Contact us: info@tenendo.com
The Challenge
The assumed breach scenario tested infrastructure security by simulating insider threats. Major weaknesses included 2FA absence, weak endpoint security, and poor segmentation.
The Solution
- Enforced 2FA on VPN and O365 to block unauthorized access.
- Improved AD security by restricting certificate services.
- Strengthened endpoint hardening using CIS benchmarks.
How we did it
- Exploited open VPN access and AnyDesk admin controls.
- Used DCSync & Shadow Credentials for privilege escalation.
- Performed lateral movement through SMB pivots.
Conclusion
The engagement revealed weak security configurations, which allowed for undetected privilege escalation. Network segmentation and MFA were prioritised for mitigation.