In our Virtual Network, we use a Kali Linux computer to exploit vulnerabilities in a Windows and an Ubuntu computer. We spoof a network and perform ARP poisoning, risky executables, and password attacks to discover, download, and disrupt operations of our target machines.
In the man-in-the-middle attack, led by Charles,we placed ourselves between the victim and their destination by using a method called ARP poisoning. We corrupted the MAC-to-IP traffic so we were able to capture the victim's traffic.
Next, with Katherine at the wheel, we delivered and ran an executable on a target machine that secretly gave us access to the computer through a reverse shell. With this reverse shell, we discovered system information, traversed their directories, and stole and deleted their files.
Last, Nikolai ran the show as we took advantage of the weak hash and poor security of the location the credentials were stored in through brute-forcing of directories as well as passwords combined with a dictionary attack. We then escalated privilege by leveraging it against the configurations set in the victim machine.
This project was made possible by the brilliance and hard work of the team members, the guidance of our instructor Nathan Shellenbarger, and the Cyber Bootcamp provided by Caltech and Fullstack Academy. We also thank our families for listening to us talk through six months worth of cybersecurity assignments, demonstrating real or pretended fascination for our project, and making sure we ate during long classes.