0% found this document useful (0 votes)
116 views57 pages

RedSiege Sample Report 2024

The document summarizes the results of a security assessment of Nakatomi Trading Corp's network. It identifies several critical vulnerabilities found through external and internal penetration testing, web application testing, assumed breach testing, and social engineering. These issues put Nakatomi's network and data at risk if not addressed.

Uploaded by

ledava1040
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views57 pages

RedSiege Sample Report 2024

The document summarizes the results of a security assessment of Nakatomi Trading Corp's network. It identifies several critical vulnerabilities found through external and internal penetration testing, web application testing, assumed breach testing, and social engineering. These issues put Nakatomi's network and data at risk if not addressed.

Uploaded by

ledava1040
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

Sample Penetration Test

FINAL REPORT

Nakatomi Trading Corp

July 15, 1988

Project: 313371337

Document Version: 1.0


Table of Contents
Executive Summary.................................................................................................................................................................... 4
External Findings Summary..................................................................................................................................................... 6
Internal Findings Summary ..................................................................................................................................................... 6
Web Application Findings Summary ................................................................................................................................... 6
Assumed Breach Findings Summary ................................................................................................................................... 7
Social Engineering Findings Summary ................................................................................................................................ 7
Findings Classifications ............................................................................................................................................................. 8
External Penetration Test Findings ....................................................................................................................................... 9
Critical Risk Findings ............................................................................................................................................................. 9
Finding-01 Weak Password Policy ...................................................................................................................... 9
High Risk Findings ................................................................................................................................................................ 11
Medium Risk Findings ......................................................................................................................................................... 11
Finding-02 Low Risk Findings Directory Indexing ........................................................................................... 11
Internal Penetration Test Findings ...................................................................................................................................... 13
Critical Risk Findings ........................................................................................................................................................... 13
High Risk Findings ............................................................................................................................................................... 13
Finding-03 LLMNR and NBNS Poisoning .........................................................................................................13
Medium Risk Findings ........................................................................................................................................................ 17
Finding-04 SMB Null Sessions Enabled.............................................................................................................17
Low Risk Findings ................................................................................................................................................................. 18
Web Application Findings ..................................................................................................................................................... 19
Critical Risk Findings ........................................................................................................................................................... 19
Finding-05 Unpatched Software ........................................................................................................................19
High Risk Findings ............................................................................................................................................................... 21
Finding-06 Cross-Site Scripting ..........................................................................................................................21
Medium Risk Findings ....................................................................................................................................................... 23
Finding-07 HSTS Not Enabled ........................................................................................................................... 23
Low Risk Findings ................................................................................................................................................................ 24
Assumed Breach Findings .....................................................................................................................................................25
Critical Risk Findings .......................................................................................................................................................... 25
High Risk Findings .............................................................................................................................................................. 25
Finding-08 Excessive Administrator Permissions ........................................................................................... 25
Medium Risk Findings ....................................................................................................................................................... 27

Page 2
Low Risk Findings ................................................................................................................................................................ 27
Informational Findings ...................................................................................................................................................... 27
Finding-09 PowerShell Version 2 Available..................................................................................................... 27
Social Engineering Findings ..................................................................................................................................................29
Critical Risk Findings .......................................................................................................................................................... 29
Finding-10 Successful Pretext Call .................................................................................................................... 29
High Risk Findings .............................................................................................................................................................. 29
Medium Risk Findings ....................................................................................................................................................... 29
Low Risk Findings ................................................................................................................................................................ 29
External Penetration Test Methodology ...........................................................................................................................30
Internal Penetration Test Methodology............................................................................................................................33
Web Application Penetration Test Methodology ..........................................................................................................37
Assumed Breach Test Methodology ................................................................................................................................. 44
Social Engineering Methodology....................................................................................................................................... 49
Appendix .....................................................................................................................................................................................52
Personnel ............................................................................................................................................................................... 52
Scope ...................................................................................................................................................................................... 53
Finding Categories.............................................................................................................................................................. 54
Table of Figures ................................................................................................................................................................... 55

Page 3
Executive Summary
Synopsis • Red Siege identified a web application using a
Red Siege experts evaluated the security of critically vulnerable version of the Spring
Nakatomi Trading Corp's network during a Framework software. Multiple vulnerabilities
three-week period in July 1988. The goal of the have been demonstrated in the software.
assessment was to identify security vulnerabilities Exploitation by an attacker would lead to high-
in Nakatomi's systems and services. All issues privilege access to the host.
identified by Red Siege have been manually • Red Siege identified account
verified and exploited (where applicable) to misconfigurations for one user intended to be
demonstrate the underlying risk to Nakatomi, its a low privileged account. The user was
employees, and clients. assigned domain administrator privileges
granting access to all of Nakatomi’s internal
Findings Overview
network assets.
Findings grouped by risk severity:
• Red Siege successfully performed a social
Critical Risk issues 3 engineering attack against Nakatomi that
High Risk issues 3 resulted in a help desk employee performing
Medium Risk issues 2
an unauthenticated password reset of a
Low Risk issues 1
Nakatomi employee account.
Informational issues 1
• Red Siege found significant shortcomings in
Key Findings defenses and secure coding related to a
Red Siege found a critical vulnerability related to common web related attack known as cross-
unpatched software on an external facing web site scripting (XSS). This type of attack allows a
server which allows an attacker to remotely malicious actor to use the website to attack
access systems and could lead to internal visitors, which could expose personally
compromise. Red Siege also found a critical identifying information, authentication
vulnerability related to a weak password policy. A credentials, or even compromise the victim's
weak password policy allows an attacker to easily computer.
guess or crack passwords of Nakatomi users.
Red Siege identified the following positive
Additionally, Red Siege found three high severity
findings in the environment and recommends
vulnerabilities that have the potential to impact
continued support for these strategies:
users to Nakatomi's website and public facing
website which could impact Nakatomi's brand • Attack visibility. Nakatomi’s use of logging
and reputation. and monitoring tools gave Nakatomi
employees visibility into attack activity
• Red Siege identified several weak Active
generated by Red Siege during the test.
Directory passwords. An attacker could easily
• Prompt response by the security team. The
guess or crack these passwords, leading to
Nakatomi security team rapidly responded to
further access or escalation of privileges.
alerts generated by Red Siege and promptly

Page 4
removed the affected host from the network. • Implement data allow-listing. Data sent from
If there were a real breach, the dwell time for a user to the webserver should always be
the attacker would be reduced. treated as potentially malicious. Developers
should identify the data expected by the
Strategic Recommendations
application and disallow characters that are
To increase the security posture of Nakatomi,
invalid.
Red Siege recommends the follow strategic
actions be taken:
• Provide Social Engineering training.
• Review patching policies and procedures. Nakatomi should provide social engineering
Nakatomi should review policies and training to all levels of employees. This training
procedures concerning patching and ensure should include information regarding the risks
systems are updated regularly. presented by phishing and other forms of
• Strengthen password requirements. social engineering including phone-based and
Nakatomi should use technical means to ban QR code attacks.
known bad/weak passwords and train users on
Red Siege would like to thank Nakatomi for the
safe password practices.
opportunity to work on this project. Should you
have any questions regarding these findings or
the contents of this report, please feel free to
contact us.

