Share
## https://sploitus.com/exploit?id=92E37CFA-C10B-54BF-827E-A612937630C7
# π‘οΈ qub-network-security-cve-2023-20198
**Analysis, detection, and mitigation of CVE-2023-20198 exploitation in Cisco IOS XE**
π _Queenβs University Belfast β CSC3064 Network Security Assessment_
---
## π Assessment Overview
This project involves analyzing PCAP files provided by Fox-IT to:
- Identify Indicators of Compromise (IOCs)
- Demonstrate exploitation using custom-crafted packets
- Apply Snort IDS/IPS and iptables-based network security countermeasures
---
## π Repository Structure
- `Slides/` β Presentation slides used in the video submission
- `IOC Summary/` β Detailed breakdown of all network-level Indicators of Compromise
- `Snort Rules/` β Alert and drop rules implemented in Snort, with visual proof
- `Assessment PDF/` β Official CSC3064 assessment instructions from QUB
- `Video/` β Demo presentation video (uploaded separately and linked below)
---
## Final IOC Summary
| **IOC Type** | **IOC Observed** | **What It Confirms** |
|-------------------|---------------------------------------------------------------------------|----------------------------------------------------------|
| **IP Patterns** | Attacker: `10.10.1.1`, `10.10.0.1`<br>Victims: `10.10.1.69`, `10.10.1.42` | Attack source and target devices identified |
| **Headers** | `User-Agent: Mozilla/5.0...`<br>`Priv-Level: 15` | Browser impersonation and privilege escalation |
| **Protocols** | TCP, HTTP (port 80), SOAP/XML | Exploitation of WSMA over unencrypted HTTP |
| **Payloads** | `execCLI` and `username cisco_support` | Remote command execution and backdoor creation |
| **TCP Behavior** | SYN, ACK, FIN (normal sequence) | Indicates stealthy, non-DoS targeted behavior |
| **Ports Used** | Port 80 (no HTTPS) | Sensitive traffic sent in plaintext |
---
## π Snort Rules Used
π See [`Snort_Rules.txt`](Snort%20Rules/Snort_Rules.txt) for all implemented rules.
Rules cover:
- Detection and prevention of `execCLI`, backdoor account creation, admin login attempts, and privilege escalation.
πΌοΈ Screenshot:

---
## Demonstration Highlights
- Simulated attack traffic with `hping3`
- Applied Snort IDS rules (alert-only) and IPS rules (packet blocking)
- Configured `iptables` to allow safe traffic and drop malicious packets
- Validated effectiveness using Wireshark on VM environment (via UTM on macOS)
---
## π₯ Video Presentation
πΊ **[Watch the full demo on YouTube](https://youtu.be/Pd3sRbPnEKQ)**
_(Unlisted β accessible only via this link)_
---
## π€ Author
**Dominicus Adjie Wicaksono**
Student ID: 40352799
π§ dominicadjiew@gmail.com
π [LinkedIn](https://www.linkedin.com/in/dominicusadjie)