Exploiting Misconfigurations with SprayingToolkit

Exploiting Misconfigurations with SprayingToolkit
Situation:
This exercise focused on exploiting infrastructure misconfigurations in artstailor.com to gain system access. The tasks involved using the SprayingToolkit for a password spraying attack, discovering misconfigurations in the pfsense firewall, and forwarding RDP connections to achieve remote desktop access.
Obstacles:
- User Enumeration: Creating a valid list of usernames required research and educated guesses.
- Firewall Credentials: Gaining access to the firewall depended on the discovery of default credentials.
- Port Misconfigurations: Identifying and exploiting open ports required thorough scanning and analysis.
Actions Taken:
- User Credential Discovery:
- Created a
username.txtfile based on themes from the cast of the show Invincible. - Compiled a
passwords.txtfile of simple, demographic-appropriate passwords. - Used
atomizer.pyfrom theSprayingToolkitto perform a password spraying attack onhttps://mail.artstailor.com. - Discovered valid credentials:
s.wilkins:Fall2021.
- Created a
- Port Scanning:
- Conducted an
nmapscan to identify open ports oninnerouter.artstailor.com. - Found ports 443 and 8443 open for HTTPS services.
- Conducted an
- Firewall Access:
- Accessed the
pfsensefirewall login page atinnerouter.artstailor.com:8443. - Logged in using the default credentials (
admin:pfsense) and modified settings to allow remote desktop protocol (RDP).
- Accessed the
- RDP Redirection:
- Forwarded the connection from
innerouter.artstailor.comto the internal IP10.70.184.39on the RDP port. - Successfully accessed the remote desktop of
costumes.artstailor.comusingrdesktop.
- Forwarded the connection from
Results:
- Misconfigurations Identified:
- Default Credentials: The
pfsensefirewall was accessible using default admin credentials. - Open Ports: Ports 443 and 8443 were misconfigured, allowing external access.
- Weak Passwords: Simple, predictable passwords enabled the password spraying attack.
- Default Credentials: The
- System Access Achieved:
- Gained valid user credentials (
s.wilkins:Fall2021). - Accessed the remote desktop of
costumes.artstailor.com.
- Gained valid user credentials (
- Critical Vulnerabilities:
- Misconfigured firewall allowed unauthorized users to modify critical settings.
- Open ports and weak passwords exposed the system to external threats.
Tool Purpose Overview:
SprayingToolkit:
- A Python-based tool used to perform password spraying attacks, testing common credentials across a list of usernames.
atomizer.py:
- A specific module within the
SprayingToolkitused for executing targeted password spraying.
nmap:
- A network scanning tool used to identify open ports and services on the target system.
rdesktop:
- A remote desktop client used to connect to the compromised system.
Recommendations:
- Firewall Security:
- Change default
pfsensecredentials to unique, strong passwords. - Disable or restrict external access to ports 443 and 8443.
- Change default
- Enforce Strong Password Policies:
- Require passwords to be at least 12 characters long with mixed-case letters, numbers, and symbols.
- Avoid demographic-appropriate passwords or common seasonal terms.
- Regular Vulnerability Scans:
- Conduct routine scans to identify open ports and misconfigurations.
- User Awareness Training:
- Educate users on the importance of strong password practices to prevent credential-based attacks.
View PDF Document
