TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Story of a failed pentest

1147 pointsby mariedmover 6 years ago

28 comments

gtsteveover 6 years ago
Great story, but I wouldn&#x27;t call it &quot;failed&quot; because it showed that the company has really good security procedures. I don&#x27;t know many companies that could have resisted this sort of internal threat.<p>I&#x27;ve had pentests that found nothing before but I had logs full of attempts to compromise the app, including in some ways I&#x27;d never even heard of before. I didn&#x27;t consider them to be failures either.
评论 #18477483 未加载
评论 #18478432 未加载
评论 #18477865 未加载
评论 #18477548 未加载
dstickover 6 years ago
Meanwhile 4 put of 5 webshops we check have critical vulnerabilities and half the owners don’t care because “it just costs money to fix it and things have been fine so we’d rather spend more on Adwords”<p>Security, no scratch that - the human psyche works in mysterious ways :)<p>This company seems to run a tight ship though!
评论 #18476276 未加载
评论 #18476144 未加载
org3432over 6 years ago
The problem I have with pen tests is that they&#x27;re not systematic and rely on the cleverness and knowledged of the tester. Even if they identify an issue, it&#x27;s often hard or impossible to ensure it doesn&#x27;t regress, and if it&#x27;s an inhouse or custom software they&#x27;ve never seen before they likely won&#x27;t be of much help without a lot of effort.<p>I think one step forward would be also approaching security the same way epidemiologist track down causes of diseases. In that they take patient data and trace back the factors that caused it, just instead of patients we&#x27;re talking about security vulnerabilities and breaches. Having a corpus of causal diagrams that then we can develop software to analyze risk factors that we can then systematically test for.
评论 #18477042 未加载
评论 #18477294 未加载
评论 #18478051 未加载
评论 #18477215 未加载
评论 #18478284 未加载
cs02rm0over 6 years ago
<i>I could&#x27;ve run &quot;net accounts&quot; on my workstation to query Active Directory directly &amp; see their password policy, but decided to look elsewhere first. I didn&#x27;t want to set off any alerts or logging.</i><p>I know nothing about Windows, but I&#x27;d have thought checking password policies far less likely to alert than plugging in your own device on the network.<p>Anyway, my favourite bit was that they didn&#x27;t stop the people in Accounts running Powershell, they just raised an alert. I much prefer that approach to blocking people most likely just doing their job.
评论 #18480751 未加载
asaphover 6 years ago
The author confirmed on Twitter that &quot;aside from the beating up and tying down&quot; this is a true story[0].<p>[0]<a href="https:&#x2F;&#x2F;twitter.com&#x2F;TinkerSec&#x2F;status&#x2F;1063781216128835584" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;TinkerSec&#x2F;status&#x2F;1063781216128835584</a>
asaphover 6 years ago
&gt; I woke up, bloody, in an ergonomic office chair, my hands zipped tied behind me with the same zip ties they used to manage the server ethernet cables.<p>I didn&#x27;t realize this story was fiction until I got to this sentence.<p>Update: The author confirmed on Twitter that other than the dramatization, this story is in fact true.<p>&gt; And, aside from the beating up and tying down, it was true![0]<p>I can admit when I&#x27;m wrong. I stand corrected.<p>[0]<a href="https:&#x2F;&#x2F;twitter.com&#x2F;TinkerSec&#x2F;status&#x2F;1063781216128835584" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;TinkerSec&#x2F;status&#x2F;1063781216128835584</a>
评论 #18476896 未加载
评论 #18476006 未加载
评论 #18478237 未加载
tomohawkover 6 years ago
This doesn&#x27;t seem at all realistic. Tight security and people are actually getting work done? Inconceivable!
评论 #18476772 未加载
评论 #18480297 未加载
评论 #18478437 未加载
raesene9over 6 years ago
Nice story and a good illustration that a lot of good IT Security isn&#x27;t buying fancy &quot;next gen&quot; products, it&#x27;s doing the basics of managing your systems well.<p>It costs more to run IT well, but there are good payoffs, like this.
评论 #18478220 未加载
abledonover 6 years ago
I love reading factual hacker stories that read like fiction. very entertaining. A brutal 5-7 year on ramp of learning what computers actually do on the inside... but understanding what the story about is worth it.
netsec_burnover 6 years ago
