Skip to content

Commit

Permalink
add new OSWE template
Browse files Browse the repository at this point in the history
  • Loading branch information
noraj committed Aug 5, 2020
1 parent dfe42ae commit 8e95f36
Show file tree
Hide file tree
Showing 4 changed files with 204 additions and 1 deletion.
4 changes: 3 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,6 +97,7 @@ Report Templates:
- [whoisflynn improved template v3.2](output/OSCP-exam-report-template_whoisflynn_v3.2.pdf)
- **OSWE**
- [Official Offensive Security Template v1](output/OSWE-exam-report-template_OS_v1.pdf)
- [noraj improved template v1](output/OSWE-exam-report-template_noraj_v1.pdf)
- **OSCE**
- [Official Offensive Security Template v1](output/OSCE-exam-report-template_OS_v1.pdf)
- **OSEE**
Expand All @@ -110,7 +111,7 @@ Report Templates:

- John Hammond - OSCP - Taking Notes & Resources (video)
[![OSCP - Taking Notes & Resources](http://img.youtube.com/vi/MQGozZzHUwQ/0.jpg)](https://www.youtube.com/watch?v=MQGozZzHUwQ)
- 8th [Top Offensive Security Open Source Projects](https://awesomeopensource.com/projects/offensive-security) (08 Apr. 2020)
- 6th [Top Offensive Security Open Source Projects](https://awesomeopensource.com/projects/offensive-security) (05 Aug. 2020)

## Stargazers over time

Expand All @@ -125,6 +126,7 @@ Report Templates:
- [whoisflynn improved template v3.2](https://github.com/whoisflynn/OSCP-Exam-Report-Template) (UNLICENSED)
- **OSWE**
- [Official Offensive Security Template v1](https://support.offensive-security.com/oswe-exam-guide/#suggested-documentation-templates) (UNLICENSED)
- [noraj improved template v1](src/OSWE-exam-report-template_noraj_v1.md) (UNLICENSED)
- **OSCE**
- [Official Offensive Security Template v1](https://support.offensive-security.com/osce-exam-guide/#suggested-documentation-templates) (UNLICENSED)
- **OSEE**
Expand Down
5 changes: 5 additions & 0 deletions generate.rb
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,11 @@
name: 'official Offensive Security template v1',
path: 'src/OSWE-exam-report-template_OS_v1.md'
},
{
exam: 'OSWE',
name: 'noraj improved template v1',
path: 'src/OSWE-exam-report-template_noraj_v1.md'
},
{
exam: 'OSCE',
name: 'official Offensive Security template v1',
Expand Down
Binary file added output/OSWE-exam-report-template_noraj_v1.pdf
Binary file not shown.
196 changes: 196 additions & 0 deletions src/OSWE-exam-report-template_noraj_v1.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,196 @@
---
title: "Offensive Security Web Expert Exam Report"
author: ["student@youremailaddress.com", "OSID: XXXX"]
date: "2020-07-25"
subject: "White-box penetration test"
keywords: [audit, code, exploit, OSWE]
subtitle: "OSWE Exam Report"
lang: "en"
titlepage: true
titlepage-color: "FF8C00"
titlepage-text-color: "000000"
titlepage-rule-color: "000000"
titlepage-rule-height: 2
book: true
classoption: oneside
code-block-font-size: \scriptsize
---
# OSWE Exam Report

## Introduction

The Offensive Security OSWE exam documentation contains all efforts that were conducted in
order to pass the Offensive Security Web Expert exam. This report will be graded from a
standpoint of correctness and fullness to all aspects of the exam. The purpose of this report is
to ensure that the student has the technical knowledge required to pass the qualifications for
the Offensive Security Web Expert certification.

## Objective

The objective of this assessment is to perform a white-box penetration test the Offensive Security Exam network.
The student is tasked with following methodical approach in obtaining access to the objective goals.
This test should simulate an actual white-box penetration test with Proof of Concept and how you would start from beginning to end, including the overall report.

## Requirements

The student will be required to fill out this exam documentation fully and to include the
following sections:

- Methodology walkthrough and detailed outline of steps taken
- Each finding with included screenshots, walkthrough, sample code, and proof.txt if
applicable.
- Any additional items that were not included

# High-Level Summary

I was tasked with performing a white-box penetration test towards Offensive Security Exam.
A white-box penetration test is sifting through the massive amount of data available to identify potential points of weakness.
The focus of this test is to provide a comprehensive assessment of both internal and external vulnerabilities.
My overall objective was to evaluate the application, identify vulnerabilities, and write automated exploit while reporting the findings back to Offensive Security.

When performing the white-box penetration test, there were several critical vulnerabilities that were identified on Offensive Security's network.
When performing the attacks, I was able to gain access to multiple machines, primarily due to design flaws and implementation errors.
During the testing, I had a shell access to multiple systems.
All systems were successfully exploited and access granted.
These systems as well as a brief description on how access was obtained are listed below:

- 192.168.x.x - app_name - Short summary of the exploit path
- 192.168.x.x - app_name - Short summary of the exploit path

## Recommendations

I recommend patching the vulnerabilities identified during the testing to ensure that an attacker cannot exploit these systems in the future.
One thing to remember is that these systems require frequent patching and once patched, should remain on a regular patch program to protect additional vulnerabilities that are discovered at a later date.

# Whitebox audit

The penetration testing portions of the assessment focus heavily on gaining access to a variety of systems.
During this penetration test, I was able to successfully gain access to **X** out of the **2** systems.

# 192.168.XX.XX - app_name [language]

### Local.txt & Proof.txt

Provide screenshots of Burp and your browser showing a successful login as the administrative user on the actual target machine with the value of local.txt visible.

local.txt: `xxx`

![local.txt](src/placeholder-image-300x225.png)

Provide a screenshot `id` and `ip a` command and the contents of proof.txt.

proof.txt: `xxx`

![proof.txt](src/placeholder-image-300x225.png)

### Debug setup

Provide your debug setup.

## Vulnerability 1 - vulnerability_name

Provide the method and code used to find the vulnerability 1.

## Vulnerability 2 - vulnerability_name

Provide the method and code used to find the vulnerability 2.

## Vulnerability X - vulnerability_name

Provide the method and code used to find the vulnerability X.

## Steps of exploit writing

Provide a detailed account of your methodology in creating the exploits. The steps taken
should be able to be easily followed and reproducible if necessary.

## PoC Code

To install the dependencies required for PoC execution:

```default
$ package_manager install dependency1 dependency2
```

Provide the final proof of concept code used to gain access to the server.

```ruby
#!/usr/bin/env ruby

puts 'My best PoC'
```

# 192.168.XX.XX - app_name [language]

### Local.txt & Proof.txt

Provide screenshots of Burp and your browser showing a successful login as the administrative user on the actual target machine with the value of local.txt visible.

local.txt: `xxx`

![local.txt](src/placeholder-image-300x225.png)

Provide a screenshot `id` and `ip a` command and the contents of proof.txt.

proof.txt: `xxx`

![proof.txt](src/placeholder-image-300x225.png)

### Debug setup

Provide your debug setup.

## Vulnerability 1 - vulnerability_name

Provide the method and code used to find the vulnerability 1.

## Vulnerability 2 - vulnerability_name

Provide the method and code used to find the vulnerability 2.

## Vulnerability X - vulnerability_name

Provide the method and code used to find the vulnerability X.

## Steps of exploit writing

Provide a detailed account of your methodology in creating the exploits. The steps taken
should be able to be easily followed and reproducible if necessary.

## PoC Code

Provide the final proof of concept code used to gain access to the server.

To install the dependencies required for PoC execution:

```default
$ package_manager install dependency1 dependency2
```

```ruby
#!/usr/bin/env ruby

puts 'My best PoC'
```

# Additional Items

This section is placed for any additional items that were not mentioned in the overall report.

## Appendix - Proof.txt, Local.txt, and Machines summary

Key | Machine 1
-------------------|-----------------------------------
IP (Hostname) | 192.168.x.x
Name | app_name
Language | x
Local.txt Contents | `xxx`
Proof.txt Contents | `xxx`

Key | Machine 2
-------------------|-----------------------------------
IP (Hostname) | 192.168.x.x
Name | app_name
Language | x
Local.txt Contents | `xxx`
Proof.txt Contents | `xxx`

0 comments on commit 8e95f36

Please sign in to comment.