10.07.2015 Views

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ASPECTS PLAN EXECUTE ANALYSISObjective:Compromised the target operational environment by penetrating into the underlyingoperating system from open ports available on the Unified Threat Management (UTM)system. Previously, open ports scanning have been conducted to identify open access pointsof the UTM system.35Elapsed Time 2 weeks (2) 1 week (1) Analysis:Expertise Proficient (3) Layman (0)Knowledge ofTargetWindows ofOpportunityPublic (0) Public (0)Unlimited (0) Unlimited (0)Equipment Standard (0) Standard (0)Total 5 (Basic) 1 (Basic)Without proper configurationof the UTM system,administration access pointsthrough network ports areopen such as SSH, Telnet andFTP. Those ports are not fullysecure due to them usingdefault access passwords.Additionally, when a testerhas access to the terminalpoint, the tester is onlyrequired to have knowledgeof Linux command lines toexplore the file managementof the UTM system.FindingsHypothesis:There will beonly severalcommon openports such asFTP, SSH, HTTPS,HTTP that will beopen locally andnot publicly.Actual:Open ports areopenly availablethrough localand publicconnections andare using defaultaccess passwordsand accounts.Analysis:Based on the findings,target of assessment are notsecurely configured as perclaimed and advised by thedeveloper.CIAImplementationHypothesis:All networkports arefiltered bypacket filteringrules anddisabled fromany scanningdiscoverytechniques.Actual:Several openports were foundand identifiedas crucial accesspoints foradministration.Analysis:Without proper configurationof the ports as indicatedby the developer insidethe installation andadministration manual, theUTM system is not enforcingCIA as the main criteria.ConclusionTherefore, it is concluded that the UTM system is not secure withoutany proper administration system and can be compromised byallowing access to the underlying operating system without any properlayers of protection.Table 3: Using CC Attack Potential in all phases of testing.e-Security | Cyber Security <strong>Malaysia</strong> | Vol: 28-(Q3/<strong>2011</strong>)© CyberSecurity <strong>Malaysia</strong> <strong>2011</strong> - All Rights Reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!