Page 5
External Findings Summary
Finding-01 Weak Password Policy
Critical Risk Authentication

Finding-02 Low Risk Findings Directory Indexing


Low Risk Configuration Management

Internal Findings Summary


Finding-03 LLMNR and NBNS Poisoning
High Risk Configuration Management

Finding-04 SMB Null Sessions Enabled


Medium Risk Authentication

Web Application Findings Summary


Finding-05 Unpatched Software
Critical Risk Patch Management

Finding-06 Cross-Site Scripting


High Risk Data Validation

Finding-07 HSTS Not Enabled


Medium Risk Configuration Management

6
Assumed Breach Findings Summary
Finding-08 Excessive Administrator Permissions
High Risk Permissions and Access Control

Finding-09 PowerShell Version 2 Available


Informational Configuration Management

Social Engineering Findings Summary


Finding-10 Successful Pretext Call
Critical Risk Phone-Based Social Engineering

7
Findings Classifications
Each vulnerability or risk identified has been labeled as a Finding and categorized as a Critical Risk, High
Risk, Medium Risk, Low Risk, or Informational, which are defined as:

Critical Risk Issues


These vulnerabilities should be addressed as soon as possible as they may pose an immediate danger to
the security of the networks, systems, or data.

Exploitation does not require advanced tools or techniques or special knowledge of the target.

High Risk Issues


These vulnerabilities should be addressed promptly as they may pose a significant danger to the security
of the networks, systems, or data.

The issue is commonly more difficult to exploit but could allow for elevated permissions, loss of data, or
system downtime.

Medium Risk Issues


These vulnerabilities should be addressed in a timely manner.

Exploitation is often difficult and requires social engineering, existing access, or exceptional circumstances.

Low Risk Issues


The vulnerabilities should be noted and addressed at a later date.

These issues offer little opportunity or information to an attacker and may not pose an actual threat.

Informational Issues
These issues are for informational purposes only and likely do not represent an actual threat.

8
External Penetration Test Findings
Critical Risk Findings
Finding-01 Weak Password Policy

>
Critical Risk Authentication

Observation
Red Siege successfully performed password spraying attacks against the Nakatomi ADFS login portal for
commonly used passwords such as Summer2022!, Password123, etc. The team successfully guessed the
credentials of four separate users, one of which is shown in Figure 1.

Figure 1. Successful Login with Password Spray

Affected Systems
Nakatomi Domain

Description
Strong passwords should be long enough and/or complex enough to deter brute force password
guessing attacks and password cracking attacks1. Advances in GPU technology and the availability of
cloud-based GPU clusters means short passwords can be cracked in little time. When an attacker can gain
access to a password hash, the only effected deterrence against cracking is the use of longer passwords,
such as the use of memorable pass phrases2.

The addition of complexity requirements, such as requiring numbers, case variations, and special
characters, has been found to only add marginal entropy to passwords while making them much harder
to remember. This issue is compounded by a requirement to rotate passwords every few months.
Practically, this means users will select easy-to-guess passwords, such as the season and year (e.g.,
Summer2020) and Password# (Password1, Password2).

1
https://en.wikipedia.org/wiki/Password_cracking
2
https://en.wikipedia.org/wiki/Passphrase

9
Recommendations
Implement a password policy requiring minimum of 15-character passphrases to defend against password
cracking attacks. The National Institute of Standards and Technology (NIST) recommends "against the
use of composition rules (e.g., requiring lower-case, upper-case, digits, and/or special characters)" and
instead recommends the use of longer passphrases consisting of multiple words which are more
memorable to users3.

Use of two-factor authentication for all administrative accounts.

In accordance with the most recent NIST guidance, passwords should not be changed periodically, (e.g.,
every 90 days), but only when there is evidence of a compromise of the password.

When selecting a password, the password should be compared with:

• Breached passwords
• Dictionary words
• Repetitive or sequential characters
• Derivatives of organization name or username

References
Security Mag – Two Factor Authentication

CIS: Critical Control 5 - Controlled Use of Administrative Privileges

NIST Special Publication 800-63: Digital Identity Guidelines FAQ

NIST Special Publication 800-63: Memorized Secret Verifiers

How to Increase the Minimum Character Password Length (15+) Policies in Active Directory

Validation
Nakatomi can validate remediation of this finding by attempting to change the password for a user
account, providing a password that is shorter than the new minimum password length requirement. The
new password should be rejected due to not meeting the length requirement.

3
https://pages.nist.gov/800-63-3/sp800-63b.html#memsecretver

10
High Risk Findings
Red Siege did not identify any high-risk findings during the testing window.

Medium Risk Findings


Red Siege did not identify any medium-risk findings during the testing window.

Finding-02 Low Risk Findings Directory Indexing

< >
Low Risk Configuration Management

Observation
Red Siege identified an external facing browsable web server directory. Browsable directories could leak
confidential information, give attackers access to sensitive resources, or help an attacker understand the
structure of the web application. Figure 2 shows the web directory listing.

Figure 2. Directory Indexing

Affected Systems
http://198.199.82.82/sampleInc/

Description
Directory indexing occurs when a normal index file (index.html, default.aspx, index.php, etc.) is not present
and the server is configured to allow indexing. The web server returns a directory listing of files found in
the directory. This may reveal files not intended to be served publicly, leading to the disclosure of sensitive
information.

Recommendations
Nakatomi should disable directory indexing on affected servers. In instances where indexing is required
or desirable, Nakatomi should ensure all other directories have the appropriate index file.

References
Web Application Security Consortium - Directory Indexing

11
CWE-548: Exposure of Information Through Directory Listing

Validation
Nakatomi can validate remediation by viewing the affected directories with a web browser and ensuring
a directory index is not returned.

