Skip to content

This ENPM695 forensic project investigates a compromised system to identify a hacker’s activities, security vulnerabilities, and hidden files. The project provides a detailed analysis and offers recommendations for improving system security.

Notifications You must be signed in to change notification settings

Shinigami1312/ENPM695-System-Forensics-Vulnerability-Assessment

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

ENPM695-System-Forensics-Vulnerability-Assessment

Overview

This repository contains a comprehensive forensic analysis report for the ENPM695 project. The objective of this project was to investigate a system suspected of being compromised by a hacker, identify vulnerabilities, locate hidden files, and retrieve crucial information. Using penetration testing and forensic techniques, the project assesses the security of the system and provides recommendations to mitigate identified risks.

Objectives

The primary objectives of this forensic investigation were:

  1. Evaluate System Security: Identify running services and assess vulnerabilities in the system.
  2. Exploit System Weaknesses: Gain access to the system by exploiting identified vulnerabilities.
  3. Identify and Crack Passwords: Obtain credentials and crack passwords of key user accounts.
  4. Locate and Retrieve Hidden Files: Discover hidden files left by the hacker and decrypt them to uncover sensitive information.
  5. Threat Modeling and Analysis: Develop a threat model and analyze potential attack vectors.

Methodology

The forensic analysis was conducted through the following steps:

  1. System Scanning: Used tools like arp and nmap to detect IP addresses, open ports, and active services.
  2. Service Exploitation: Gained access by exploiting vulnerable services (e.g., HTTP) to perform command injections and gather user data.
  3. Password Cracking: Used tools like John the Ripper with a custom wordlist for cracking user passwords.
  4. Hidden File Extraction: Employed steganography tools to reveal hidden messages and decrypt important files left by the hacker.
  5. Privilege Escalation: Used LinPEAS for privilege escalation to obtain root access.

Key Findings

  • Vulnerable Services: FTP, SSH, Telnet, and HTTP services were identified as open and susceptible to attacks.
  • Password Cracking: Successfully cracked multiple user passwords, including credentials like emaw:judgement and thanos:infinitystones.
  • Hidden Artifacts: Discovered six encrypted files, each representing "Infinity Stones," and decrypted them to reveal the hacker’s secrets.
  • Hacker Identity: Identified the hacker as "thanos" based on logs and file analysis.

Tools Used

  • Nmap: For network scanning and service identification.
  • DirBuster: To identify hidden directories on the web server.
  • Wireshark: To capture packets and detect potential credentials.
  • John the Ripper: For password cracking.
  • Steganography Tool: To uncover hidden data in images.
  • LinPEAS: For privilege escalation assessment.

Challenges

  1. Password Cracking: Required creation of a custom Marvel-themed wordlist to crack user passwords effectively.
  2. Privilege Escalation: Gaining root access involved using various tools and exploits for successful escalation.

Recommendations

  1. Implement Strong Password Policies: Enforce complex passwords and multi-factor authentication.
  2. Restrict Access to Sensitive Services: Limit public access to services like FTP, SSH, and Telnet to reduce attack vectors.
  3. Apply Regular System Patches: Ensure the system and all services are updated to minimize vulnerability risks.
  4. Enhanced Logging and Monitoring: Enable logging for all services and monitor them to detect unauthorized access attempts.

Conclusion

This investigation revealed significant vulnerabilities in the system’s security posture and identified critical data left by the hacker. By following the recommended security measures, the system can be better protected from future attacks.

For detailed findings and step-by-step analysis, please refer to the full report included in this repository.

About

This ENPM695 forensic project investigates a compromised system to identify a hacker’s activities, security vulnerabilities, and hidden files. The project provides a detailed analysis and offers recommendations for improving system security.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published