•Found credentials on dark web
•Gained access to servers
•Gained access to client portal
•Found stale servers that were suppose to be decommissioned
•Found excessive amountof ports opened
•Exploited printers and copied print job data such as invoices, HR paperwork, and banking data
•Discovered an app created in M365 and exposed an ongoing breach for over 80 days that was undiscovered due to a phishing email that was not captured
•Gained access to client portal
•Username combination guessed and successful
•Cracked several credentials
•Cracked several credentials
•Found all users through hacking AD server
•Found over 50 exploits easily available and breached environment
•Found over 800,000 records from hacking the NAS
•Found excessive amount of ports opened
•Username combination guessed and successful
•Found over 1500 exploits and breached the environment
•Found over 1M in records in several file shares
•Cracked over 30% of the users accounts
•Exploited over 60 printers and found sensitive data in archives
•Gained access to servers
•Found web application development lacking fundamental cybersecurity best practices
•Exploited Path Traversal
•Exploited faulty open source library
•Exploited a web application due to improper parameter and failure to set proper FRAMESET coding
•Found several vulnerabilities
•Found new printers are not providing updated firmware
•Lack of controls for least privileged access
•Large volume of global admins cameras
•Man in the middle attack through an expired website certificate
•Found various fake domains
•Found exposed internal financial forms
•Exploited user account by finding information from their social media posts
•Exposed weaknesses in firewalls
•Exploited FTP Servers and able to obtain documentation
Copyright © 2024 The Hack Ninja - All Rights Reserved.
Powered by GoDaddy
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.