12
Internal Penetration Test Findings
Critical Risk Findings
Red Siege did not identify any critical-risk findings during the testing window.

High Risk Findings


Finding-03 LLMNR and NBNS Poisoning

< >
High Risk Configuration Management

Observation
Red Siege was able to exploit LLMNR and NBNS broadcasts to obtain NTLMv2 password hashes from the
network. Figure 3 shows the identification of LLMNR and NBNS traffic using Responder.

Figure 3. LLMNR and NBNS Broadcast Traffic Observed Using Responder

Figure 4 shows an NTLMv2 hash was received from 172.31.2.143 after poisoning a LLMNR/NBNS
broadcast.

Figure 4. NTLM Hash Received via Response Poisoning

Affected Systems
Windows systems

Description
Link-Local Multicast Name Resolution (LLMNR) is a feature of Windows systems which helps a host
identify other hosts on the same subnet when DNS queries fail. This protocol replaced the older NetBIOS
Name Service (NBNS) protocol, which functions in a similar fashion. When either protocol is enabled, if a

13
system tries to resolve a hostname using DNS and the query fails, the system will fall back to LLMNR and
NBNS in attempt to locate the host.

As LLMNR and NBNS queries use network broadcasts, all hosts within the same broadcast domain or
subnet will receive the broadcast. As a result, an attacker on the same local subnet or broadcast domain
can respond, purporting to be the requested host. When this occurs, the host initiating the query creates
an SMB connection to the attacker's system and sends the username and password hash of the initiating
host's current user. This can be stored for offline password cracking.

LLMNR also simplifies SMB relay machine-in-the-middle attacks. In this attack scenario, it is not necessary
for the attacker to perform password cracking as the attacker simply forwards the victim's username and
password hash to an attacker-chosen system. The attacker can execute commands on the target system
in the context of the victim user.

Recommendations
Nakatomi should disable LLMNR on all Windows hosts using Group Policy by setting "Turn off multicast
name resolution" to "Enabled". This setting is located in the Group Policy Editor.

• Local Computer Policy


o Computer Configuration
▪ Administrative Templates
• Network
o DNS Client
▪ Turn off multicast name resolution

Nakatomi should disable NetBIOS Name Service. The following PowerShell command can be run at
system startup time on each Windows machine:
set-ItemProperty
HKLM:\SYSTEM\CurrentControlSet\services\NetBT\Parameters\Interfaces\tcpip* -Name
NetbiosOptions -Value 2

References
Blog: Local Network Attacks: LLMNR and NBT-NS Poisoning Background

Microsoft: Part 6: Scripting WINS on Clients (How to Disable NBNS)

Validation
Nakatomi can verify resolution by reviewing LLMNR and NBNS settings on Windows machines.

14
To verify LLMNR is disabled, use the Group Policy Editor (gpedit.msc) and verify "Turn off multicast
name resolution" is set to "Enabled" as shown in Figure 5.

Figure 5. Disabling LLMNR

To verify NBNS is disabled, locate Ethernet adapter connected to the network in the operating system
Network Properties configuration area, right-click and select Properties. Double-Click on "Internet
Protocol Version 4 (TCP/IPv4)", shown in Figure 6.

Figure 6. Ethernet Adapter Properties (TCP/IPv4 Selected)

15
Click on the "Advanced…" button shown in Figure 7.

Figure 7. Selecting TCP/IP Advanced Options

Verify the "Disable NetBIOS over TCP/IP" radio button is checked as shown in Figure 8.

Figure 8. NetBIOS over TCP/IP Disabled

16
Medium Risk Findings
Finding-04 SMB Null Sessions Enabled

< >
Medium Risk Authentication

Observation
Red Siege identified a system supporting SMB Null Sessions, enabling the extraction of potentially
sensitive information including user and group names. Figure 9 shows the enumeration of information
from a domain controller.

Figure 9. SMB Null Session Enumeration Using enum4linux

Figure 10 shows the enumeration of the Domain Admins group membership

Figure 10. Domain Admin Group Membership

Affected Systems
192.168.3.16

Description
SMB Null Sessions permit access to a system's resources without requiring a username or password. This
can permit an unauthenticated attacker on the network to gather information useful for attacks, such as
enumerating local or domain usernames and groups, shared folders, and password policy details.

17
Recommendations
Nakatomi should disable SMB Null Sessions. Group Policy should be used to distribute a registry
modification to all Window systems. Modify the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Lsa

Add a new DWORD value named RestrictAnonymous with a value data of 1 as shown in Figure 11.

Figure 11. Registry Modification to Disable Null Sessions

References
Microsoft: Null Session Vulnerability

Validation
Nakatomi can validate remediation by reviewing the registry key shown in Figure 11 or using enum4linux.

enum4linux -a dc.clientdomain.com

No data should be enumerated if null sessions are disabled.

Low Risk Findings


Red Siege did not identify any low-risk findings during the testing window.

18
Web Application Findings
Critical Risk Findings
Finding-05 Unpatched Software

< >
Critical Risk Patch Management

Observation
Red Siege identified an application using Spring Framework 5.3.0. This version of the framework is
vulnerable to a critical Remote Code Execution (RCE) exploit 4. RCE can provide attackers with highly
privileged access to the system’s internals, revealing sensitive information as shown in Figure 12. Upon
discovery, Red Siege reached out the Nakatomi's internal teams to remediate this vulnerability.

Figure 12. Successful RCE Attack

Affected Systems
192.168.204.139 (Spring Framework 5.3.0)

Description
Keeping software up-to-date and patching when new vulnerabilities are identified is a core tenet of the
Center for Internet Security Critical Control 3 - Vulnerability Management. This risk is even greater for
vulnerabilities which do not require authentication prior to exploitation.

Recommendations
Nakatomi should apply the most recent security patches to affected software. For end-of-life or
unsupported software, upgrade to current versions supported by the software vendor. Review corporate
patching policies and update accordingly to ensure all software is identified in the corporate software
inventory and security patches are applied in compliance with the corporate patching policy when new
security patches are released.

4
Spring Framework RCE, Early Announcement

19
References
CIS: Critical Control 7 - Vulnerability Management

OWASP: Top 10-2017 A9-Using Components with Known Vulnerabilities

Spring Framework RCE, Early Announcement

Validation
Nakatomi should compare the installed version of software with manufacturer support to ensure the
latest patches are applied.

