top of page

PROJECT SUMMARY

Square Stage

THE

TEAM

In conclusion, we have gained certain knowledge and expertise of the RDP vulnerability through BlueKeep exploitation.

 

Through the post-exploitation activities, we were able to think like hackers and have a better understanding of what types of activities or information are they going to perform or interested in once they successfully exploited the system. This made us more aware of the need to protect and secure our networking devices. 

We hope that the guided worksheet tutorials can do the same for you. Happy learning! 

LEARNING POINTS

IPHIGENE PEH YURENG

gene.jpg

Team Leader

KHANT SOE WIN

win.jpeg

Team Member

CHIN SHAO YANG

sy.jpeg

Team Member

Through this process, we were able to draw on one another's knowledge and information as a team to deal with the problems we faced while doing these activities. We have learned the importance of disabling RDP connections to the host such that no malicious user can attempt to perform an RDP exploit on the machine. We have also learned the importance of network security, where a firewall or an Intrusion Prevention System (IPS) has to be placed between the internal network and the internet, this is to prevent unwanted and authorized traffic into the internal hosts. Last but not the least, it is also equally important to keep all hosts' operating systems updated to the latest version as the old Operating Systems versions may post a security issue of unpatched vulnerabilities.

REFERENCES

(n.d.). Retrieved July 29, 2020, from https://www.cybervigilance.uk/post/bluekeep-and-sentinelone

3/29/2020, A. (2020, March 30). Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses. Retrieved July 29, 2020, from https://www.varonis.com/blog/windows-bluekeep-vulnerability-deja-vu-again-with-rdp-security-weaknesses/

BlueKeep. (2020, May 31). Retrieved July 29, 2020, from https://en.wikipedia.org/wiki/BlueKeep

Bradbury, D., Captian Hindsight and side kick Mintberrycrunch says:, Says:, R., & Ducklin, P. (2019, July 26). BlueKeep guides make imminent public exploit more likely. Retrieved July 29, 2020, from https://nakedsecurity.sophos.com/2019/07/26/bluekeep-guides-make-imminent-public-exploit-more-likely/

Chandel, R., 26, D., 28, M., 17, S., & 2, D. (2020, January 26). Multiple Ways to Persistence on Windows 10 with Metasploit. Retrieved July 29, 2020, from https://www.hackingarticles.in/multiple-ways-to-persistence-on-windows-10-with-metasploit/

Event Log Management. (n.d.). Retrieved July 29, 2020, from https://www.offensive-security.com/metasploit-unleashed/event-log-management/

Hashcat advanced password recovery. (n.d.). Retrieved July 29, 2020, from https://hashcat.net/hashcat/

Ionescu, W. (2020, June 10). How to Exploit the BlueKeep Vulnerability with Metasploit - Pentest-Tools.com Blog. Retrieved July 29, 2020, from https://pentest-tools.com/blog/bluekeep-exploit-metasploit/

Keylogging. (n.d.). Retrieved July 29, 2020, from https://www.offensive-security.com/metasploit-unleashed/keylogging/

Meterpreter Basic Commands. (n.d.). Retrieved July 29, 2020, from https://www.offensive-security.com/metasploit-unleashed/meterpreter-basics/

Meterpreter Service. (n.d.). Retrieved July 29, 2020, from https://www.offensive-security.com/metasploit-unleashed/meterpreter-service/

Nmap Cheat Sheet: From Discovery to Exploits - Part 1: Introduction to Nmap. (2018, May 21). Retrieved July 29, 2020, from https://resources.infosecinstitute.com/nmap-cheat-sheet/

Pivoting. (n.d.). Retrieved July 29, 2020, from https://www.offensive-security.com/metasploit-unleashed/pivoting/
Rijnetu, W. (2020, July 10). BlueKeep RDP overview and mitigation: Pentest-Tools.com Blog. Retrieved July 29, 2020, from https://pentest-tools.com/blog/microsoft-rdp-vulnerability/

Screen Capture. (n.d.). Retrieved July 29, 2020, from https://www.offensive-security.com/metasploit-unleashed/screen-capture/

Stroud, F. (n.d.). Use After Free. Retrieved July 29, 2020, from https://www.webopedia.com/TERM/U/use-after-free.html
Windows Post Gather Modules. (n.d.). Retrieved July 29, 2020, from https://www.offensive-security.com/metasploit-unleashed/windows-post-gather-modules/

Ytisf. (n.d.). Ytisf/theZoo. Retrieved July 29, 2020, from https://github.com/ytisf/theZoo

OCCUPYTHEWEB (2019, Jan 19). Retrieved July 29, 2020, from https://null-byte.wonderhowto.com/how-to/hack-like-pro-ultimate-command-cheat-sheet-for-metasploits-meterpreter-0149146/

Best viewed in Chrome browser settings

©️ 2020 School of InfoComm Technology, Ngee Ann Polytechnic. All rights reserved.

bottom of page