Ready to strengthen your defenses?
CLIENT
Confidential
SERVICE
Penetration Testing
INDUSTRY
Trading Data Provider
YEAR
2025
Problem
Solution
From this foothold, we conducted targeted internal reconnaissance and identified Jira and Confluence instances operating within the network. Our assessment identified a non-primary Confluence instance, used for staging and legacy team workflows, that had not been maintained in line with the organization’s patching SLAs. This instance remained vulnerable to CVE-2022-26134, a widely exploited remote code execution vulnerability.
Fortuna leveraged this flaw to gain a local user account on the affected host. Although the obtained account did not have root privileges, the vulnerability executed code as the Confluence service account. This allowed us to instrument the running Confluence process using strace and observe authentication-related system calls. As a result, we were able to recover LDAP credentials transmitted in cleartext due to insecure directory configuration.
The Confluence service account, while restricted locally, was associated with a privileged Active Directory account used for LDAP authentication. Use of these credentials enabled direct authentication to domain services and resulted in full administrative access, demonstrating a complete compromise of the organization’s identity infrastructure.
Key results
Validated attack path beginning from basic VPN access
Identified and exploited Confluence RCE (CVE-2022-26134)
Discovered a novel internal technique for credential sniffing
Achieved full domain controller compromise, proving risk of total internal takeover
Client: Confidential
SERVICE
Penetration Testing
YEAR
2024
Fortuna conducted a white-box security assessment to evaluate the impact of recent performance-driven changes to a core payments system.
Client: Confidential
SERVICE
Penetration Testing
YEAR
2025
Fortuna conducted an on-site office penetration test to see if an attacker could access the client's enterprise network via physical or wireless weaknesses.