Real-Time BlackBox Internal Penetration Testing

This blog post majorly covers to get access to the corporate network while conducting the Black-Box Internal Penetration Testing (with physical access to the corporate office) by covering the major areas:

Assessment Process

Areas

  1. Wired

    • RJ45 (Ethernet) Port

  2. Wireless

    • Guest SSID

    • Contractor / Partner SSID

    • Corporate SSID

  3. Unlocked/Unprotected/Unattended Devices and/or documents

  4. Password Spraying Can be used for Internal/External Pentesting depending on the attack-vector

Wired

  • NAC Testing

  • Devices Testing (VoIP, Printer, etc)

  • Asset Discovery

  • Scanning & Enumeration

Wireless

  • Discovering Hidden Networks

  • Guest SSID Testing

    • Hunting for connected corporate users

    • Scanning APs & server subnets

    • Captive Portal Testing

    • Rogue access point

    • Segmentation Testing between guest & corporate network

  • Contractor / Partner SSID Testing

    • Connected users

    • Scanning AP & server subnets

    • Captive Portal Testing

    • Rogue access point

    • Segmentation Testing between contractor segmentation & corporate network

  • Corporate SSID Testing

    • Evil-Twin Attack

    • Handshake Capture

Unlocked/Unprotected/Unattended Devices and/or documents

  • Unlocked computers/laptops

  • Unprotected/Unattended devices (eg: advertisement screen connected with the network, kiosk etc)

  • Credentials on sticky notes

Password Spraying (weak password policy)

  • Running password spray on OWA/exchange/office.com

  • Running password spray on VPN

Hint: Credential stealing can be really useful if it can be used to authenticate on corporate SSID

Reference

https://attack.mitre.org/tactics/enterprise/ https://www.sans.org/reading-room/whitepapers/auditing/conducting-penetration-test-organization-67 https://www.eccouncil.org/what-is-penetration-testing/ https://tools.kali.org/wireless-attacks/hostapd-wpe https://blog.pentesteracademy.com/cracking-wpa2-psk-passphrase-in-absence-of-the-access-point-f63116970a48 https://github.com/dafthack/MailSniper

Last updated

Was this helpful?