BYU-ITC-515R-ACT

Lab 9: Hardening

Scenario

Welcome to Apex Innovations! We are a leading provider of advanced cybersecurity solutions and digital transformation services for businesses worldwide. Our mission is to protect organizations from evolving cyber threats while enabling them to innovate and grow in a secure environment. With a dynamic team of experts and cutting-edge technologies, Apex Innovations empowers clients to stay one step ahead in an increasingly complex digital landscape.

As a newly hired Security Analyst, you’ve been assigned to secure our flagship project server, which will serve as the backbone for our ongoing development efforts. This server will host critical information for both our internal teams and high-profile clients. Due to recent security breaches, there’s a possibility that the server has been compromised by malicious actors. Your predecessor left under mysterious circumstances, and it’s unclear whether the system was fully cleared of any threats. It’s now your responsibility to identify and eliminate any hidden vulnerabilities, malware, or unauthorized access points that may remain, ensuring that no sensitive client or corporate data is put at risk.

The stakes are high as Apex Innovations’ reputation is on the line. The breach could be the work of a competitor trying to sabotage the company or a former insider seeking revenge. With advanced tools and persistent attackers out there, you must act swiftly to secure the system. Your job is to restore confidence in the integrity of the server, keep an eye out for any signs of further compromise, and ensure that everything is locked down before transferring any high-value data.

Be vigilant—every move counts and the attackers may be closer than you think!

Rules

Users

Controlling who can access a system and what they can do with that access is crucial to security. We don’t want any former employees logging in and we also don’t want users with admin access when they don’t need it. You will need to add any users that should be there and then modify and delete any if needed. When adding users, make their username firstnamelastname. For example, if you were creating an account for John Smith the username would be johnsmith. Capital letters are not permitted in usernames. We also want our user’s passwords to be secure.

Authorized Users

  1. Ethan Brooks
  2. Olivia Carter
  3. Mason Davis
  4. Ava Johnson
  5. Lucas Miller
  6. Sophia Martinez
  7. James Wilson
  8. Isabella Taylor
  9. William Anderson
  10. Mia Thomas
  11. blueteam
  12. blackteam

Services

If these services are working, you will receive points for it, but if it goes down, you will lose those points until it works again.

FTP

All FTP scoring users must be able to log in, read, and write files. The files must keep the same file hash to be considered correct. The hash for the users is $6$mWgVY9GDGccWAPPX$v7kDifzlJyTiqrHycaZyLw3u7NAmR.UZMG/x5ZuoiOC60sE6AyWuI3gEzA8zAjvqCOcLADGqXSFjyTyRGLlls0.

SSH

UFW

Guidelines

Grading Table

Criteria Pass Merit Distinction
System Commands P1: Restore basic user-level system commands to correct functionality. M1: Restore system-level binaries to correct functionality. D1: Fully restore all command functions.
Scheduled Tasks P2: Review and remove obvious malicious scheduled tasks. M2: Identify and remove condition-based automated tasks. D2: Review and remove deeply embedded malicious system tasks.
Update and Package Management P3: Update and upgrade packages. M3: Remove restrictions on firewall installation.  
Firewall and Network Security   M4: Install a firewall and configure it to block malicious traffic.  
User and Group Management P4: Remove obvious malicious users and secure legitimate users. M5: Identify and remove hidden malicious users. D3: Implement secure user password and hashing policies.
SSH Security P5: Configure secure SSH settings, allowing legitimate users to use their SSH keys. M6: Remove malicious SSH settings and configurations. D4: Terminate and block malicious SSH sessions.
Malicious Programs and Software P6: Remove any bind or reverse shells. M7: Identify and remove password loggers. D5: Find the rest of the malicious threats.
Folder and File Permissions P7: Ensure critical files have correct permissions.    
FTP Security P8: Configure secure FTP settings and allow users to access the FTP server M8: Restrict access to users or groups.  
Verbal Pass Off P9: Successfully answer two pass-off questions chosen by the TA.    

Pass Off Questions

You will be asked two of these questions at random during your verbal pass-off.

  1. What steps did you take to restore basic user-level system commands?
  2. How did you identify and restore system-level binaries to their correct functionality?
  3. What process did you follow to ensure all command functions were fully restored?
  4. What criteria did you use to identify and remove obvious malicious scheduled tasks?
  5. How did you detect and remove condition-based automated tasks from the system?
  6. What approach did you use to identify and remove deeply embedded malicious system tasks?
  7. What steps did you take to update and upgrade the system packages?
  8. How did you address restrictions preventing firewall installation?
  9. What firewall configurations did you implement to block malicious traffic?
  10. How did you identify and remove malicious users from the system?
  11. What methods did you use to ensure legitimate users were properly secured?
  12. How did you identify hidden malicious users on the system, and how were they removed?
  13. What password and hashing policies did you implement to secure user accounts?
  14. How did you configure secure SSH settings to allow legitimate users to use their SSH keys?
  15. What malicious SSH settings did you remove from the system, and how?
  16. How did you terminate and block malicious SSH sessions on the server?
  17. What steps did you take to identify and remove bind or reverse shells from the system?
  18. How did you identify and remove password loggers from the server?
  19. What malicious threats did you find and remove from the system?
  20. How did you ensure that critical files had the correct folder and file permissions?

Grading: