CASE STUDY
Advancing Cyber Posture for a Federal Agency Through Comprehensive Penetration Testing

Due to its significant interaction with external stakeholders, constituents, and other federal agencies, a large federal agency had a broad threat surface it had to secure. The agency needed support for its comprehensive cybersecurity strategy aimed at meeting regulatory requirements, preventing data breaches, and proactively identifying and mitigating cybersecurity vulnerabilities.

These compliance requirements included adherence to Federal mandates such as the Federal Information Security Modernization Act (FISMA), National Institute of Standards and Technology (NIST) Special Publications (SP) 800 -53 and 800-115, and the Federal Risk and Authorization Management Program (FedRAMP).

The agency customer also faced recurring medium-level security vulnerabilities in their legacy web applications, particularly related to the “Missing Secure Attribute in Encrypted Session (SSL) Cookie” issue. This vulnerability affected a significant portion of their application portfolio, necessitating a scalable solution to mitigate the risk.

Solution

Makpar offers the following services that support the mission of this federal agency:

  • Comprehensive penetration testing and red teaming
  • Threat modeling
  • Vulnerability assessment
  • Code security and analysis
  • General security assessment


For this project, the solution strategy for penetration testing included a repeatable five-step approach that included:

Pre-Engagement Interactions

Before any testing begins, it is crucial to establish clear communication with the client to understand their specific goals, objectives, and requirements. This phase involves scoping the engagement, defining rules of engagement, and setting boundaries to ensure that the testing aligns with the client’s needs. Detailed planning is conducted to determine which systems, networks, and applications will be in scope, as well as the specific testing methodologies to be used. This step also includes obtaining necessary permissions and access credentials, ensuring that all legal and compliance requirements are met.

During the discovery phase, the team conducts extensive reconnaissance to gather as much information as possible about the target environment. This involves both passive and active techniques, such as network scanning, vulnerability scanning, and gathering intelligence on the target’s infrastructure, applications, and potential attack vectors. The goal is to identify potential vulnerabilities and weaknesses that can be exploited. This phase also includes analyzing publicly available information, such as domain registrations, social media profiles, and other sources that could provide valuable insights into the target’s security posture. All pieces of information from Discovery are used to build an intelligence profile to inform later testing stages.

With the information gathered during the discovery phase, the team moves on to the exploitation phase, where they attempt to gain unauthorized access to the target systems and networks. This involves using various techniques, such as exploiting known vulnerabilities, conducting phishing attacks, and leveraging social engineering tactics. The objective is to simulate real-world attack scenarios and understand how an adversary might penetrate the target environment. Once access is gained, the team works to escalate privileges, move laterally within the network, and identify critical assets and data that could be compromised. Vulnerabilities are evaluated for a realistic assessment of risk and how they apply within the context of the organization.

After successfully gaining access and exploiting vulnerabilities, the team conducts a thorough analysis of the findings. This involves documenting the vulnerabilities discovered, the methods used to exploit them, and the potential impact on the organization. Detailed reports are generated, providing actionable insights and recommendations for remediation. The reports are tailored to different audiences, including technical teams who need to implement fixes, as well as executive stakeholders who require a high-level overview of the risks and proposed mitigation strategies. The goal is to ensure that the organization fully understands the findings and can take appropriate steps to strengthen its security posture.

The final step in the penetration testing process is retesting to verify that the identified vulnerabilities have been effectively remediated. This involves re-running the tests and attack scenarios to ensure that the fixes implemented by the client have successfully addressed the issues. Retesting provides assurance that the security gaps have been closed and that the organization is now better protected against potential threats. It also helps to identify any new vulnerabilities that may have been introduced during the remediation process, ensuring continuous improvement and resilience.

The solution strategy also involved implementing a Scalable Threat Modeling approach, utilizing a pattern-based methodology to identify common architectural patterns across the client’s applications. This approach allowed for the development of targeted mitigation strategies to address identified vulnerabilities, align with industry best practices and integrate seamlessly into the client’s existing AppSec testing framework.

From a code security and analysis perspective, Makpar’s code reviewers and security engineers conducted thorough assessments, providing vulnerability reports with detailed insights into likelihood, impact, and severity.

The Challenge

Results

Critical Vulnerability Identification:

We identified a critical level privilege escalation vulnerability that existed across all workstations in an organization, representing how nation state actors maintain high-privileged access inside computer networks. This vulnerability had been present for at least 2 years before discovery.

Active Exploitation and Response:

We actively exploited the identified vulnerability to observe how the system and alerts responded. We collaborated directly with the network security monitoring team to validate the alerts and assist them in understanding how to detect similar attacks in the future.

Complex Attack Paths in Active Directory:

We located complex attack paths within Active Directory, requiring detailed exploitation scenarios leveraging Kerberos. By forging Kerberos tickets for a specific service as any administrative user account in the domain, we proved a risk that had been previously unknown to the organization for years.

Web Application and API Vulnerabilities:

We provided thorough and detailed information about web application and API vulnerabilities before they were released into production, ensuring the confidentiality, integrity, and availability of their systems to make them resilient to attack.

In today’s rising threat environment, PTCS is vital for any agency to understand and mitigate any cyber vulnerability.

A pattern-based approach to threat modeling effectively scales security efforts across multiple applications.

Government agencies now have a method for understanding threats from external actors and how to best mitigate these threats.

Tools used

OWASP's Threat Modeling tools

HCL AppScan Enterprise (ASE) for Dynamic Application Security Testing (DAST)

Custom scripts developed to automate aspects of the threat modeling process

Key Takeaways

Best Practices

Adhering to the Makpar repeatable five-step approach to penetration testing highlighted above.

Integrating threat modeling into the CI/CD pipeline, ensuring continuous updates to the threat model based on new findings and adopting a pattern-based approach for rapid scaling across multiple applications.

Supporting secure code reviews and integrating SAST and DAST into DevOps processes.