The second phase of the project, Milestone 2, our team was responsible for the implementation of the security program that included the information security plan, configuration of the server after the risk assessment, and research and implementation of the tools necessary for vulnerability analysis and penetration testing. These tools were used on each team member’s device so that it would not interfere with the testing web server. During phase two, the team implemented two factor authentication on WordPress, the removal of root user access to the system, complex password implementation for each individual user, and Wazuh and OpenVAS were utilized in the scanning of the vulnerabilities of the server. The initial toolset that the team created was Nmap, Legion, and nikto. However, upon further research we developed a much broader set of tools including Hydra, WPScan, Sqlmap, Commix, Gobuster, CUPP, Metasploit, BurpSuite, XSser, Faraday, Hashcat, and Nessus. We felt as though we would need many tools to test each vulnerability possibility based on our server based off the thought that “without the right tools, a penetration tester may overlook vulnerabilities or weaknesses in the target system or be unable to effectively exploit them”. (31 et al., 2021)
The third phase of the project, Milestone 3, our team was responsible for the penetration testing and vulnerability testing of on opposing team’s web server. During this phase we were also responsible for the creation of a vulnerability analysis report based on our findings during the scans and pen testing of the opposition’s server. We were also responsible for the forensic report of our server that is protected by our team. During this phase, we had to ensure that our server remained online at all times with little to no down time because part of the C.I.A. triad states “data and information systems are available when required”. (Techopedia, 2013) Throughout this phase, the team worked diligently performing scans using many of the tools that have been listed. Each member used their own choices of tools that were in the toolbox. The faraday application was also used to help keep the team in line with each other’s scans. During the scanning and penetration testing, the team was able to uncover a profound amount of data related to the opposition’s server that will be discussed in depth following this portion of the documentation. It will be said that we did not officially hack the opposition’s system, however, we did uncover many faults and vulnerabilities in their system. It will be said that there was a phishing attempt against our team asking for the log in information for our server. The email that the person spoofed was Professor Privitera. Our team responded with false information that sent the person to a looped video. Also, the VPN that was necessary to access the IP of the system tampered with the systems and application’s abilities to fully test the vulnerabilities of the web server.