The client is an IT solutions provider that offers computer hardware, software, and consulting to their clients.
The primary objective of the Internal Network Penetration Test was to measure the security posture of in-scope assets and identify any deviating vulnerabilities by measuring them against industry-adopted controls. The target scope for this engagement was a subset of the devices on the internal network. Other hosts existed on the network but were considered out of scope and were thus not included in testing.
As a result of the Internal Network Penetration Test, unique findings were identified, including two findings rated as a critical severity and recommended to be addressed as soon as possible. The test also gave the client information regarding what a bad actor could do if they were to get on their network (i.e., through phishing attacks or insider threats).
The primary objective of the External Penetration Test was to identify vulnerabilities and misconfigurations within the in-scope assets, which may lead to unauthorized access to systems or data. The target scope for this engagement was six external IP addresses that were measured against PTES controls.
By combining the results from industry-leading scanning tools and manual testing to enumerate and validate vulnerabilities, configuration errors, and business logic flaws, one finding was found. The vulnerability discovered during testing was associated with information disclosure. While not typically severe, information disclosure-based vulnerabilities help attackers identify specific software or versions of applications to target when looking for known exploits.
The primary objective of the Web Application Penetration Test was to identify common vulnerabilities, such as those in the OWASP Top 10. The scope of the test involved testing the client's application which lived in a test instance of production.
As a result of testing, multiple findings were identified. The findings ranged from High to Low severity and included information disclosure related to information leakage about a backend database and the allowance of concurrent login sessions. When an application allows for concurrent login sessions, it indicates the ability of an attacker with valid credentials to maintain concurrent login sessions as a legitimate user.
Through in-depth security testing and a comprehensive approach, RedTeam Security provided the client with clear visibility into their existing security vulnerabilities and the real-world likelihood and potential business impact of experiencing a breach. Every engagement with RedTeam Security provides clients with:
All identifying information has been changed to protect our clients and ensure absolute confidentiality.