extract any passwords or usernames to be able to open up the VM and get any other information they needed to compromise the target computer. This did not work because the files for the VMs could not be copied. Team 3 also tried to exploit VMware itself using a path traversal vulnerability, but the vulnerability kept locking their system up when testing it out on an Ubuntu machine. Team 3 then noticed that the states of the ports went from “no open ports” to “all ports are filtered”. This change caused team 3 to cry foul against team 4 and they requested the professor to inspect the system for changes. It was determined that even though team 4 did not change the firewall they did not provide a remote login for the professor. The professor penalized team 4 and team 4 created a remote login access for the professor. Team 3 discovered that the remote login that team 4 created provided a listening port on port 3389. Team 3 attempted to exploit this port through a couple of old exploits, but was unsuccessful. They also tried to capture any login attempts to the target computer using a man-in-the-middle attack and ARP poisoning. The team also looked into using brute force on the remote desktop login. They tried several different programs, but were unsuccessful. Other means of penetrating the target system were looked into. These involved things like trying to gain access to the Citrix environment under one of team 4’s user names, or pretending to be the professor and gaining information that way. Even if they were able to get in using the Citrix environment, they would have had to crack the username and password to gain access to the target computer. They opted out of these choices because they believed them not to be included in the scope of this lab. Even though the team did not detect the exploit file in the root drive of their computer, they decided on a forensic evaluation on their system, because of the compromise they detected. In the forensic evaluation they noticed that a file was left on their desktop from team 2. They ether suspected the professor or it was an attempt to plant a file from which team 2 would be able to exploit their system from. They determined the latter. They also made it clear about the amount of ARP poisoning going on over the network. The team suspected that team 2 used “PuTTY” to gain access to their computer and monitored the connection for vulnerabilities in their system. Team 3 could not conclude to this idea. The team then hints to the possibility that team 2 was able to gain vital information through capturing of verbal information or “over the shoulder peeking”. They later decided that this was probably not the case. They also investigated the possibility of team 2 cracking the schools e-mail accounts to gain information from e-mails being sent between team 3 members. The team also examined the possibility of the use of brute force, but this was ruled out due to the complexity of their password and the amount of time involved in this lab. In the end the team believed that the compromise was due to team 2 gaining access to one of team 3’s Citrix accounts and a brute force of their accounts allowed them access to their target account. In the methodology for this teams report they provided too many results. These results could have been included in the results and findings section of this report. The whole forensics analysis could have been included in the results section. This group could have reduced the methodology section down by just explaining the plans for how they were going to secure their system, how they were going to attack the target system, and how they were going to do their forensic evaluation. In the results the team starts off by recapping information that was given in the methodology about how they were compromised by team 2. The team then explains that how without traffic from the target computer and no user behind the computer, the system would be almost impenetrable. The team then talks about how they should have gotten a map of the network before the attacks started so that they could have known which computers were what. The team also examined the idea of using a VPN to the lab network to protect against any sniffing on the Citrix sessions. The team concludes the results by rehashing what they said in the introduction of using what they find out about attacks being made on their systems to harden their own system. Some issues that team 3 provided were network interruptions, loss of time to exploit team 4’s computer due to not crying foul earlier, a virtual machine crashing and not booting again, one of the team members being removed from the exercise due to the account privileges given to him, and the issue of being able to trust what was on the network. In the conclusion of team 3’s lab they rehash everything that was accomplished in this lab. The conclusion could have been written better. Instead of just summarizing the lab, the team could have explained some concepts that they learned while doing this lab.

  2. I do not believe that stating that your team is doing a literature review is necessary. How do you implement the machine? The abstract was not the required length. Once again if the team had put some of their introduction into the abstract they would get the required length. I like how the team mentioned that literature was consulted and reviewed. Did the team find literature outside of what was handed to us to consult and review? The only other document should have been the security guide that the team followed. If they used other documents than what they picked for their previous lab, then they did more than what they were supposed to. It was different that the team stated how their literature review was going to be laid out before actually beginning the literature review. While the purpose of the lab was to teach the teams about anti-forensics, not a single team seemed to be able to successfully attack another machine, so no team was able to do some research into the attack. Also this means that since no team was successful, no team was able to perform some anti-forensics. Team 3 tried to make a cohesive literature review but failed. It read like a list. Not all of the required questions were answered. The team did talk about the articles decently. The team did not relate the articles to this week’s lab experiment properly. I would say in the future to make sure to follow the requirements for the lab but this is the last lab report.
    It was nice of team 3 to think about the other teams when choosing their target machine. Does installing other software go against the lab experiment? Some would say that this completely went against what the teams were supposed to do. I would have to agree with team 2 crying foul to team 3. Even after team 2 was able to put a file onto team 3 machine, but the team took the machine down and made changes. It is something that team 3, even though they knew it was against the rules, they still researched the ‘illegal’ ways to exploit team 4’s machine. I found it interesting that team 3 investigated heavily into how the mysterious file was placed on their machine. Their only logical conclusion seemed to be that team 2 used unethically means of obtaining system information. I would like to know what team 3 thought the attacked used was after reading team 2’s lab report. Does the team really believe that other teams performed ARP poisoning against them?

  3. Team thee again presents an abstract that is not within the bounds of the syllabus. While it does explain what is going to be accomplished in the lab exercise, it is not the minimum required number of paragraphs. The syllabus states that any abstract shorter than two paragraphs will be judged as poor scholarship. Based on this, and their lack of a good abstract in any lab report, I question the overall scholarship of team three. The introduction by team three to the lab exercise is well formatted and fits nicely with the lab. The literature review however is slightly lacking. Team three makes an attempt to provide a good level of cohesion among the articles, but does seem to fail here. The articles as presented are listed one by one with an explanation of each to go along with it. Team three attempts to link the articles together between unrelated paragraphs, but again as stated before, they fail in this regard. Team three’s literature review amounts to almost nothing more than a list of articles with APA style citations. This does not make for an academic or scholarly literature review and does not add to the value of the lab report. I also fail to see where team three ties the articles for review into the actual steps of the lab report. The articles presented for review each week are supposed to be connected to the activities of the lab completed by the team. In this regard team three also fails. The methods section provided by team three do a very good job of explaining the how and the what of the steps performed by team three in the lab, but do a poor job of explaining the who when and why. A Good methods section should allow experiment reproduction by anyone with sufficient knowledge, and without answers to the five basic questions, good reproduction is really not possible. The methods and findings section regardless of the lack of these questions is still rather complete and does a very good job of explaining the steps they took to both defend their host and attack team four. I do however question the usability of a Windows network server running nothing more than OpenSSH, getting any work done on a remote server that centers around the use of a GUI would be impossible using openssh. Team two did allow Remote Desktop Connections to the full and unrestricted server desktop, and was not successfully hacked. Team three displayed a very high level of paranoia in their lab write up, especially around the areas of a sideways attack through Citrix. If team three was intelligent enough to discover how to copy a VMDK, attach it to another VM and crack the SAM in that VMDK, then they should also have been intelligent enough to right click and select properties on any of their VM folders and go to the security tab. A simple visual inspection there would have indicated that only they had access to do anything more than “list” at the files present in those folders, and their paranoia could have been abated. Team three’s forensic investigation is very complete even though it is entirely inaccurate.

  4. In the abstract section of the laboratory report, team three gave a brief overview of what was accomplished in the final lab exercise.

    In the literature review section, team three pointed out that the true meaning of this lab exercise was to perform anti-forensics when they stated “While the majority of this week’s activity dealt with attacking other teams’ systems, the real intent of the lab experiment was to expose the students to anti-forensics, the art of hiding one’s tracks.”Team three was able to relate the articles to each other.

    In the methodology section of the laboratory report, team three revealed that they used Windows XP service pack three as the system they would harden. Team three was able to harden the system via the Microsoft Specialized Security, Limited Functionality (SSLF) Workstation group policy for XP SP3 as per “Security Compliance Management Toolkit: Windows XP” ,enabling the firewall with only a single port for Secure Shell (SSH) being opened for their OpenSSH server , disabling the Microsoft file sharing service and all existing user accounts were disabled, including the default “Administrator”; with two accounts being added, one with administrative privileges and one without, both with high complexity passwords to prevent brute-force cracking attempts. After being attacked by team two, team three during their downtime, changed systems passwords, which was an acceptable action, but incurred the wrath of team two. Team three changed the SSH client side software to reject connections which did not use SSH version two. Team three used a variety of techniques to try to exploit team four’s system It was odd that group three had stated “A network scan of the target system on Friday showed that the results of the scan had changed from “no open ports” on Thursday to “all ports are filtered” on Friday.” The firewall had been one of the first items activated before the IP address was given out on Wednesday night. Because of a misinterpretation of the lab instructions, team four did not initially include an avenue of remote login, which incurred the wrath of team three. However, even when Windows remote desktop was activated, it seemed impervious to the cracking tools that were employed by team three. Team three then listed other ways that were outside of the scope of the assignment that they could have used to acquire group four’s passwords including intercepting e-mail messages and spoofing the Professor’s e-mail address.

    In the results section, team three accounted team two gaining getting the user name and password by monitoring of the team three’s Citrix sessions. Team three stated “With relation to this exercise, the team must admit that with the benefit of hindsight, we would change a number of things with regard to methods and preparation. There can be no doubt that it was a mistake on this team’s part not to map the network which served as the “battlefield” well before the action began. As we did not know what the “normal” network should look like, we found it difficult to ascertain when something was amiss.” My team had made the same mistake also and was not made aware of the network manipulation until wireshark and other scanning tools picked up unusual network activity during the hack wars.

    In the issue section, team three came across several problems including network interruptions, crashing virtual machines, issues with their target system, and the inability of a group member to participate because of his administrative circumstances.

    In the conclusion section, team three restated some of their issues and stated that “the team found a synergy existed between the defensive and offensive techniques, and used this to increase both its offensive and defensive postures.”

  5. Group three’s literature review accurately identifies the main points of the lab exercises and reviews each assigned article with relation to the lab activities. Not all of the articles are handled as well as others but the write-up flows nicely between then rather than isolating the content of each paper to a paragraph. Team three had some excellent insights into the content of some of the assigned readings, particularly “Cyberattacks” and “Defense Against the Dark Arts.” The notation of the lack of an ethics section was further supported by the team’s assertion that the author’s use of “edgy” material to draw in students was unethical.

    Team three broke up their methodologies into three main sections, defense, attack, and forensic investigation. The defense section was very well documented. One omission in the section on using the SSLF template was the lack of supporting documentation or citations. Where did this come from, the Microsoft guide, the NIST guide, or somewhere else? The use of OpenSSH to facilitate the remote access requirement is a little unclear. If it’s limited to an unprivileged account how is the instructor supposed to validate the configuration? Team three’s response to the intrusion by team two leaves many questions. If the point of the lab exercises is for the attacking team to use anti-forensic methods to cover an intrusion and for the defending team to attempt to recreate their attack methods, wouldn’t it have been better to gather as much data about the attack as possible as it was occurring? From the analysis in the lab, team three has no idea how the intrusion occurred and is merely guessing at (valid) potential methods. The point of the lab wasn’t necessarily to successfully defend the machine against attack. Though a compromised machine would lead to more work for the team in reconstructing the attack, the write up makes it seem more like team three believed they’d “lost” if team two succeeded. Had team three successfully traced the methods team two utilized, the true purpose of the lab could have been realized.

    The attack section provides a well thought out plan of attack utilizing all of the materials learned previously in the class. One issue I had was the port scans late at night as there was less chance of it being monitored. What if they’d used another machine to run the port scans from and saved the logs in capture dump files? Active monitoring of the systems, though possible, would require a significant time investment for the defending team. As you said previously in your literature review “a security breech is inevitable, and that good forensics practice may help locate the parties who carried out the attack.”
    The forensic investigation of the machine, I feel, was done too late. Only after team two called “cheating” did team three increase their network reconnaissance. Had this been done immediately as a response to the attack I think the analysis would have been more revealing.

  6. Team 3’s abstract is well written and gives a good overview of what they will be attempting in lab 7. As always team 3’s introduction is good, and is a summary of all of the previous lab activities and how they tie into lab 7. The literature review is not as cohesive as perhaps it should be however, each article is summarized in detail and the group compares and contrast the articles and gives their opinions on the information presented stated in the articles.
    Team 3’s methods section is very detailed. I like how team three broke up their methods section into three sections. The “Plan of Defense” section is well documented and gave specific details into why they chose to use a Windows XP SP3 machine. They indicated that their team members more proficient in a Microsoft NT environment and felt anti-forensics would be easier using their chosen environment.
    The “Plan of attack” section provided detail needed for their plan of attack I like the fact that before their red teaming exercise began they utilized Professor Liles’ blog to start passive reconnaissance by inspecting the previous laboratory reports that had been submitted by team 4. They used this information to determine possible information leakage of operating system type, passwords and security methods used in previous labs. I thought it was very creative how team 3 used previously provided material required in lab 5 by team 4 against team 4 in lab 7. Laboratory five had required each team to choose an “as-is” operating system and attempt to exploit it. Again as they had mentioned in their introduction team 4 used previous lab experience for lab 7.
    The “forensic investigation” section was also well documented. Team 3 felt that forensic investigation was challenging due to the fact that their Virtual Machine was not compromised. They were able to identify intrusions but couldn’t ascertain whether it was another team or Professor Liles testing for compliance. They eventually confirmed it was the work of team 2 as detailed by in their figures 1 and 2.

  7. The team begins with the abstract and explains what is going to occur within the lab. They provided a small abstract. They then went onto their introduction discussing the subject of the best defense is a good offense. With this they discus from it to create an utilize a plan of attack. They then go onto discuss the literature review and not only how it relates to this weeks lab but included the previous six and how in each methodology there are patterns to look for and how the related to the class. They then go on and through out the literature review they discuss the different methodologies and reference the literature. This created a more interesting review, along with comparing and contrasting. Although there was still some separation in the review it was a good one to end the class on. They then go on to discuss the methodologies and what was done to harden their system and then what was going to be done to exploit the targeted system which was team 2’s. They broke the section down into three smaller subsections the first was plan of defense, then plan of attack, and finally forensic analysis. Each of the sections where described in detail and again shows the strong point for this team. Next the team provided the findings. Here they stated that they where unsuccessful in exploiting the target system. Although the team was not successful they described the benefits of doing an exercise such as this. I agree that planning the attack is just as important as the actual attack its self. Many times attacks would fail due to lack of planning and the lab has shown each team this. They then provided their issues and concluded with an overall summary. From the findings section their where statements that could have made the conclusion stronger. Some of the information provided in the conclusion could have been placed within the issues and problems section. Overall the team did a good job.

  8. I think that group 3’s write-up for lab 7 was good. The abstract and introduction for this lab was very good. The literary review was somewhat very good. Group answered all of the required questions for the literature review. All of the citing for the literary review was present, but not proper throughout the lab. The literature review was cited properly throughout. The author and year of the reference was included and all of the page numbers were present. For this lab, the group answered all of the desired questions. The group covered all of their steps in great detail. However, some more detail should have been covered about how exactly ARP poisoning was performed using Cain and Abel. This is because by poisoning the whole subnet, the group could have broken some of the rules. Forcing the entire subnet’s traffic through a virtual machine is a destructive attack and can bring the whole subnet down for some time. The group did indicate many good points such as how they found evidence of a lot of ARP poisoning by other groups. This indicates that other groups could have redirected traffic from other attack groups to an incorrect virtual machine. Finally, the conclusion to this laboratory was also well done because it accurately sums up their procedures and findings.

  9. Team three decided to use a kernel Microsoft NT kernel based environment because the team felt they were more proficient and performing forensics on a Microsoft environment would be easier to do. The team decided to use Windows XP SP3 as there target node. They protected the OS by enabling the firewall and only allowing SSH port to be open. They also identified that the team followed “Security Compliance Management Toolkit: Windows XP” which the team identified came from lab five. The team also added two usernames, one having administrative privileges while the other was a regular user and disabled the rest of the accounts. According to team three this defense policy was not successful. The attacking team, team two, was able to log into the virtual machine on day two.
    Team three made some guess about what was done by team four, which was pretty much dead on. This team used Nessus and nmap to retrieve information about what kind of system was being used. After learning that they could not find any open ports the team took a completely different approach and decided to attack VMware instead of the operating system itself. After two failed attempts at attempting to mount a shared folder the team discovered on Friday that the machine went from no open ports to all ports are filtered. From there the team used a verity of tools such as TSCrack, TSGRinder, Cain with ARP poisoning in order to gain login credentials. The team also listed off some really good ideas about exploiting the team at a higher level.

  10. To all on the question of the wisdom of changing passwords once an intrusion was detected:
    Many of you raise valid criticism of our actions with regard to team two’s break in. Perhaps we let pride overcome our better judgment in these regards: we felt the need to prove that our system was not breached due to incompetence on our part; and changing the passwords provided an effective way to test this. In reality, the account change was a tactical move to see how circumstances would develop. We could not be certain team two was involved at this point: this was ultimately confirmed by our actions here. As we were able to control the dispersion of the new credentials, we hoped the source of the security leak could be isolated. We thought is possible that team two would somehow acquire the new login: it would have given us more information as to what happening. Though unmentioned in the lab write up (as it came to no result, and shows a degree of paranoia which seems laughable in retrospect), I seeded false credentials in the Citrix environment: depending on what new logins appeared, we would have known a great deal more than what we previously did. Unfortutaly, no additional efforts by team two were made. Ultimately, even if we had not changed the account information and team two had succeeded, the forensic investigation would have been the same as we related in our write up. The weakness was not in the configuration of our system, but in factors beyond our control. The circumstances would stand exactly as they are now, with us making guesses, and team two remaining silent.

