Skip to content
Silicon Shecky

Silicon Shecky

Infosec Practitioner

  • New Year, New Post, from the start General
  • First Defcon – The results Reviews
  • Defender, KQL and Lockbit Microsoft
  • Do well, not be “popular” Ramblings
  • Defense Layers: A Case Study Microsoft
  • Device vs. User Microsoft
  • Ransomware, Are You Ready? General
  • Gatekeeping and Treatment of Others Rants

The One About Chained Exploits and Pentest Results

Posted on November 13, 2020 By Michael Kavka No Comments on The One About Chained Exploits and Pentest Results

Where I work recently had our annual Pen Test. Overall it was not too shabby, we detected them early and could have kicked them out. I’m proud of the defenses and alerting I have helped set up and I monitor. That is not what concerns me. Action items made from the report is what does concern me.

I have yet to see a pen test that does not succeed in some way. There is always vulnerabilities. Pen tests help find them so you can fix them. The disconnect comes in with how they can be reported.

When a report comes in, there is always a dissection of that pen test report to create actionable items, patches, configuration changes and more, that will help make the company more secure. When dealing with a single vulnerability that gets exploited, a level of severity is made by the pen testers on the report, and that should match up with a level of severity on any action list the company set up internally, so that you are patching the most serious issues first and then work down the line. So if you are susceptible to Eternal Blue, that is at a high level of severity, and there is a patch you should apply immediately.

Using all of this, a compromise of say Active Directory is a huge finding. If Domain Admin was gotten well, you are pwned and that is game over man. Yes it is a critical finding, but how did AD get compromised? I tend to see on a report the AD compromise put as a critical finding but it is tends to be more from a chain of vulnerabilities and exploits. Those get broken out and are actionable items at a specific level, which is usually lower than the actual AD compromise. Fixing any one part of that chain would result in AD not being compromised (at least not in that fashion). So now the owners of systems see the report, and the action list created by it, and see Critical: AD Compromised by chaining x, y, and z together. They see each individual link in the chain at Low, Low, medium. What happens? The fix for any part of that chain is now pushed back instead of any one of them getting fixed immediately. There has to be some way the report either shows that getting to AD was done by chaining vulnerabilities that have a low level of being found/exploited, or changing the most severe of the links in the chain to a much higher severity.

I am not a pen tester, I am blue team. I do not know how pen testers decide that X vulnerability is Y severity (for that matter why the same vulnerability would be one severity one year and a different severity the next). I do know that if you go over the report with the pen testers, they should be willing to work with you on finding a way to get at least part of a chain leading to a critical compromise fixed. The best ones should be taking that into account when they write up the report initially.

Think of it this way, IT departments are swamped. They have to pick and choose what they are willing to put on their plate and what they are going to push off. Every0ne though wants critical issues fixed, be they security or other. Coming up with a way, even when the pen test is set up, of reporting the different levels should be done. How a pen test company reports chained compromises should be stated up front. In the end we all want to get to a better security point. Red Teamers should spend some time understanding how hard buy in can be when the Blue Team puts out the Red Teams findings.

General

Post navigation

Previous Post: Passing the Cert – SANS Notes and thoughts
Next Post: Solarwinds Sunbursts a Supernova: Early lessons learned

Related Posts

  • New Year, New Post, from the start General
  • Ransomware, Are You Ready? General
  • Passing the Cert – SANS Notes and thoughts General
  • Random Stream of Thoughts General
  • Year End Musings General
  • Welcome to 2019, please hold on General

More Related Articles

New Year, New Post, from the start General
Ransomware, Are You Ready? General
Passing the Cert – SANS Notes and thoughts General
Random Stream of Thoughts General
Year End Musings General
Welcome to 2019, please hold on General

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • About
  • Links
    • Burbsec
    • BSides312
    • Infosec Exchange Mastodon
    • BSidesRoc
    • Hacks4Pancakes Blog
    • Krebs On Security
    • Bleeping Computer
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Archives
  • Social Media

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP

RSS Taggart Institute Intel Feed

  • Trump wants to take a battle axe to CISA again and slash $707M from budget April 3, 2026 Jessica Lyons
  • When an Attacker Meets a Group of Agents: Navigating Amazon Bedrock's Multi-Agent Applications April 3, 2026 Jay Chen and Royce Lu
  • Friday Squid Blogging: Jurassic Fish Chokes on Squid April 3, 2026 Bruce Schneier
  • LinkedIn secretely scans for 6,000+ Chrome extensions, collects data April 3, 2026 Lawrence Abrams
  • OpenClaw gives users yet another reason to be freaked out about security April 3, 2026 Dan Goodin
  • FCC proposes $4.5 million fine for voice service provider hosting ‘suspicious’ foreign call traffic April 3, 2026
  • CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers April 3, 2026
  • DomainTools Investigations | DPRK Malware Modularity: Diversity and Functional Specialization April 3, 2026
  • EU cyber agency attributes major data breach to TeamPCP hacking group April 3, 2026
  • Hims & Hers warns of data breach after Zendesk support ticket breach April 3, 2026 Bill Toulas
  • Do not get high(jacked) off your own supply (chain) April 3, 2026 Dave Liebenberg
  • Axios NPM supply chain incident April 3, 2026 Nick Biasini
  • New Year, New Post, from the start General
  • First Defcon – The results Reviews
  • Defender, KQL and Lockbit Microsoft
  • Do well, not be “popular” Ramblings
  • Defense Layers: A Case Study Microsoft
  • Device vs. User Microsoft
  • Ransomware, Are You Ready? General
  • Gatekeeping and Treatment of Others Rants

Social Media

  • Bluesky
  • Mastodon
  • Twitter

Copyright © 2026 Silicon Shecky.