Ready to strengthen your defenses?

Let's discuss your next
security milestone
CONTACT
CONFIDENTIAL

Real-world office penetration test reveals IoT to enterprise attack path

CLIENT

Confidential

SERVICE

Penetration Testing

INDUSTRY

Telecommunications

YEAR

2025

Fortuna conducted a realistic adversarial penetration test to assess whether an external attacker could gain unauthorized access to the client’s internal enterprise network through weaknesses in physical proximity, wireless infrastructure, or unmanaged IoT devices.

Problem

The client operated sensitive telecommunications systems from a physical office environment that had not undergone a comprehensive adversarial security assessment. While perimeter controls were in place, leadership lacked confidence that legacy hardware, wireless access points, or IoT devices had not introduced unintended lateral-movement paths into the enterprise network.

Solution

Fortuna conducted a targeted internal red-team engagement focused on wireless compromise and IoT exploitation.

From an external position at a café nearby the client’s office Wi-Fi, our team captured a WPA2 handshake and successfully recovered the network password within 12 hours using a custom, pre-generated dictionary attack with Hashcat.

After gaining network access, we performed internal reconnaissance through passive layer-2 monitoring and active scanning with Nmap, which led to the identification of an outdated IP camera still accessible on the internal subnet. We then obtained the camera’s official firmware image from the manufacturer and unpacked it using Binwalk for static analysis.

Inspection of the extracted binaries with a disassembler revealed multiple strings referencing HTTP paths, indicating the presence of exposed API endpoints used for device management. Further analysis identified a previously unknown vulnerability in one of these endpoints, which could be coerced into executing user-supplied input directly within a shell context, resulting in remote code execution.

Key results

01

Successful compromise of WPA2 office WiFi from an adjacent public café

02

Discovery and exploitation of a legacy IP camera with an RCE 0-day

03

Demonstrated a realistic attacker path requiring no internal credentials or physical access

Explore related
case studies

Client: Confidential

SERVICE

Penetration Testing

YEAR

2024

White-box assessment reveals systemic risk in a payments platform

Fortuna conducted a white-box security assessment to evaluate the impact of recent performance-driven changes to a core payments system.

EXPLOREEXPLORE

Client: Confidential

SERVICE

Penetration Testing

YEAR

2025

Demonstrating total AD takeover from low privilege VPN access

A digital asset market data provider hired Fortuna to test if limited VPN access could be leveraged to exploit internal systems and escalate privileges in Active Directory.

EXPLOREEXPLORE

Let's discuss your next security or compliance milestone

SCALE WITH SECURITYSCALE WITH SECURITY