20
High Risk Findings
Finding-06 Cross-Site Scripting

< >
High Risk Data Validation

Observation
Red Siege identified a cross-site scripting (XSS) vulnerability that allowed the execution of arbitrary
scripting code in end-user web browsers. Red Siege identified the XSS vulnerability in the error response
of the web application as shown in Figure 13.

Figure 13. Successful XSS Attack

Affected Systems
192.168.204.139 – https://redsiege.com/dir/<script>alert(" Red Siege XSS");</script>

Description
Cross-site scripting results from a lack of or failure of input validation in a web server application.
JavaScript or other browser-supported scripting code injected into a HTTP request is reflected to the
browser in the server response and is interpreted as scripting code rather than rendered as web content.
As a result, an attacker can execute arbitrary code in an end-user web browser. XSS attacks can be used
to harvest session cookies and execute arbitrary code in the victim's web browser. Using XSS, an attacker
can install malware on an end-user computer, log all keystrokes entered by the end-user, display
application login forms to phish user credentials, and steal computing resources by installing
cryptocurrency miners.

Recommendations
Nakatomi should use development framework vendor-supplied input validation libraries whenever
possible. Validate all client-supplied input processed by web applications, including HTTP headers, prior

21
to processing. Wherever possible, input validation should be performed using an allow-list approach that
defines the acceptable character set for any given parameter. All other input should be rejected.

Use output encoding to render potentially unsafe characters as HTML entities.

References
OWASP: Cross Site Scripting Prevention Cheat Sheet

Microsoft: Prevent Cross-Site Scripting (XSS) in ASP.NET Core

Validation
Append the <script>alert("Red Siege XSS");</script> to the URL. Review the code of the
response page to ensure that the dangerous code was not reflected into the page.

22
Medium Risk Findings
Finding-07 HSTS Not Enabled

< >
Medium Risk Configuration Management

Observation
Red Siege determined the application web servers in the assessment scope did not implement the HTTP
Strict-Transport-Security5 header, which helps defend against HTTPS downgrade and machine-
in-the-middle attacks. Figure 14 illustrates the lack of the Strict-Transport-Security response
header in a server response.

Figure 14. HSTS Header not Present

Affected Systems
192.168.204.139 – https://redsiege.com/

Description
The HTTP Strict-Transport-Security header prevents the accidental exposure of potentially
sensitive application information over unencrypted channels. The header instructs web browsers to only
interact with the web server using HTTPS. In the event of a downgrade attack 6 or a server
misconfiguration, the web browser will refuse to access the web server over unencrypted HTTP channels.

5
https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security
6
https://en.wikipedia.org/wiki/Downgrade_attack

23
Recommendations
Nakatomi should configure application web servers to include the Strict-Transport-Security
header in all server responses as follows.

Strict-Transport-Security: max-age=31536000;

References
Mozilla Developer Network: Strict-Transport-Security

OWASP: HTTP Strict Transport Security Cheat Sheet

Validation
The presence of the Strict-Transport-Security header can be validated using the PowerShell
console.

Invoke-WebRequest -Uri https://example.tld | Select-Object -ExpandProperty


Headers

The presence of the Strict-Transport-Security header can be validated using curl on Linux systems.
curl -skI https://example.tld | grep -i strict-transport-security

When HSTS is enabled, you should see output similar to that shown in Figure 15.

$ curl -skI https://example.tld


HTTP/1.1 200 OK
Date: Fri, 08 Jun 2018 15:39:45 GMT
Server: Apache
Strict-Transport-Security: max-age=63072000; includeSubdomains;
Last-Modified: Wed, 28 Mar 2018 22:17:10 GMT
Accept-Ranges: bytes
Content-Length: 14968
Vary: Accept-Encoding
Content-Type: text/html

Figure 15. Retrieving Web Server Headers via Curl

Low Risk Findings


Red Siege did not identify any low-risk findings during the testing window.

24
Assumed Breach Findings
Critical Risk Findings
Red Siege did not identify any critical-risk findings during the testing window.

High Risk Findings


Finding-08 Excessive Administrator Permissions

< >
High Risk Permissions and Access Control

Observation
Nakatomi provided Red Siege a low privilege account, Uninteresting.User, that was previously used
by an employee in accounting. Red Siege found the account was granted domain administrative
privileges as seen in Figure 16.

Figure 16. User Given Domain Admin Privileges

Affected Systems
Nakatomi Active Directory

Description
Administrator privileges are often granted when a user needs to frequently perform modifications to their
workstation. Organizations will grant elevated privileges to the user in order to reduce the requests to
administrative groups such as IT. However, during a successful social engineering attack, the elevated
privileges can allow an attacker to execute malicious payloads in a higher context. This simplifies the steps
needed to gain persistence, bypass antivirus and endpoint detection and response (EDR) and perform
lateral movement.

Recommendations
Nakatomi should configure developer accounts to use the principle of least privilege for standard daily
operations. Nakatomi should provide a secondary administrator-level account to use when a developer
needs to perform actions requiring elevated privileges. Nakatomi should implement a password vaulting
solution, which allows users to "check out" a higher-privileged account with a one-time password which

25
expires after checking the account in or after a set amount of time. Alternatively, Nakatomi should
implement a password manager where administrator credentials are stored and shared with users who
need to perform administrative tasks.

References
NIST: Principle of Least Privilege

Microsoft: Implementing Least-Privilege Administrative Models

CIS: Critical Control 5 - Account Management

Validation
N/A

26
Medium Risk Findings
Red Siege did not identify any medium-risk findings during the testing window.

Low Risk Findings


Red Siege did not identify any low-risk findings during the testing window.

Informational Findings
Finding-09 PowerShell Version 2 Available

< >
Informational Configuration Management

Impact
Red Siege found PowerShell version 2 was available on the system. Figure 17 shows PowerShell version 2
was accessible using the following command: powershell -version 2.

Figure 17. PowerShell Version 2 Execution

Affected Systems
10.1.2.3

Description
PowerShell version 2 lacks many features that are valuable to defenders regarding the detection of
potentially malicious activities. Beginning with PowerShell version 5, Microsoft included the following
capabilities:

• Constrained Language Mode


• PowerShell integration with Applocker, Device Guard, and Windows Defender Application Control
• PowerShell logging
o Script Block logging
o Protected Event Logging

27
o Module Logging

If an attacker can downgrade to PowerShell version 2, defenders lose the ability to identify attacker
activities within PowerShell.

Recommendations
If not needed, Nakatomi should remove Microsoft .NET version 2, which is required to run PowerShell
version 2. If .NET Framework version 2 is required, Nakatomi can disable PowerShell version 2 as follows:

• Open a PowerShell console with elevated privileges (run as administrator)


• Enter the following command:
Disable-WindowsOptionalFeature -Online -FeatureName
MicrosoftWindowsPowerShellV2Root

Alternatively, PowerShell version 2 can be disabled as follows:

• In the Windows Control Panel, search for "Features"


• Select "Turn Windows features on or off"
• Uncheck "Windows PowerShell 2.0"

References
Microsoft: PowerShell Version 2 Deprecation

Digital Shadows: PowerShell Security Best Practices

Rapid7: Defending Against Malicious PowerShell Attacks

MITRE ATT&CK Technique 1059-001: PowerShell Command and Scripting Interpreter

Validation
Nakatomi can verify PowerShell version 2 is disabled by using the following command:
powershell.exe -version 2

If .NET Framework version 2 has been removed, Nakatomi should see the following error message:

Version v2.0.50727 of the .NET Framework is not installed and it is required to


run version 2 of Windows PowerShell.

If PowerShell version 2 has been disabled, Nakatomi should see the following error message:

Encountered a problem reading the registry. Cannot find registry key


SOFTWARE\Microsoft\PowerShell\1\PowerShellEngine. The Windows PowerShell 2 engine
is not installed on this computer.

28
Social Engineering Findings
Critical Risk Findings
Finding-10 Successful Pretext Call

<
Critical Risk Phone-Based Social Engineering

Observation
Red Siege conducted a phone-based phishing attack (vishing) against the Nakatomi service desk. The
tester placed multiple phone calls and persuaded a service desk analyst to change an employee’s
password, which enabled Red Siege to fully take over that user’s account.

Description
A successful vishing attack can allow an attacker to fully compromise the victim employee’s network
access and gain access to sensitive client information. Often, the attacker will coerce the target into
performing an unauthorized action by using information obtained from public sources to prove their
validity. These attacks can lead to the first foothold inside the target organization's network.

Recommendations
Nakatomi should educate employees on the risk of phone-based phishing attacks. Regular internal
phishing and vishing exercises should be conducted to properly educate users on how to identify and
report phishing attempts. Red Siege recommends that these exercises should be conducted a minimum
of twice a year. Nakatomi should also implement a secondary verification protocol with the help desk to
help ensure that social engineering attacks are stopped early. Examples of secondary verification can
include a code of the day or protocols to contact the user independently of the initial contact.

References
Social Engineering Framework: Vishing

Blog: Smishing and vishing: How these cyber-attacks work and how to prevent them

Blog: 6 Easy Ways to Protect Your Business from Vishing and Phishing

High Risk Findings


Red Siege did not identify any high-risk findings during the testing window.

Medium Risk Findings


Red Siege did not identify any medium-risk findings during the testing window.

Low Risk Findings


Red Siege did not identify any low-risk findings during the testing window.

29
External Penetration Test Methodology
This is a sample of our external network penetration test methodology designed to show the level of
reporting that you will receive once your penetration test is complete. This report does not reflect all
testing that would be performed during an actual engagement.

Red Siege began the external penetration test by using DNSDumpster 7 to review DNS records for
Nakatomi DNSDumpster identified two (A) records. One of the records is shown in Figure 18.

Figure 18. DNSDumpster A Record Results

Red Siege used curl8 to query crt.sh9 for certificate transparency logs pertaining to Nakatomi hosts. Using
this technique, Red Siege identified two unique hostnames. The tester used the following command to
perform the query:

curl -s "https://crt.sh/?q=%.sampleInc.com&output=json" | jq '.[].name_value' |


sed 's/\"//g' | sed 's/\\n/\n/g' > sampleInc.com.hosts-crtsh.txt

Red Siege searched published breach databases, including Dehashed10, for Nakatomi credentials. Red
Siege recovered nine unique sets of credentials using this technique. Figure 19 shows a subset of the
results.

Figure 19. Breached Password Search Results

7
https://dnsdumpster.com/
8
https://curl.se/
9
https://crt.sh/
10
https://dehashed.com

30
Red Siege used Hunter.io11 to search for Nakatomi email addresses and to confirm the email address
format used. As show in Figure 20, the most common email address format used by Nakatomi was
{f}{last}@sampleinc.com.

Figure 20. Hunter.io Results

Red Siege used ADFSpray 12 to perform password spraying and credential stuffing attacks against
Nakatomi’s ADFS porta using the email addresses and credentials discovered in the previous steps. Figure
21 shows a successful password spraying attempt. Red Siege has documented this issue in Finding-01
Weak Password Policy.

Figure 21. Password Spraying Against ADFS

11
https://hunter.io/
12
https://github.com/xFreed0m/ADFSpray

31
Red Siege used Gobuster13 and common wordlists to discover content on servers which may lead to
information disclosure and authentication bypass. Figure 22 shows the execution of Gobuster on a target
system.

Figure 22. External Website Directory Enumeration

While validating the results found by Gobuster, the tester identified an external facing web server with
directory indexing enabled, shown in Figure 23, allowing a full listing of the sites files and folders. Red
Siege documented this issue in Finding-02 Directory Indexing.

Figure 23. Directory Indexing Exposure

This concluded the external penetration test.

13
https://github.com/OJ/gobuster

32
Internal Penetration Test Methodology
This is a sample of our internal network penetration test methodology designed to show the level of
reporting that you will receive once your penetration test is complete. This report does not reflect all
testing that would be performed during an actual engagement.

Red Siege used the custom scanning tool autoscan.sh14 to identify listening ports and services on the
in-scope hosts. Autoscan uses Masscan to identify hosts with listening services as shown in Figure 24.

Figure 24. Host Discovery Using Masscan

Red Siege processed the Masscan results to develop lists of unique hosts and ports discovered by
Masscan. The team then targeted the previously identified hosts and ports using Nmap as seen in Figure
25.

Figure 25. Targeted Service Scanning

14
https://github.com/RedSiege/rstools/blob/master/scanning/autoscan.sh

33
Red Siege checked each domain controller for SMB null sessions using Enum4Linux 15 . The tester
determined that SMB null sessions were enabled as shown in Figure 26. Red Siege has documented this
issue in Finding-04 SMB Null Sessions Enabled.

Figure 26. SMB Null Session Enumeration

Red Siege used Responder16 in Analyze mode to check for NetBIOS and LLMNR traffic on the Nakatomi
network. Red Siege observed NetBIOS (NBNS) and LLMNR traffic as seen in Figure 27.

Figure 27. NetBIOS and LLMNR Traffic Detected with Responder

15
https://www.kali.org/tools/enum4linux/
16
https://github.com/lgandx/Responder

34
After Running Responder in Analyze mode and detecting LLMNR and NBNS traffic, Red Siege used
Responder to invoke authentication against the host and record user password hashes, shown in Figure
28.

Figure 28. Running of Responder.py

Red Siege used Responder in conjunction with ntlmrelayx17 to perform SMB relaying attacks. Red Siege
executed the relay attack using the following command: python3 ntlmrelayx.py -tf
signing_not_required.txt -of hashes.pot. The tester captured several user hashes using this
technique, one of which is shown in Figure 29. Red Siege has documented this issue in Finding-03 LLMNR
and NBNS Poisoning.

Figure 29. Captured Password Hash (Redacted)

17
https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py

35
Red Siege used Hashcat18 to perform password cracking attacks against the recovered hashes using a
combination of wordlists and masking or permutation attacks. The tester was successful in recovering the
password for the SAMPLE03 account.

Figure 30. Hashcat Performing Password Recovery Attacks

This concludes the internal penetration test.

18
https://hashcat.net/hashcat/

36
Web Application Penetration Test
Methodology
This is a sample of our web application penetration test methodology designed to show the level of
reporting that you will receive once your penetration test is complete. This report does not reflect all
testing that would be performed during an actual engagement.

Red Siege used Gobuster19 and common wordlists to discover content on servers which may lead to
information disclosure and authentication bypass. Figure 31 shows the execution of Gobuster on a target
system.

Figure 31. Gobuster Execution

Red Siege manually verified each result reported by Gobuster to identify potential authentication bypass
and information disclosure issues. An example is shown in Figure 32.

Figure 32. Reviewing Gobuster Results

19
https://github.com/OJ/gobuster

37
The tester used Wappalyzer20 to examine the technologies used on in-scope websites. Figure 33 shows
a sample of the Wappalyzer output for https://www.redsiege.com. The tester did not identify any
reportable issues using this tool.

Figure 33. Wappalyzer Output

Red Siege reviewed the source code and dynamically created code to identify any potential vulnerable
software versions. The tester found the application used the Spring Framework version 5.3.0 as shown in
Figure 34. This version of Spring Framework is affected by a critical remote code execution vulnerability.
Red Siege has documented this issue as Finding-05 Unpatched Software.

Figure 34. Spring Framework 5.3.0

Red Siege retrieved the robots.txt file from the in-scope application web servers. The tester reviewed each
robots.txt entry for potential information disclosure and authentication bypass issues. Figure 35 shows
the retrieval of the robots.txt file from a web server.

Figure 35. Robots.txt Retrieval

20
https://www.wappalyzer.com

38
Red Siege analyzed HTTP response headers returned by web applications to identify headers that leak
information and headers that augment web application security, as seen in Figure 36. The tester observed
a response that did not include a Strict-Transport-Security header. Red Siege documented this as
Finding-07 HSTS Not Enabled.

Figure 36. HSTS Header Missing

After manually browsing all links within the web application interfaces and retrieving the robots.txt files,
Red Siege used the Burp21 Discover Content tool to enumerate additional application content. Launching
of the Burp Discover Content tool on the https://redsiege.com website is shown in Figure 37. The
tester manually visited all newly discovered content and added this content into the testing inventory.

Figure 37. Launching the Burp Discover Content Tool

21
https://portswigger.net

39
After mapping each application from both authenticated and unauthenticated perspectives, Red Siege
used Burp Scanner to perform automated scans of parameterized application endpoints. Figure 38 shows
the execution of an active scan.

Figure 38. Launching Active Scan

After completing automated scans, Red Siege reviewed the scan results for reportable issues. Figure 39
shows the results summary returned by the Burp, and sample detailed results are shown in Figure 40.

Figure 39. Burp Scanner Results Summary

Figure 40. Burp Scanner Results Detail

Red Siege researched all identified software versions for exploits and found that that the Spring
Framework 5.3.0 was potentially vulnerable to a remote code execution vulnerability described in CVE-

40
2022-22965. The tester successfully exploited the vulnerable version of Spring Framework by using the
Spring4Shell-POC22 to upload a web shell as shown in Figure 41.

Figure 41. Successful Webshell Upload

Figure 42 shows the response of the web shell exposing sensitive data. Red Siege has documented this
issue as Finding-05 Unpatched Software.

Figure 42. Webshell Response

Red Siege’s actions were successfully identified and reported on by Nakatomi's Security Operation Center
as shown in Figure 43. Red Siege has noted this response in the executive summary as a positive finding.

Figure 43. Successful Exploit Detection

22
https://github.com/reznok/Spring4Shell-POC/blob/master/exploit.py

41
Red Siege performed manual vulnerability testing using the Burp Repeater tool. The tester performed
various attacks, including SQL injection, Cross-Site Scripting, Cross-Site Request Forgery, and others.
Figure 44 shows a manual SQL injection attempt on redsiege.com.

Figure 44. Manual SQL Injection Using Repeater

Red Siege did not note any measurable differences between a valid and non-valid SQL request as shown
in Figure 45. The tester did not identify any SQL injection vulnerabilities in the web application.

Figure 45. SQL Attempt Response

42
The tester observed the web application reflected user input when encountering an error. Red Siege
injected malicious JavaScript into the URL below to see if the application would strip dangerous
characters.

https://redsiege.com/fakeDirectory/<script>alert("Red Siege XSS");</script>

The tester found the application reflected the user input directly in the body of the page, resulting in an
XSS attack as shown in Figure 46. Red Siege has documented this issue as Finding-06 Cross-Site
Scripting.

Figure 46. Successful XSS Attack

This concludes the web application penetration test.

43
Assumed Breach Test Methodology
This is a sample of our assumed breach test methodology designed to show the level of reporting that
you will receive once your penetration test is complete. This report does not reflect all testing that would
be performed during an actual engagement.

The goal of the assumed breach test was to demonstrate attack paths available to an attacker who
compromised a user via phishing, resulting in execution of a malicious executable that established a
command and control session. To this end, Nakatomi provided Red Siege a low-privileged account,
Uninteresing.User, that was used by an accounting employee who recently left the company. The
tester used an RDP client through this connection to remotely access SampleServer, a Windows 2019
accounting database server used previously by the departed employee.

Red Siege launched a PowerShell version 2 console using the command powershell -version 2. As
shown in Figure 47, the testers found PowerShell version 2 was installed and accessible. Red Siege has
documented this issue in Finding-09 PowerShell Version 2 Available.

Figure 47. PowerShell Version 2 Execution

The testers configured a payload to call back to a command and control (C2) server through Amazon
CloudFront using the address sampleIncRedTeamTest.cloudfront.net. The testers configured and
uploaded a Cobalt Strike payload encoded inside of an MSBuild Inline Tasks XML file. Red Siege used
MSBuild23 to execute the Inline Tasks file and received a beacon as shown below in Figure 48.

Figure 48. Successful Beacon Callback

After connecting to the SampleServer machine, Red Siege began reviewing the permissions assigned
to the Uninteresing.User account on the SampleServer machine. An initial review showed that the

23
https://attack.mitre.org/techniques/T1127/001/

44
Uninteresing.User account was not a direct member of the local Administrators group, shown in
Figure 49 below.

Figure 49. Local Administrators Group

Red Siege used PowerUp24 to search for any workstation misconfigurations that could be exploited to
obtain administrative permissions on the SampleServer domain server. Figure 50 shows output
generated by PowerUp.

Figure 50. PowerUp Output

Red Siege used PowerView25 to perform domain reconnaissance and capture information, including the
following:

• Internal Domains
• Internal Forests
• Domain Groups
• Domain Users
• Domain Computers

24
https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1
25
https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1

45
After capturing basic domain information, Red Siege used additional functionality within PowerView to
identify additional attack paths. Specifically, Red Siege began by using the Get-DomainUser cmdlet
within PowerView to search for users within Nakatomi's internal domain as shown in Figure 51.

Figure 51. User Enumeration

Red Siege used the PowerView Get-DomainGroupMember cmdlet to return a list of all users in the
"Domain Admins" group as shown in Figure 52. Nakatomi informed the tester that the
Uninteresting.User account was originally intended to be an unprivileged user for the accounting
department, but the account was erroneously assigned to the "Domain Admins" group. Red Siege has
documented this issue as Finding-08 Excessive Administrator Permissions.

Figure 52. Subset of Network Shares

46
Red Siege searched for Group Policy Preferences (GPP) files containing stored credentials. The tester used
the PowerSploit Get-GPPPassword script26 to identify any passwords stored in GPP files. The [BLANK]
response, seen in Figure 53, indicates the absence of credentials.

Figure 53. Searching Group Policy Preferences Files for Credentials

Red Siege used the Invoke-DomainPasswordSpray27 script to evaluate domain accounts for common
weak passwords, such as passwords based on the season and year (e.g., Summer2022). Figure 54 shows
execution of the script using a common weak password. The tester did not identify any weak passwords
using this technique.

Figure 54. Invoke-DomainPasswordSpray Execution

26
https://github.com/PowerShellMafia/PowerSploit/blob/dev/Exfiltration/Get-GPPPassword.ps1
27
https://github.com/dafthack/DomainPasswordSpray

47
Red Siege used the SysInternals tool ADExplorer.exe28 to create a snapshot of the data contained in Active
Directory. Figure 55 shows the execution of ADExplorer through Cobalt Strike.

Figure 55. Creating AD Snapshot Using ADExplorer

Red Siege downloaded the snapshot file and analyzed it offline using ADExplorer, searching for
credentials stored in user Description, Comment, and other AD schema attributes. Figure 56 shows a
search for credentials in the Description attribute. The tester was unable to locate credentials being stored
in the description field.

Figure 56. Searching for Credentials in AD Schema

This concludes the assumed breach penetration test.

28
https://docs.microsoft.com/en-us/sysinternals/downloads/adexplorer

48
Social Engineering Methodology
This is a sample of our Social Engineering methodology designed to show the level of reporting that you
will receive once your penetration test is complete. This report does not reflect all testing that would be
performed during an actual engagement.

Vishing Test
Red Siege began the social engineering portion of the test by searching for employee names using
LinkedIn29. The tester chose to impersonate an employee named Tim Medin, shown in Figure 57. Tim was
chosen due to being a high-profile member of the company, currently working in a non-technical role,
and being a remote worker.

Figure 57. LinkedIn Target Selection

Red Siege made a series of calls to the Nakatomi Help Desk beginning on April 1, 2022, at 10:00AM ET,
originating from the phone number 888-867-5309. The tester’s objective was to convince the Help Desk
to perform an unauthenticated password reset for Tim Medin’s account. After performing several calls, at
10:25AM ET, Red Siege convinced a Help Desk employee to reset the password for Tim Medin’s user
account to Password123!. After the password reset, the tester reported the password change to the
Point of Contact so that Tim could be contacted and his access restored. Red Siege has documented this
issue in Finding-10 Successful Pretext Call.

Phishing Test
Red Siege created a phishing ruse based on a survey of employee satisfaction with Microsoft Office365.
Red Siege used a fictitious company, HR Survey Pro, to send out the survey directing the user to click on

29
https://www.linkedin.com/

49
a link in the phishing email. The email described a partnership with Nakatomi and enticed the user to
click the link and complete the survey with the chance to win a $100 Visa gift card. The email stated that
employee credentials were gathered for the purposes of tracking who completed the survey to register
them the gift card drawing. The email addressed each employee by their first name and contained a link
with a unique identifier in the URL, allowing Red Siege to differentiate between users who clicked on the
link. To impart a sense of urgency, the recipient was informed the deadline for submission was October
19, 2020. A sample of the phishing message is shown in Figure 58.

Figure 58. Sample Phishing Email (Deadline Emphasis Added)

50
Upon clicking the link in the email, users would be taken to the following URL:

https://surveys.hrsurveypro.com/<b64_company_name>/login.php?uid=<b64_employee_em
ail>&auth_required=y&group=341&safebrowse=1&mobile=off

Figure 59 shows the login form where employees were asked to provide their credentials.

Figure 59. Survey Login Form

The table below is a summary of the phishing scenario results.

