Activity History
60 events · May 13 – May 19
Looked up CVE-2024-1234 — CVSS 9.8, EPSS 0.94, exploit confirmed functional. Linked to fnd-001.
Acme Corp External PentestAttached sqli_union_proof.png (412KB) — shows full user table dump via UNION injection.
Acme Corp External PentestAsserted edge: SVC_BACKUP → DC01.techstart.local [PATH_TO] (weight: 3). Confidence: 0.91.
TechStart Internal Red TeamClaim promoted to FACT: api.acme.com Node.js API has no rate limiting on /api/v1/users (verified 5x).
Acme Corp External PentestAdded fnd-004: Stored XSS in product review comment field. Severity HIGH. PoC confirmed in Firefox 124.
Acme Corp External PentestLooked up T1558.003 (Kerberoasting) — mapped to ts-v1 vulnerability node, linked SVC_BACKUP credential.
TechStart Internal Red TeamSearch: "deserialization" → 3 related findings across 2 engagements. Surfaced Commons Collections gadget chain.
Acme Corp External PentestFound 2 similar past engagements with JWT hardcoding pattern. FinTech + API + public repo = high-confidence match.
FinTech API Security AuditManual verification of RCE deserialization — exec whoami returned www-data on api.acme.com:8443.
Acme Corp External PentestProposed pay-007 (Responder + NTLMRelayx) targeting FS01 via LLMNR poisoning. Estimated 79% success rate.
TechStart Internal Red TeamContext bundle exported for eng-001: 42 claims, 15 nodes, 14 edges. Bundle ID: ctx-20260517-001.
Acme Corp External PentestAdded fnd-003: Broken Access Control on /admin/*. Server returns 200 for unauthenticated direct URL requests.
Acme Corp External PentestAsserted edge: WS-PENTEST01 → ts-v1 [EXPLOITED] (weight: 3). Kerberoasting executed from compromised workstation.
TechStart Internal Red TeamClaim asserted: admin.acme.com affected by same BAC as acme.com — both skip server-side authz. Tier: WORKING.
Acme Corp External PentestVerified IDOR on /api/v2/transactions/:id — sequential UUIDs confirmed exploitable. 50 transactions accessed.
FinTech API Security AuditLooked up CVE-2011-3389 (BEAST) — CVSS 5.9, TLSv1.0 downgrade confirmed on lb.acme.com. Linked to fnd-007.
Acme Corp External PentestProposed pay-008 (SharpHound) for BloodHound AD enumeration. Running as jsmith — domain user privs sufficient.
TechStart Internal Red TeamSearch: "admin panel access control" → 2 matches in eng-001, 1 in eng-003. Pattern: React SPA frontend auth only.
Acme Corp External PentestAttached rce_deserialization_poc.mp4 (8.2MB) — screen recording of RCE PoC on /api/session/restore.
Acme Corp External PentestAsserted edge: superAdmin JWT → /api/v2/transactions IDOR [EXPLOITS]. Credential enables access control bypass.
FinTech API Security AuditLooked up T1021.002 (SMB/Admin Shares) — mapped lateral movement path: SVC_BACKUP → FS01 via admin share.
TechStart Internal Red TeamAdded fnd-008: SMB Signing Disabled on 14 file servers. Confirmed NTLM relay with Responder on FS01.
TechStart Internal Red TeamClaim: nginx/1.24.0 on a-h1 has TLS 1.0 enabled — sslscan output confirms. Tier: FACT.
Acme Corp External PentestNmap scan complete on 203.0.113.0/24 — 23 live hosts, 4 in scope. Open: 80, 443, 22, 8080, 9090.
Acme Corp External PentestLooked up CWE-321 (Use of Hard-coded Cryptographic Key) — matched ft-v1 JWT hardcoded secret finding.
FinTech API Security AuditContext bundle exported for eng-002: 28 claims, 9 nodes, 9 edges. Bundle ID: ctx-20260516-002.
TechStart Internal Red TeamProposed pay-001 (PowerShell AMSI Bypass v3) for post-RCE persistence on acme.com Windows server.
Acme Corp External PentestAttached jwt_forge_proof.txt — forged superAdmin token and API response showing full account listing.
FinTech API Security AuditAsserted edge: FS01.techstart.local → SMBSigningDisabled vuln [VULNERABLE_TO] (weight: 2).
TechStart Internal Red TeamSearch: "CORS wildcard" → 0 findings. Search: "rate limit" → 1 finding (eng-001 api.acme.com).
Acme Corp External PentestAdded fnd-005: Kerberoastable SVC_BACKUP. Cracked RC4 ticket in 3h 47m with hashcat -m 13100.
TechStart Internal Red TeamClaim: DC01.techstart.local holds all 5 FSMO roles — single point of failure for domain. Tier: FACT.
TechStart Internal Red TeamLooked up T1087.002 (Domain Account Discovery) — BloodHound query identified 3 Kerberoastable accounts total.
TechStart Internal Red TeamSharpHound collection complete — 847 nodes, 2,341 edges ingested into BloodHound. Shortest DA path: 4 hops.
TechStart Internal Red TeamSimilarity check: eng-001 API pattern matches 3 prior engagements — all had SQLi in /users endpoint.
Acme Corp External PentestProposed pay-006 (SQLMap blind time-based) targeting /api/v1/users?id= with WAF evasion tamper scripts.
Acme Corp External PentestClaim: GraphQL introspection enabled on /graphql endpoint — 23 mutations exposed including deleteUser. Tier: FACT.
FinTech API Security AuditAsserted edge: WS-PENTEST01 → DC01 [AUTHENTICATES_TO] — Kerberos TGT request captured in Wireshark.
TechStart Internal Red TeamAttached admin_panel_bypass.png — shows admin dashboard accessible without authentication.
Acme Corp External PentestLooked up T1552.001 (Credentials in Files) — matched ft-v1. GitHub dork confirmed 847-day-old secret exposure.
FinTech API Security AuditInitial foothold confirmed on WS-PENTEST01 as jsmith. Domain user. SMB access to 3 file shares.
TechStart Internal Red TeamContext bundle for blog draft blog-001 — extracted 3 sanitized findings, redacted all client-identifying data.
Acme Corp External PentestAsserted edge: [email protected] credential → T1078 [ENABLES] — credential enables valid account abuse.
Acme Corp External PentestAdded IDOR finding: /api/v2/transactions/:id — sequential UUIDs, no user scoping. CVSS 8.1.
FinTech API Security AuditSearch: "kerberos" → 1 finding (fnd-005). Search: "ntlm relay" → 1 finding (fnd-008). 0 false positives.
TechStart Internal Red TeamConfirmed credential: [email protected] / [REDACTED] — source: SQLi dump. Admin console access verified.
Acme Corp External PentestClaim: FinTech API uses HS256 (symmetric) JWT — secret same for all environments. Tier: FACT (confirmed via GitHub commit).
FinTech API Security AuditProposed pay-005 (Rubeus Kerberoast) against SVC_BACKUP SPN. Expected crack time < 6h with rockyou + rules.
TechStart Internal Red TeamSearched CVE database for SMB signing bypass — no specific CVE. CWE-300 applies. Mapped to fnd-008.
TechStart Internal Red TeamAttached sqli_proof.png (234KB) — blind time-based injection confirmed on /api/v1/users?id=1.
Acme Corp External PentestAsserted edge: Node.js API :8080 → SQLi vuln [VULNERABLE_TO] (weight: 3). Highest-priority path confirmed.
Acme Corp External PentestSimilarity: eng-003 JWT pattern matches 1 prior engagement (fintech-2025-q4). Same HS256 hardcoded key class.
FinTech API Security AuditAdded fnd-001: SQL Injection CRITICAL in /api/v1/users. Confirmed blind time-based + UNION. Data exfiltrated.
Acme Corp External PentestContext bundle for AD attack path analysis: SVC_BACKUP → FS01 → DC01. 3-hop domain admin path documented.
TechStart Internal Red TeamGoogle dork confirmed JWT secret in GitHub — repo public, commit 847 days old, no secret scanning enabled.
FinTech API Security AuditLooked up T1190 (Exploit Public-Facing App) — FACT tier, 3 confirmed instances in engagements this month.
Acme Corp External PentestAdded fnd-002: RCE via Java deserialization on /api/session/restore. Commons Collections 3.1 gadget chain.
Acme Corp External PentestClaim: /api/session/restore accepts serialized Java objects without type validation. Tier: WORKING → FACT after PoC.
Acme Corp External PentestEngagement kick-off: scope confirmed 10.0.0.0/8. Initial nmap: 342 live hosts, 18 DCs identified across 4 domains.
TechStart Internal Red TeamInitial search seeded knowledge base for eng-001: 0 prior findings. Starting fresh graph with 3 confirmed host nodes.
Acme Corp External Pentest