ITNET302A_118 Title Penetration Test and B2R Challenge

Assignment 2
Subject: ITNET302A_118
Title: Penetration Test and B2R Challenge
Due Date: Check Moodle
This assignment consists of two tasks:
? Perform a Penetration Test and write a report (70%)
? Complete a Boot-2-Root challenge. (30%)
The in-scope boxes for this task are only accessible via the VPN. You will need to download the OpenVPN configuration from Moodle and connect to the environment. The config has been set up to accommodate all operating systems (Windows/Mac/Kali) out of the box. Simply download
OpenVPN (pre-installed in Kali) and run the config as Administrator. The UDP config is preferred.
Network Summary (where x is [1, 2, 3, 4, 5, 6, 7, 8, 9])
The environment consists of 3 boxes in total, two for your assignment and a Kali box (with Nessus) for you to perform your hacktivities from. You can launch exploits from anywhere you want (TAFEKali, VPN-Kali or your Windows/Mac host). For Nessus use the VPN-Kali box otherwise some vulnerabilities will be missed. Do not use Nessus through the VPN. Network summary:
Hostname IP Address Credentials Nessus/Notes
vpn-kali SSH student:student
Username & Password: Your Moodle Email address
sploit 10.222.0.x1
(VPN Status Page) Username: sploit
Password: unknown Box for penetration test and report
(The password is not literally unknown)
B2r 10.222.0.x2
(VPN Status Page) Box for boot-to-root challenge
Penetration Test (70%)
A penetration test is a simulated attack designed to test the security of target systems and networks for both weaknesses and strengths. A penetration test involves identifying and exploiting vulnerabilities against the targets. The penetration test is concluded by providing a report summarising all identified vulnerabilities, including methods of exploitation where applicable.
Your first task is to complete a penetration test against the target box including identifying vulnerabilities, exploitation of vulnerabilities (where applicable) and creating a report summarising your penetration test. The term “vulnerability” should be considered to include anything that poses a security risk, such as:
• Out of date software
• Misconfigurations
• Weak credentials
• ???
Vulnerabilities that you can exploit, that lead to a shell, are critical. As there are more than 8 critical vulnerabilities present on the box, findings submitted that are not critical will receive less marks.
A skeleton report has been provided for you, available on Moodle. Check it out.
There are 9 copies of each box in total. They are identical but shared amongst students. Do not disable any configurations/services running when you acquire administrator access. The box will be frequently reverted back to its original running configuration. If you think something’s broken or would like your own personalised copy of the boxes, email me.
Boot-2-Root Challenge (30%)
A “boot-2-root” (B2R) challenge is a security gaming exercise. A B2R involves downloading a purpose-built vulnerable virtual machine, launching it and breaking in. The first two steps have been completed for you, your task is to break in to the B2R box
Additionally, there are 4 flags scattered around the box that are also worth marks. Flags are short phrases placed within curly brackets, for example:
Marks are awarded on finding flags, achieving low level access, acquiring root access.
Do not write a penetration test report on this box, a “story” of how you break in (including screenshots) will suffice. For example:
1. First I noticed ______________ (include screenshot as supporting evidence)
2. So I performed ______________ (include screenshot as supporting evidence)
3. This allowed me to acquire a low privileged shell ________ (include screenshot)
These boxes are shared amongst all students. Do not disable any configurations/services running when you acquire administrator access. The box will be frequently reverted back to its original running configuration. If you think something’s broken, email me and I will revert it for you.
Trick or Treat
Some tricks, tips, & extra knowledge: o Do not actually perform the Denial of Service (DoS) attacks o DoS attacks are not critical findings o The boxes will revert every 24 hours at 4am automagically o Do not waste your time on Windows ephemeral ports (40,000 or higher). They are false rabbit holes, no matter how juicy they look, they are unreliable and not the attack avenue o Pretty much any port over 10,000 is not the way in o A critical finding is one that allows you to get a root shell o Some exploits may need to be run more than once o Pentest box only: The username for any service is sploit. You should searchsploit this (haha) o Nessus and other scanners lie, do not take their scan results as law.
o You have a penetration test skeleton document, use it o Nessus will not help you with the B2R challenge, you have to go looking o Googling common privilege escalation methods will easily get you root o Do not use dirtyCOW on the B2R box. It will break and not give you root
Marking Rubric
The associated marks for each component is as follows:
Type Component Total Marks
Penetration Test Title page 1
Penetration Test Table of Contents 1
Penetration Test Executive Summary 5
Penetration Test Scope 2
Penetration Test Testing Methodology 4
Penetration Test Findings Summary 4
Penetration Test Finding #1 6
Penetration Test Finding #2 6
Penetration Test Finding #3 6
Penetration Test Finding #4 6
Penetration Test Finding #5 6
Penetration Test Finding #6 6
Penetration Test Finding #7 6
Penetration Test Finding #8 6
Penetration Test Conclusion 5
Total Total Marks for Penetration Test 70
Boot-to-Root (B2R) Flag Found (2 marks per flag) 8
Boot-to-Root (B2R) Low privileged access 12
Boot-to-Root (B2R) Root Access 10
Total Total Marks for Boot-to-Root 30
Total Total Marks Overall 100

Calculate your paper price
Pages (550 words)
Approximate price: -

Quality Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.


Qualified Writers

We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.


Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account.


Prompt Delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. We will always strive to deliver on time.


Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text.


24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done


Place your order

Fill in the order form and provide all details of your assignment.


Proceed with the payment

Choose the payment system that suits you most.


Receive the final file

Once your paper is ready, we will email it to you.

Academic Writing Services

If you are looking for exceptional academic writing services, then you are in the right place. Studyacer offers customised academic assignments and academic papers for students at all levels.

StudyAcer StudyAcer


Essay Writing Help

Writing an essay can be a challenge. However, we know what every student needs. And we purpose to deliver. Here at StudyAcer, we do all we can to help with academic essays and assignments. We have a dedicated team of professional essay writers.

StudyAcer StudyAcer


Assignment Help

We understand students need satisfactory results. Our cheap assignment writing service helps and never leaves any doubt. We always strive to ensure the ultimate and best results. It is our joy to offer a cheap reliable essay writing service.

StudyAcer StudyAcer

Term paper

Term Paper Help

Have you been asking yourself, where can get a pre written research papers for sale? Worry no more, the fact that you have a term paper that is due tonight and you haven’t touched it. At Study Acer it is our responsibility to get your paper on time.

StudyAcer StudyAcer


Dissertation Writing Service

Several master’s students seek professional help with their thesis.Students from different parts of the world experience different challenges. Dissertations have different stages and the challenges are different too. Do not struggle in silence, order now .