10.09.2016 Views

Hacking_and_Penetration_Testing_with_Low_Power_Devices

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

120 CHAPTER 5 <strong>Power</strong>ing The Deck<br />

FIGURE 5.22<br />

Cracking passwords <strong>with</strong> Hydra <strong>and</strong> SSH service.<br />

DETECTING OTHER SECURITY ISSUES<br />

We have cracked the wireless password, identified <strong>and</strong> exploited a vulnerability<br />

on the Windows XP machine, cracked the router password, cracked a few passwords<br />

on the Windows XP box, <strong>and</strong> gained access to the Linux machine as well.<br />

The penetration test is far from over, however. One of the more useful things that<br />

we can do during our test is to sniff the network traffic.<br />

Sniffing traffic between the tablets used by employees <strong>and</strong> the servers reveals that<br />

access to the company intranet site hosted on the Linux machine is unencrypted. This<br />

presents a huge security hole as log-in credentials <strong>and</strong> other sensitive information are<br />

easily obtained. A fair amount of instant messaging <strong>and</strong> visits to inappropriate Web<br />

sites are also detected. The instant messaging is concerning as it might involve leaking<br />

of sensitive information. Inappropriate Web sites are a hotbed for malware that<br />

might lead to a security breach at PFE.<br />

The company intranet site should be investigated. The first step is to use a Web<br />

vulnerability scanner such as Nikto (http://www.cirt.net/Nikto2). Running nikto<br />

-host 192.168.10.101 will run a basic scan against the intranet site. Nikto failed<br />

to discover any issues <strong>with</strong> the Apache 2.2 Web server installation or the intranet

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!