Ready to strengthen your defenses?

Let's discuss your next
security milestone
CONTACT
CONFIDENTIAL

Demonstrating total AD takeover from low privilege VPN access

CLIENT

Confidential

SERVICE

Penetration Testing

INDUSTRY

Trading Data Provider

YEAR

2025

A mid-sized digital asset market data provider engaged Fortuna to conduct an internal network penetration test. The objective was to determine whether an attacker with limited VPN access could exploit weaknesses in internal web applications and escalate privileges into the Active Directory domain.

Problem

Following a publicly disclosed insider-related security incident at a peer organization, leadership sought to understand how their own systems would behave under real-world attack conditions, and whether existing controls would effectively limit the impact of such events.

Solution

Fortuna began the engagement by obtaining initial internal access through the client’s VPN, simulating the level of access available to a low-privilege contractor or a compromised employee account.

From this foothold, we conducted targeted internal reconnaissance and identified Jira and Confluence instances operating within the network. Our assessment identified a non-primary Confluence instance, used for staging and legacy team workflows, that had not been maintained in line with the organization’s patching SLAs. This instance remained vulnerable to CVE-2022-26134, a widely exploited remote code execution vulnerability.

Fortuna leveraged this flaw to gain a local user account on the affected host. Although the obtained account did not have root privileges, the vulnerability executed code as the Confluence service account. This allowed us to instrument the running Confluence process using strace and observe authentication-related system calls. As a result, we were able to recover LDAP credentials transmitted in cleartext due to insecure directory configuration.

The Confluence service account, while restricted locally, was associated with a privileged Active Directory account used for LDAP authentication. Use of these credentials enabled direct authentication to domain services and resulted in full administrative access, demonstrating a complete compromise of the organization’s identity infrastructure.

Key results

01

Validated attack path beginning from basic VPN access

02

Identified and exploited Confluence RCE (CVE-2022-26134)

03

Discovered a novel internal technique for credential sniffing

04

Achieved full domain controller compromise, proving risk of total internal takeover

Explore related
case studies

Client: Confidential

SERVICE

Penetration Testing

YEAR

2024

White-box assessment reveals systemic risk in a payments platform

Fortuna conducted a white-box security assessment to evaluate the impact of recent performance-driven changes to a core payments system.

EXPLOREEXPLORE

Client: Confidential

SERVICE

Penetration Testing

YEAR

2025

Real-world office penetration test reveals IoT to enterprise attack path

Fortuna conducted an on-site office penetration test to see if an attacker could access the client's enterprise network via physical or wireless weaknesses.

EXPLOREEXPLORE

Let's discuss your next security or compliance milestone

SCALE WITH SECURITYSCALE WITH SECURITY