Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2025 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

The One About Chained Exploits and Pentest Results

November 13, 2020 By Michael Kavka Leave a Comment

Where I work recently had our annual Pen Test. Overall it was not too shabby, we detected them early and could have kicked them out. I’m proud of the defenses and alerting I have helped set up and I monitor. That is not what concerns me. Action items made from the report is what does concern me.

I have yet to see a pen test that does not succeed in some way. There is always vulnerabilities. Pen tests help find them so you can fix them. The disconnect comes in with how they can be reported.

When a report comes in, there is always a dissection of that pen test report to create actionable items, patches, configuration changes and more, that will help make the company more secure. When dealing with a single vulnerability that gets exploited, a level of severity is made by the pen testers on the report, and that should match up with a level of severity on any action list the company set up internally, so that you are patching the most serious issues first and then work down the line. So if you are susceptible to Eternal Blue, that is at a high level of severity, and there is a patch you should apply immediately.

Using all of this, a compromise of say Active Directory is a huge finding. If Domain Admin was gotten well, you are pwned and that is game over man. Yes it is a critical finding, but how did AD get compromised? I tend to see on a report the AD compromise put as a critical finding but it is tends to be more from a chain of vulnerabilities and exploits. Those get broken out and are actionable items at a specific level, which is usually lower than the actual AD compromise. Fixing any one part of that chain would result in AD not being compromised (at least not in that fashion). So now the owners of systems see the report, and the action list created by it, and see Critical: AD Compromised by chaining x, y, and z together. They see each individual link in the chain at Low, Low, medium. What happens? The fix for any part of that chain is now pushed back instead of any one of them getting fixed immediately. There has to be some way the report either shows that getting to AD was done by chaining vulnerabilities that have a low level of being found/exploited, or changing the most severe of the links in the chain to a much higher severity.

I am not a pen tester, I am blue team. I do not know how pen testers decide that X vulnerability is Y severity (for that matter why the same vulnerability would be one severity one year and a different severity the next). I do know that if you go over the report with the pen testers, they should be willing to work with you on finding a way to get at least part of a chain leading to a critical compromise fixed. The best ones should be taking that into account when they write up the report initially.

Think of it this way, IT departments are swamped. They have to pick and choose what they are willing to put on their plate and what they are going to push off. Every0ne though wants critical issues fixed, be they security or other. Coming up with a way, even when the pen test is set up, of reporting the different levels should be done. How a pen test company reports chained compromises should be stated up front. In the end we all want to get to a better security point. Red Teamers should spend some time understanding how hard buy in can be when the Blue Team puts out the Red Teams findings.

Filed Under: General

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

RSS Taggart Institute Intel Feed

  • ICE Is Using a University Building as a Deportation Office and the University Says It Can't Do Anything About It October 28, 2025 Jason Koebler
  • BiDi Swap: The bidirectional text trick that makes fake URLs look real October 28, 2025 Sponsored by Varonis
  • Lawsuit Accuses a16z of Turning Roblox Into a School Shooter's Playground October 28, 2025 Matthew Gault
  • New Atroposia malware comes with a local vulnerability scanner October 28, 2025 Bill Toulas
  • AI browsers face a security flaw as inevitable as death and taxes October 28, 2025 Avram Piltch
  • Beatings, killings, and lasting fear: The human toll of MoD's Afghan data breach October 28, 2025 Connor Jones
  • Social Engineering People’s Credit Card Details October 28, 2025 Bruce Schneier
  • Google says reports of a Gmail breach have been greatly exaggerated October 28, 2025 Carly Page
  • A phishing with invisible characters in the subject line, (Tue, Oct 28th) October 28, 2025
  • Chatbots parrot Putin's propaganda about the illegal invasion of Ukraine October 28, 2025 Thomas Claburn

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP