Ready to strengthen your defenses?
CLIENT
Confidential
SERVICE
Penetration Testing
INDUSTRY
Telecommunications
YEAR
2025
Problem
Solution
From an external position at a café nearby the client’s office Wi-Fi, our team captured a WPA2 handshake and successfully recovered the network password within 12 hours using a custom, pre-generated dictionary attack with Hashcat.
After gaining network access, we performed internal reconnaissance through passive layer-2 monitoring and active scanning with Nmap, which led to the identification of an outdated IP camera still accessible on the internal subnet. We then obtained the camera’s official firmware image from the manufacturer and unpacked it using Binwalk for static analysis.
Inspection of the extracted binaries with a disassembler revealed multiple strings referencing HTTP paths, indicating the presence of exposed API endpoints used for device management. Further analysis identified a previously unknown vulnerability in one of these endpoints, which could be coerced into executing user-supplied input directly within a shell context, resulting in remote code execution.
Key results
Successful compromise of WPA2 office WiFi from an adjacent public café
Discovery and exploitation of a legacy IP camera with an RCE 0-day
Demonstrated a realistic attacker path requiring no internal credentials or physical access
Client: Confidential
SERVICE
Penetration Testing
YEAR
2024
Fortuna conducted a white-box security assessment to evaluate the impact of recent performance-driven changes to a core payments system.
Client: Confidential
SERVICE
Penetration Testing
YEAR
2025
A digital asset market data provider hired Fortuna to test if limited VPN access could be leveraged to exploit internal systems and escalate privileges in Active Directory.