Thank you for your interest in Decoding the Attacker Mindset: Pen Testing Revelations!

Download the PDF by clicking the button or read the full guide below.

Image
decoding-attacker-mindset

The strength of proactive security practices lies in their ability to show organizations what their environments look like through the eyes of an attacker. Through efforts like penetration testing, we can extract insights by observing the tactics, techniques, and procedures of cybercriminals to identify potential risk. Ultimately, this perspective enables us to direct our security resources towards genuine points of vulnerability – areas that might be exploited by malicious actors. By embracing this mindset and consistently challenging our own security measures, we can build a more resilient and responsive cybersecurity posture that anticipates and better prepares for the movements of modern attackers. 

In this guide, we will take a deeper dive into five different scenarios based on real penetration testing engagements. Walking through these scenarios will illustrate the circuitous paths attackers may take, better demonstrating how seemingly benign weaknesses can prove to be just what they need to move forward. 

Scenario 1: From a Simple Password Spray Attack to Active Directory Access

Step 1: Conducting External Recon

During the information gathering stage of this exercise, the team observed that the target organization exposed two HTTPS services: Microsoft Exchange Server and Citrix Portal. An attacker would likely make the following assumptions: 

  1.  All logins authenticate against the same LDAP directory, which may be the main active directory in an organization. (One thing worth noting is that LDAP services are commonly directly exposed to the internet, despite it not being a security best practice. Organizations sometimes choose to allow the exposure of the LDAP service in order to interact with a third-party service. In this scenario, the LDAP was not directly exposed.) 
  2. There is no other authentication scheme in place to provide additional security. Without measures like two-factor authentication in place, a valid set of credentials would provide access to the identified services.

Scenario 2: How Printer Passwords Can Be the Path to Control

Step 1: Finding an Unusual Attack Vector

Printers are often overlooked when it comes to security, even though organizational printers are typically integrated into an organizational network, interacting with or exposing different services like FTP, SMB, or SMTP. For example, a user can use a printer to scan a document and email it to themselves or save it to a file server. To accomplish this, many organizations provide such devices with corporate domain credentials—for example, it could be given the username “printer1” and a password, “printprintprint.” Unfortunately, printers are sometimes only configured during the initial setup and then left behind, frequently going without updates and patching. This makes printers an ideal place to attempt an initial breach. 

In this engagement, pen testers sought and discovered two printers that possessed domain credentials and exposed certain HTTP SOAP API on TCP ports. Any user with administrative privileges or administrative credentials for the printer was able to interact with the server, allowing the pen testers to extract configured FTP and SMB usernames and passwords. This turned up three different sets of credentials, including a disabled domain user account.  

Scenario 3: The Broken Link within the Supply Chain

Step 1: Gathering Intelligence and Initial Access Points

For this external penetration test, The team began by mapping the attack surface, analyzing the environment to see if they could find any outward facing web applications or other points of entry that required a login. 

They also began gathering intelligence on the organization using open-source intelligence (OSINT) including Google, LinkedIn, and Bing to find the names of current employees and figure out potential naming conventions of user logins. For example, if an employee Bob Vance’s email address was [email protected], this could mean that firstinitial.last name is the formula for designating user logins. They also searched for public leaks of credentials to see if any were associated with logins from the Decoding the Attacker Mindset: Pen Testing Revelations organization. Ultimately, the team discovered 1500 potential usernames/email addressees. 

Upon completion of the attack map analysis, they found that, at least externally, the organization was relatively secure. There were only two points of interest that were worth exploring further: a Citrix portal and an LDAP directory web application. 

Scenario 4: Why Old Vulnerabilities Should Not Be Left Behind

For this internal pen test, the team was provided with low privilege access to the internal network and domain through a VPN connection and domain credentials.

Step 1: Understanding PCI DSS

Since this penetration test was done to adhere to PCI DSS, the team was provided with a virtual desktop that was within the PCI scope. PCI requires that segmentation be enforced between PCI and non-PCI environments. This means there is a distinct separation between systems that have cardholder data (CHD) and those that do not. Systems that are in scope should not be able to communication with out of scope systems in any way. Since segmentation controls were in place, this test consisted of observing two different and isolated domains (one PCI, and one non-PCI) with different servers and computers in separated networks.

Scenario 5: Too Much Focus on the External Leaves the Internal Exposed

In this final scenario, the pen testing team was tasked with conducting an external pen test to see if they could gain access to an organization with a relatively small infrastructure. 

Step 1: Making Multiple Attempts to Gain a Foothold

Initially, the team was going to use Responder, an open-source tool typically used to intercept and manipulate network traffic by posing as legitimate servers. However, from their network segment, they were unable to see any LLMNR (Link-Local Multicast Name Resolution), NBT-NS (NetBIOS Name Service), and MDNS (Multicast DNS) traffic. This meant Responder was not an option. 

The second attempt at a breach was also unsuccessful. The team performed a vulnerability scan on the network, but there were no software instances with vulnerabilities. There may have been vulnerabilities elsewhere in the environment, but none were available to the team from an external perspective. 

Undeterred, the team turned to open-source intelligence methods to gather a list of potential usernames. They attempted to use a password spraying attack to identify valid accounts and gain credentials. From there, they attempted to use AS-REP Roasting so they could extract hashes and derive passwords. However, AS-REP Decoding the Attacker Mindset: Pen Testing Revelations Roasting only works with accounts that have preauthentication disabled, and none of the accounts did. 

Understanding the Penetration Testing Process

Text

The scenarios outlined above could have easily been newsworthy attacks. Fortunately, they played out during pen testing engagements. These companies were able to uncover and rectify these security gaps before these scenarios went from hypothetical to reality. Taking a proactive stance allows organizations to not only strengthen defenses and security controls, it also serves to foster a culture of continuous improvement.  

While the final report and findings of pen tests are valuable, seeing the step-by-step process provides organizations with new insights into potential attack vectors. This deeper understanding of attack methodology may inspire companies to take a closer look at their own security behavior. By embracing a process oriented approach to security assessments, companies can better anticipate attacks and prepare for the cyber challenges to come.

Ready to Begin Using Core Impact?

Get the process started with a precise quote for your specific business needs.

REQUEST A QUOTE