Emails Delivered 50 Emails Sent Totals

0 Undeliverable

3 Out of Office Replies

47 Total Emails Delivered

Link Clicked 4 Users Clicked the Link 8.5% (4/47)

Credentials Submitted 3 Users Submitted Credentials 6.3% (3/47)

Users Reporting Phishing 6 Reports 12.6% (6/47)

Time from first delivered


message to first phishing
3 minutes
attempt reported to the IT
Security mailbox

This concludes the web social engineering test.

51
Appendix
Personnel
Name Contact Information Role Organization
Tim Medin [email protected] Lead Tester Red Siege
@TimMedin
Mike Saunders [email protected] Lead Tester Red Siege
Corey Overstreet [email protected] Tester Red Siege
Jason Downey [email protected] Tester Red Siege
Justin Palk [email protected] Tester Red Siege
Douglas Berdeaux [email protected] Tester Red Siege
Ian Briley [email protected] Tester Red Siege
Sample Mann [email protected] Security Architect Nakatomi Trading Corp

52
Scope
The in-scope systems include the following:

167.99.158.190

198.199.82.82

The following systems were explicitly out of scope:

None

53
Finding Categories
Vulnerability categories and the related weaknesses are listed below:

Architecture – Related to system or network design

Authentication – User authentication and access rights

Configuration Management – Related to system configuration and hardening

Cryptography – Implementation and use of encryption and hashing

Data Validation – Input validation and data handling

Data Exposure – Unintended or excessive exposure of data

Password Management – Password storage and complexity requirements

Patch Management – Patch and vulnerability management of systems

Permissions and Access Control – Management of permissions, privileges, and features related to access
control

54
Table of Figures
Figure 1. Successful Login with Password Spray .............................................................................................................. 9
Figure 2. Directory Indexing .................................................................................................................................................. 11
Figure 3. LLMNR and NBNS Broadcast Traffic Observed Using Responder ........................................................ 13
Figure 4. NTLM Hash Received via Response Poisoning ............................................................................................ 13
Figure 5. Disabling LLMNR .................................................................................................................................................... 15
Figure 6. Ethernet Adapter Properties (TCP/IPv4 Selected) ....................................................................................... 15
Figure 7. Selecting TCP/IP Advanced Options................................................................................................................ 16
Figure 8. NetBIOS over TCP/IP Disabled .......................................................................................................................... 16
Figure 9. SMB Null Session Enumeration Using enum4linux .................................................................................... 17
Figure 10. Domain Admin Group Membership .............................................................................................................. 17
Figure 11. Registry Modification to Disable Null Sessions ........................................................................................... 18
Figure 12. Successful RCE Attack ......................................................................................................................................... 19
Figure 13. Successful XSS Attack.......................................................................................................................................... 21
Figure 14. HSTS Header not Present ................................................................................................................................. 23
Figure 15. Retrieving Web Server Headers via Curl ..................................................................................................... 24
Figure 16. User Given Domain Admin Privileges ........................................................................................................... 25
Figure 17. PowerShell Version 2 Execution ..................................................................................................................... 27
Figure 18. DNSDumpster A Record Results .................................................................................................................... 30
Figure 19. Breached Password Search Results ............................................................................................................... 30
Figure 20. Hunter.io Results .................................................................................................................................................. 31
Figure 21. Password Spraying Against ADFS ................................................................................................................... 31
Figure 22. External Website Directory Enumeration .................................................................................................... 32
Figure 23. Directory Indexing Exposure ........................................................................................................................... 32
Figure 24. Host Discovery Using Masscan ...................................................................................................................... 33
Figure 25. Targeted Service Scanning .............................................................................................................................. 33
Figure 26. SMB Null Session Enumeration ...................................................................................................................... 34
Figure 27. NetBIOS and LLMNR Traffic Detected with Responder ......................................................................... 34
Figure 28. Running of Responder.py ................................................................................................................................ 35
Figure 29. Captured Password Hash (Redacted) .......................................................................................................... 35
Figure 30. Hashcat Performing Password Recovery Attacks .................................................................................... 36
Figure 31. Gobuster Execution ............................................................................................................................................ 37
Figure 32. Reviewing Gobuster Results ............................................................................................................................ 37
Figure 33. Wappalyzer Output............................................................................................................................................ 38
Figure 34. Spring Framework 5.3.0.................................................................................................................................... 38
Figure 35. Robots.txt Retrieval ............................................................................................................................................ 38
Figure 36. HSTS Header Missing ........................................................................................................................................ 39
Figure 37. Launching the Burp Discover Content Tool............................................................................................... 39

55
Figure 38. Launching Active Scan ...................................................................................................................................... 40
Figure 39. Burp Scanner Results Summary ..................................................................................................................... 40
Figure 40. Burp Scanner Results Detail ............................................................................................................................ 40
Figure 41. Successful Webshell Upload ............................................................................................................................. 41
Figure 42. Webshell Response ............................................................................................................................................. 41
Figure 43. Successful Exploit Detection ............................................................................................................................ 41
Figure 44. Manual SQL Injection Using Repeater......................................................................................................... 42
Figure 45. SQL Attempt Response .................................................................................................................................... 42
Figure 46. Successful XSS Attack........................................................................................................................................ 43
Figure 47. PowerShell Version 2 Execution..................................................................................................................... 44
Figure 48. Successful Beacon Callback............................................................................................................................. 44
Figure 49. Local Administrators Group ............................................................................................................................ 45
Figure 50. PowerUp Output ................................................................................................................................................. 45
Figure 51. User Enumeration................................................................................................................................................ 46
Figure 52. Subset of Network Shares ............................................................................................................................... 46
Figure 53. Searching Group Policy Preferences Files for Credentials .................................................................... 47
Figure 54. Invoke-DomainPasswordSpray Execution .................................................................................................. 47
Figure 55. Creating AD Snapshot Using ADExplorer................................................................................................... 48
Figure 56. Searching for Credentials in AD Schema .................................................................................................... 48
Figure 57. LinkedIn Target Selection................................................................................................................................. 49
Figure 58. Sample Phishing Email (Deadline Emphasis Added) .............................................................................. 50
Figure 59. Survey Login Form .............................................................................................................................................. 51

56
Prepared by Red Siege, LLC. Portions of this document, and the templates used in its production are the
property of Red Siege, LLC. and cannot be used or copied without permission.

While precautions have been taken in the preparation of this document, Red Siege, LLC., the publisher,
and the author(s) assume no responsibility for errors, omissions, or for damages resulting from the use
of the information contained herein. Use of Red Siege, LLC and its services does not guarantee the security
of any system, or that computer intrusions will not occur.

57

You might also like