PaulDotCom mailing list archives

Re: Pen Testing - Corporate laptop theft


From: Forgotten <Forgotten () unallocatedspace org>
Date: Tue, 14 Jan 2014 16:36:19 -0500

I was told to steal a register from one of our stores.... They held the
door and thanked me as I walked out with the register unauthenticated.

Forgotten

On Tuesday, January 14, 2014, Tim Krabec <tkrabec () gmail com> wrote:
You could look at a way of tagging laptops as stolen to show how "easy"
it is to steal them
then use a similar approach to Robin
Tim Krabec
tkrabec.com
Bio


On Wed, Jan 8, 2014 at 7:12 PM, Robin Wood <robin () digininja org> wrote:



On 8 January 2014 23:45, Jamil Ben Alluch <jamil () autronix com> wrote:

Hello,
I was working on a mental exercise to see how far a pen test could be
taken, and came up with this question for which I'd like to have some input
from those who have done it or would never do it and why (any specific case
that could be shared).
Has it ever come in your scope/rules of engagement the concept of
stealing a corporate laptop/device from a given employee given the
possibility (with the organization's blessing of course) and use that to
leverage access say to a VPN, admin panels, etc?
The concept itself seems to be at the very edge of legality, but I was
wondering if this is something that has been attempted and successfully
bore fruit.
The given scenario I was thinking was about people who work out of the
office but still have access to critical systems/data within the
organization and become careless with their devices outside of the work
place (starbucks, restaurant, airport, bus station, etc..) - It's not hard
to imagine somebody snatching or borrowing the device in order to gain
access to a deeper level.

I've never stolen one but I've been given a corporate iPad and told to
see how far I could get. I guessed the PIN, found stored VPN creds,
connected, exploited the Citrix environment, pivoted and exploited more and
ended up as domain admin.

It is really fun exercise having to go through so many different
technologies.

Robin


Anyways, food for thought.
Best Regards,
--
Jamil Ben Alluch, B.Ing., GCIH
jamil () autronix com
+1-819-923-3012
ᐧ
_______________________________________________
gpwn-list mailing list
gpwn-list () lists sans org
https://lists.sans.org/mailman/listinfo/gpwn-list



_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com


_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Current thread: