I thought it was pretty clear. They had already developed a Sonic Wall VPN exploit. They used zmap to scan for vulnerable devices then grepped the hostnames for "bank". When they exploited the VPN it gave them the whole network.
>In this case, on the other hand, it was the same Windows domain passwords that were used to authenticate against the VPN, so I could get a good user password, including that of the domain admin. Now I had full access to his network
To me, the scary part about this is: After Equifax, this is another big hack... and practically, it's one layer of defense and that's it. Shellshock, one password, everything's fucked. And yes, expletives are appropriate there. The rest is largely access maintenance, keyloggers and execution.
That's scary. Maybe I'll need to badger my boss about a serious pentest of everything.
Dude, forget a pentest, have a security architect look things over. Simple segmentation and endpoint firewall witha good edr might have stopped this. Everyone misses the basics, a lot of networks were pieced together 10+ years ago when people were not as security conscious as they are now.
Our first pen test, before I took over as CTO... We had a JSON file with admin credentials on a shared drive. IT company needed it there so some tool could log in as admin and do some robot work.
Fired them, and good riddance. But... STUPID SIMPLE things can get overlooked for years until you have someone else come in and test.
For sure, I wasn't disagreeing. I meant have someone look at your architecture and make sure best practices are followed and insane designs don't exist before you pay for a pentester . pentest results can be used to adjust architecture but a pentester will show you one or a few ways they acheived the objective, they won't do a hollistic review of architecture,procedures,practices,etc...
Why would anyone get fired, explicit approval and imppicit incompetence should be handled differently. If pentests get people fired, no one wants a pentest. Refusing to accept and resolve pentest results can be fireable but a pentest is suppose to help you improve what you have already.
>In this case, on the other hand, it was the same Windows domain passwords that were used to authenticate against the VPN, so I could get a good user password, including that of the domain admin. Now I had full access to his network