    @jeikenbe: I don’t think that we ever stated we monitored team two with regards to “PuTTY” usage: all the “PuTTY” discussion was in regards to our own utilization of the client.

    @mvanbode: the only document package we used to secure the VM proper was the Microsoft document mentioned from lab five. We used other documents (as cited) to plan offensive and defensive actions outside the VM configuration itself. The SSH server was an addition, and as a Linux installation offers this natively, we felt it appropriate to include. It should be noted that the concept of “third party” utilities on Linux is somewhat confusing, as distributions are collections of third party items in a common repository: in this, we felt the same degree of freedom should be allowed for Window’s installations, which is why we discussed Microsoft’s position on SFU and SSH. We understand your criticism of our response of team two, but politely disagree. Your comment on researching “illegal” means to compromise team four: I think team two’s reluctance to reveal their methods speaks sufficiently toward this topic. One should always know what ‘can’ be done, even if you have no intention of using it yourself. We do not know what team two ultimately did to compromise our machine; as this is the end of the exercise, I am content to let the matter rest. Also, who can say what really happened with ARP poisoning during the exercise? However, the team five and two combined attack against your team indicates that alliances were present: so yes, it is likely other teams were ARP poisoning us.

    @nbakker: Your criticism of the “who, when and why” concepts missing from the methodology is puzzling. I believe the “who” is obvious (team three), the “when” irrelevant, other than to denote the order of steps and events when important to the discussion, and the “why” to be sufficiently addressed in most cases. Perhaps if you would have pointed out specific examples I could address this further. The OpenSSH question is a good point: in reality, however, most of the functionality limitation came from the SSLF group policy configuration. While GUI utilization is mostly out of the question (tunneling can be done, but is outside the scope of the discussion), Microsoft does provide a relatively complete set of command tools to configure the operating system. We noticed that your group tried to run the security console (sc.exe); this would normally work except for the default SSLF policy in place on the machine. I really believe your complaint to lie mostly with the SSLF group policy rather than the usefulness of the SSH configuration means. Third party application could be an issue with this configuration, but we had no need to worry about this in the scope of the exercise. The comment on the file permission is interesting. You do realize that the items under discussion are remote file systems, with permission enforced by file server login credentials, correct? I think it becomes obvious how easy it is to get around these permissions on group folders if even one of the target groups’ members credentials is available: it is as simple as mounting a network drive using a different SMB login.

    @tnovosel: the lack of pre-exercise network mapping was a very real problem, and I believe points to the most significant thing learned from the exercise: know the battlefield. I think it commendable that you alone, among all the reviewers, were the only one to present real discussion on this crucial idea: good work.

    @jverburg: many of your criticisms are valid. The document used was examined fully in exercise five, and was specifically named in the methodology section. The login of an administrative account was not enabled, as we saw reason that a survey of system functionality would require more than this. The real limitation came from the Microsoft SSLF group policy kit, which appeared to disallow “runas /user:admin …” or similar from a normal user account. If necessary, we would have accommodated the wishes of Professor Liles (if administrator access was required) should it have come to this. Most of the forensic investigation, including the increased level of reconnaissance actually occurred shortly after team two’s break in. Our group did not request downtime until after this investigation occurred. I think, despite what some parties believe our level of logging was already at a substantially high level: this is what allowed us to reverse engineer the attack to the extent that we did. I think you must admit that in retrospect, due to team two’s undisclosed methods, we would have learned little more had we let the attack progress: our forensic report would be essentially the same as its present form in nearly all respects.

    @prennick: the approach with the ‘Cain’ program was this: we poisoned all observed hosts into believing we were team four’s machine, other than the network gateway (we didn’t know the amount of traffic flowing through the gateway route, and did not want to cause a DoS on team four’s machine). Not much traffic was actually affected (only the traffic to and from team four’s machine, of which little was recorded). Most of the other traffic was picked up without ARP poisoning, due to our location on the shared Citrix server resource. The time rate of our ARP poisoning transmissions varied, generally between nine and thirty seconds. We were forced to choose shorter intervals, as other ARP poisoning sources appeared to be “stealing” our targeted data streams by utilizing shorter ARP broadcast intervals. I cannot see how we would be a factor in the team five/two against one mix-up, as we were not in any way altering team ones MAC address.

    To all: thank you for an interesting semester. I am sure we will see more of each other in the future.

Comments are closed.