Social engineering
During this social engineering engagement, it was possible to achieve persistent internal access, exfiltrate confidential and personal information, and compromise the internal segmented infrastructure.
The penetration testing team was tasked with segmentation testing for a sample of the customer's private subnet (both CDE, DMZ, and management subnets). The project required onsite testing, which was not possible with the time constraints of the project (approx. 2 days) and quarantine measures in the Customer's country.
The team created and mailed the customer mobile connect-back jumphosts that was later used to establish initial access, conduct network reconnaissance, and discover network and service-level vulnerabilities that may break segmentation.
Several mobile jumphosts was created that connected back to our infrastructure over VPN. These were installed in every sampled subnet in scope.
After network access was established, traffic inspection and various types of network scanning were conducted to collect information about the networking setup.
Broadcast network traffic was analyzed, and exploitable endpoint and router configurations were identified that could allow for MitM attacks (e.g. NBNS poisoning, DHCPv6 poisoning, or abusing dynamic routing protocols).
A tunnel from segmented portions of the network was built to the Internet utilizing various techniques to highlight segmentation errors.
Despite segmentation testing not being that impressive from a technical perspective, this case demonstrates client accommodation and rapid problem solving that Tenendo is known for. When working with us, you can be sure that we come up with an easy solution to any project constraints or specific requirements that you might have. We are very flexible both with scheduling, and our penetration testing approach.
During this social engineering engagement, it was possible to achieve persistent internal access, exfiltrate confidential and personal information, and compromise the internal segmented infrastructure.
Tenendo specialists discovered an unattended staging environment and leveraged its vulnerabilities for sensitive information disclosure. This information was later reused in an attack against the main application, that allowed us access to the payment API on behalf of other customers of our Client.
The Azure penetration test helped the client identify and remediate multiple issues and misconfigurations, harden their infrastructure and calculate potential risks.