During pentests most testers run the usual route of attacking the domain. In my opinion it&#x27;s not realistic, because most attackers don&#x27;t attack domains. They attack applications.
评论 #18476456 未加载
评论 #18476651 未加载
评论 #18478869 未加载
progvalover 6 years ago
I must be missing something; but why not plug keyloggers on IT&#x27;s computers?
评论 #18481536 未加载
评论 #18486725 未加载
评论 #18479055 未加载
iscrewyouover 6 years ago
That was a good fun read. Especially where they zip tied him. Good change of pace.
评论 #18476236 未加载
asaphover 6 years ago
This story is also available as a series of tweets in case anyone prefers to consume it that way.<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;TinkerSec&#x2F;status&#x2F;1063423110513418240" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;TinkerSec&#x2F;status&#x2F;1063423110513418240</a>
评论 #18477597 未加载
评论 #18476771 未加载
评论 #18478240 未加载
评论 #18476712 未加载
catacombsover 6 years ago
Really? A Twitter thread? This could have been a blog post.
评论 #18477578 未加载
sizzleover 6 years ago
So if he ran the powershell at midnight he could have potentially gone unnoticed until the IT guys got back in the office?<p>What if this was a global Corp, would someone be monitoring this 24&#x2F;7 across timezones?<p>What kind of damage could he have done if he had, say, 1 hour of unfettered access?
fulafelover 6 years ago
&gt; On most Internal Pentests, I generally get Domain Admin within a day or two. Enterprise Admin shortly thereafter.<p>Sounds realistic, from how most Windows shops are run.<p>Would it help to stop using AD to manage the IT infra, or have tiny domains (say, max 10 computers) without centralised control, and no company-internal workstation networks? Maybe throw in a rule that devices are recycled (to be wiped) frequently, say every 6 months.
评论 #18476381 未加载
评论 #18476657 未加载
评论 #18477893 未加载
flerchinover 6 years ago
Smells like a CISO suck-up job. Doesn&#x27;t mention that the developers are paralyzed and unable to work.
crankylinuxuserover 6 years ago
Ok, wow. That story is pure gold. And when your shop is really on its toes, this is how you run Opsec.
nebulous1over 6 years ago
&gt; I had already tried various things to my own employee laptop, but I was not local admin and the disk was fully encrypted.<p>Hang on, if he can boot his laptop does it not follow that he has the necessary information to decrypt the drive?
评论 #18477006 未加载
评论 #18476985 未加载
nunbover 6 years ago
It would be interesting to see the MacOS version of this story, say hacking an office full of Macs, like a Digital Agency or something...
badrabbitover 6 years ago
Excellent reading. In my experience,internal politics is the greatest threat against companies.<p>Most of us here can walk into most companies and engineer end to end encrypted,least access,zero trust,mfa authenticated network using strictly foss tools and methodologies. Question: Who will let you?<p>No joke,OP wasn&#x27;t exaggerating about how easy most of his pentests are. Most companies throw money at it,do risk analysis and say &quot;hmm,this is enough,a compromise is tolerable&quot;.<p>IMO, when it rains,it pours. Risk analysis only tells you what the risk is based on known data. Unknown unknowns will be your doom. Best to build things right even without an incentive.
nubbover 6 years ago
As a security student, reading his methodology was invaluable.
ascarover 6 years ago
He should&#x27;ve joined as a dev instead of marketing. Access to so much more systems to begin with.
评论 #18481180 未加载
quantum_stateover 6 years ago
Nice story while educating people on security ... Thanks!
chmarsover 6 years ago
How did they even notice Powershell?
评论 #18482746 未加载
sharpshadowover 6 years ago
Wonderful:))
itomatoover 6 years ago
Story of a failed pentester, perhaps?<p>Social engineered their way into an unlikely scenario bound to raise suspicion.<p>Tests and methods were pretty successful, otherwise.<p>Still, I cannot fathom why companies insist on the rickety tinkertoy that is Microsoft Windows.
floatbothover 6 years ago
&gt; hauling armloads of old laptops from the IT shack to my cubicle, a small Leaning Tower of Pisa forming under my desk<p>that sounds more unrealistic than properly protected Windows systems tbh. New marketing employee hauling lots of laptops, no one noticed? Like, people that work nearby might&#x27;ve noticed that?
评论 #18477835 未加载
评论 #18477838 未加载
评论 #18477853 未加载
评论 #18477879 未加载