TitaNet Security Flaw Identification Justin Sorsdahl, Matthew Yackel
Agenda Introduction Costs Scope Lessons learned Details Accomplishments Challenges Costs Lessons learned Recommendations Conclusion Acknowledgements
Introduction What is project Security Flaw Identification? Why did we choose this topic? What problem does it address?
TOPOLOGY SHIT
Scope Analyze a system for possible security vulnerabilities Report of what happened and what was found Suggestions of how to address the flaws Out of scope: Provide only the identification of flaws, not address them.
Project Details Building the testing environment Configuring the systems: - Server System - Monitor System - Attacking System Routing workaround – man in the middle Running the security test programs Analyze results
Accomplishments Assemble a functional isolated testing environment Successfully execute and take advantage of vulnerabilities Identify and analyze how it was done and how to prevent it
Opportunities Firewall Implementation Routing – no network connectivity allowed Time constraints and responsibilities Unexpected complications
Costs Equipment Costs Operating Costs Item Producer Model Name Price Switch D-Link DGS-1008D $24.99 Server System Dell Vostro 220 $635.00 Monitor System Various Custom Built $590.00 Attacking System $630.00 Subtotal $1879.99 CAD+Tax Operating Costs Members Hours Rate/Hour Price Justin Sorsdahl 110 $80.95 $8904.50 Matthew Yackel Efren Joseph Reyes
Lessons Learned and Recommendations Don’t procrastinate Take the time to create an accurate and detailed plan Don’t make new decisions as you go – stick to your plan
Conclusion Learned a lot about system security Apply technical skills we learned to real situations Time management and self motivation Problem analysis and problem solving
Acknowledgements Jason Fisher – advice and guidance Lab environment to work in SAIT equipment and budget to build computer Classmates for advice
Or feel free to visit our booth with any other questions! (Booth #12)
References https://www.offensive-security.com/wp- content/uploads/2015/03/Armitage_5_shells.png https://www.offensive-security.com/metasploit-unleashed/