AIG Insurance
Completed a job simulation involving the role of a cybersecurity generalist, specializing in cybersecurity.
Completed a cybersecurity threat analysis simulation for the Cyber Defense Unit, staying updated on CISA publications.
Researched and understood reported vulnerabilities, showcasing analytical skills in cybersecurity.
Drafted a clear and concise email to guide teams on vulnerability remediation.
Utilized Python skills to write a script for ethical hacking, avoiding ransom payments by bruteforcing decryption keys.
Task 1 - Responding to a zero-day vulnerability
The CISA has recently published the following two advisories:
The first advisory (Log4j), outlines a serious vulnerability in one of the world’s most popular logging software.
The second advisory explores how ransomware has been increasing and is becoming professionalized - a concern for a large company like AIG.
Your task is to respond to the Apache Log4j zero-day vulnerability that was released to the public by advising affected teams of the vulnerability.
First, conduct your research on the vulnerability using the “CISA Advisory" resources provided above as a starting point.
Next, analyze the “Infrastructure List” below to find out which infrastructure may be affected by the vulnerability, and which team has ownership.
Product Team
Product Name
Team Lead
Services Installed
IT
Workstation Management System
Jane Doe (tech@email.com)
OpenSSH dnsmasq lighttpd
Product Development
Product Development Staging Environment
John Doe (product@email.com)
Dovecot pop3d Apache httpd Log4j Dovecot imapd MiniServ
Marketing
Marketing Analytics Server
Joe Schmoe (marketing@email.com)
Microsoft ftpd Indy httpd Microsoft Windows RPC Microsoft Windows netbios-ssn Microsoft Windows Server 2008 R2 - 2012 microsoft ds
HR
Human Resource Information System
Joe Bloggs (hr@email.com)
OpenSSH Apache httpd rpcbind2-4
Task 2 - (Technical) Bypassing ransomware
from zipfile import ZipFile, BadZipFile
import sys
# Method to attempt extraction of the zip file with the given password
def attempt_extract(zf_handle, password):
try:
zf_handle.extractall(pwd=password.strip()) # Passwords need to be bytes in Python 3
print(f"[+] Password found: {password.decode('utf-8')}")
return True
except (RuntimeError, BadZipFile): # Handles wrong password or invalid zip file issues
return False
def main():
print("[+] Beginning brute force attack")
# Open the zip file
try:
with ZipFile('enc.zip') as zf:
# Open the rockyou.txt file containing the list of passwords
with open('rockyou.txt', 'rb') as f:
for password in f:
password = password.strip() # Remove any extra whitespace or newline characters
if attempt_extract(zf, password):
print("[+] Password successfully extracted!")
return # Exit after successful extraction
else:
print(f"[-] Attempt failed with password: {password.decode('utf-8')}")
except FileNotFoundError:
print("[-] The enc.zip or rockyou.txt file was not found. Please ensure they are in the same directory.")
except Exception as e:
print(f"[-] An error occurred: {e}")
print("[+] Password not found in the list")
if __name__ == "__main__":
main()
Last updated