How I compromised nearly 30 accounts of an organisation?

Some organisations in INDIA don’t even bother about the IT security .

So here’s my journey from 0 to 30 accounts take over in a few hours .

I got a proposal to test the internal network of an organisation which I accepted and I visited the site after 2 days .

It started with a BlackBox testing where i have no information related to network and its subnets .

I Just connected my machine with the ethernet cable in their local network and started reconnaissance .

It all started with a network traffic analysis where i got some mail servers login Url’s (Http request) .
After few minutes i was having a hand full of all the Url’s of mail servers which were being used by the company for official work .
But getting few Url’s is not the problem . So at this movement i was stuck with the problem that without having credentials how will i be able to gain access to the mail servers .

I have two choices left at this moment :
1)Authentication bypass/Sqli or any kind of attack possible at the login panel.
2)To get the login credentials anyhow.

Initially I tried with first choice and no results.
Then I shifted my focus from attacks to getting credentials anyhow and i prepared myself to perform social engineering on employees(mainly focussed employees are of IT department) of the company so i asked few questions and got to know that their SSL certificate license of firewall just got expired and they will renew it in few hours .
From the inside, I said BINGO to myself as now I am having an open opportunity to capture request as there’s no SSL security on the firewall itself .
Further I Mapped the internal network and made a long list of hosts connected on the network on almost all the active subnets .

I started capturing and sniffing the traffic and performed arp-poisoning so that I can capture the username/email and passwords .
With this I started getting some juicy results and I did this for a couple of hours and started analysing the results which were loaded with usernames/emails and passwords of the users making request to some IP addresses which could be destination IP address where I can input these credentials .
I got few emails/usernames with blank space in field of password
So, I filtered all the emails/usernames having passwords and made seperate list of it .

Sorted!

Note:Emails/Usernames , Passwords I was getting were in PLAIN TEXT . LOL!!

After filteration of credentials with IP to which the request is made , I started logging in one by one and with this I compromised 28–30 accounts containing few accounts of HR department , IT department , & yes, the Director of the company alongwith many other employees.

Why this happened ??
Due to no/low ssl security at the time of testing .

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Paras Arora

Paras Arora

Social media: @parasarora06 , Penetration Tester | Application Security