Skip to content

Richifa/ExampleCorp-Vulnerability-Assessment-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” ExampleCorp Vulnerability Assessment Project

πŸ›‘οΈ Ethical Hacking & Penetration Testing Report

This repository contains the comprehensive vulnerability audit and exploitation walkthrough conducted on the ExampleCorp target environment, as part of a cybersecurity ethical hacking assessment. The audit involved scanning, exploiting known vulnerabilities (CVE-2017-12635 & CVE-2017-12636), analyzing phishing campaign results, and compromising a web application using OSINT.

πŸ“ Project Structure

πŸ“‚ ExampleCorp-Audit/ β”œβ”€β”€ πŸ“Š Reports/ β”‚ β”œβ”€β”€ Final_Penetration_Report.pdf β”‚ └── CVSS_Score_Analysis.xlsx β”œβ”€β”€ πŸ“Έ Screenshots/ β”‚ β”œβ”€β”€ Nessus/ β”‚ β”œβ”€β”€ Nmap/ β”‚ β”œβ”€β”€ Exploits/ β”‚ └── OSINT/ β”œβ”€β”€ πŸ’» Exploits/ β”‚ β”œβ”€β”€ CVE-2017-12635_exploit.json β”‚ └── CVE-2017-12636_payload.py β”œβ”€β”€ πŸ“¦ Phishing_Credentials/ β”‚ └── Compromised_Accounts.csv β”œβ”€β”€ πŸ”’ backdoor.php └── README.md

πŸ§ͺ Technologies Used

  • Nessus – Vulnerability scanning
  • Nmap – Port and service discovery
  • Metasploit – CVE exploitation
  • SQLite – Phishing results parsing
  • Curl – CouchDB verification
  • Linux (Kali) – Attack OS

🚨 CVE Exploits

  • CVE-2017-12635
    Improper validation of JSON fields in Apache CouchDB allowed the creation of unauthenticated admin accounts.

  • CVE-2017-12636
    Command injection in CouchDB allowed remote code execution as the CouchDB user.

πŸ“Œ Key Findings

  • Ubuntu 16.04 system past end-of-life with critical Apache/CouchDB vulnerabilities
  • Apache server exposed sensitive internal structure via /server-status
  • At least 10 credentials successfully harvested from phishing database
  • OSINT revealed whitelisted paths and firewall exceptions, aiding exploitation
  • Full administrative access was obtained through CVE chaining

🧠 Lessons Learned

This audit reinforces the critical importance of:

  • Regular patching & CVE monitoring
  • Network segmentation and internal IP masking
  • Properly configured WAF and access controls
  • Monitoring for phishing and credential reuse

βœ… Requirements Met

  • βœ… Nessus & Nmap scans
  • βœ… CVSS v3.0 scores with Temporal & Environmental vectors
  • βœ… Exploit walkthroughs for CVE-2017-12635 and CVE-2017-12636
  • βœ… OSINT-based compromise and web app abuse
  • βœ… β‰₯10 Phishing credentials extracted from database

πŸ“Ž References

πŸ‘€ Author

Jamilu Ibrahim Richifa
Cybersecurity Enthusiast | Ethical Hacker | Open-Source Contributor
πŸ“« Connect on LinkedIn

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors