Anchor Technologies, Inc.
  • Solutions
    • Managed Planning & Prevention
    • Governance, Risk & Compliance
    • Cyber Risk Identification
    • Incident Response & Mitigation
  • Capabilities
    • Advisory
    • Integration
    • Education
  • Insights
  • About
  • Contact
Select Page

Case Study: Penetration Testing

by Peter Dietrich | Jan 9, 2020 | Case Study | 0 comments

Case Study

Penetration Testing

This customer wanted to throughly replicate what an attacker could potentially exploit within his environment. They hired Anchor Technologies to ethically hack their environment from the Internet and from within the network.

Intro

How We Improved Executive-Level Cybersecurity Risk Awareness

The engagement began with exploring all information available in the Open Source Intelligence (OSINT) realm on the Internet.  From this investigation we discovered the IP address blocks and vendors the organization was using to hosts their core customer facing application. The investigation also provided key information on employees that worked in important roles at the organization, their email addresses, and in a few cases, even their login IDs and passwords were harvested from the Dark Web. This certainly had an impact with the organization’s executives in reviewing the findings report.

Details

Hacking your organization before the bad actor does.

Challenge

How to test your security controls using the same methods that a real attacker would, in a safe controlled non-disruptive manner. Maybe even test your staff’s ability to respond to a cybersecurity attack.

Solution

The Penetration Test exploits technical vulnerabilities extending the Vulnerability Assessment activities into a proof of exploitability vs. just a theory. This test is extremely valuable after the organization has a reasonable level of confidence in its security controls. This test replicates what an attacker will actually do to break into your environment, but in a safe and cooperative controlled manner.

Accounts Compromised

3

Vulnerabilities Tested

40k+

Network Penetrated

100%

Budget Increase

18%

Engagement Summary

The test resulted in a 100% penetration level of the internal network while pivoting through the external network. Multiple entry points were identified and proof of each penetration step was documented and supported with detailed evidence on how the weakness was identified and exploited.

It was shown how an attacker could identify the key systems, gather enough OSINT to effectively plan an attack then probe the system vulnerabilities until a path inside was found.

 

Once inside, the attacker could have utilized a combination of two lower severity vulnerabilities to gain domain level credentials. Once the domain credentials were acquired, then fake system accounts were setup to evade detection and the internal resources were explored for data of interest. Once the data was identified, then a sample was exfiltrated through the minimally restricted outbound encrypted SSL ports to the attacker’s waiting external host. This evaded all detection from the existing advanced security controls.

Testimonial

“I can’t believe it took us this long to perform this test. So happy that we did. The results don’t lie.”

Organization’s CEO

Get In Touch

6315 Hillside Court, Suite J, Columbia, MD 21046
866.841.0777

info@anchortechnologies.com
  • Facebook
  • Twitter
  • LinkedIn

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recent Posts

  • CMMC | Securing the Supply Chain
  • Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020
  • Case Study: Penetration Testing
  • CIS CONTROL #20: Penetration Tests and Red Team Exercises

Categories

Archives

  • ►2020 (4)
    • ►June (1)
    • ►February (1)
    • ►January (2)
  • ►2019 (11)
    • ►December (1)
    • ►November (1)
    • ►September (1)
    • ►August (1)
    • ►July (1)
    • ►June (1)
    • ►May (1)
    • ►April (1)
    • ►March (1)
    • ►February (1)
    • ►January (1)
  • ►2018 (28)
    • ►December (1)
    • ►November (1)
    • ►October (1)
    • ►September (1)
    • ►August (1)
    • ►July (4)
    • ►June (2)
    • ►May (2)
    • ►March (3)
    • ►February (3)
    • ►January (9)

Tags

account theft Administrative Privileges assessment audit log authorized Backup Boundary Defense Check Point CIS control configuration Cybersecurity Investment Incentive Cybersecurity Tax Credit Data Data Loss Prevention Data Protection Data Recovery devices Email Encryption exploit Firewall human security risk IDS Integrity inventory IPS Legislation Malware Network Device network port Network Segmentation password patching penetration test phishing Remote Router scan Security Control software Switch unauthorized vulnerability vulnerability scanning web browser
Tweets by Path2Protection

Recent Posts

  • CMMC | Securing the Supply Chain
  • Anchor to launch new product, myCYPR, at the RSA Conference in Feb. 2020
  • Case Study: Penetration Testing
  • CIS CONTROL #20: Penetration Tests and Red Team Exercises
  • CIS Control #19: Incident Response and Management
  • CIS Control #18: Application Software Security
  • CIS Control #17: Implement a Security Awareness and Training Program
  • CIS Critical Security Control #16: Account Monitoring and Control

6315 Hillside Court, Suite J
Columbia, MD 21046
Howard County, Maryland, USA

410.295.7601 or toll free: 866.841.0777
info@anchortechnologies.com​

BREACH RESPONSE HOTLINE:
breach@anchortechnologies.com
866.841.0777, option #8

  • Facebook
  • Twitter