Ready to strengthen your defenses?
CLIENT
Confidential
SERVICE
Penetration Testing
INDUSTRY
Telecommunications
YEAR
2025
Problem
Solution
The camera's firmware was downloaded (an official image from the manufacturer's site), (unpacked with binwalk), reverse-engineered (with a disassembler), and found to contain a previously unknown (0-day) vulnerability (within its embedded http server) enabling remote code execution. Further analysis revealed the camera had dual interfaces—one for CCTV infrastructure and a second bridged into the enterprise network. By compromising the device, we gained authenticated internal access and validated the risk of cross-network lateral movement through unmanaged IoT hardware.
Key results
Successful compromise of WPA2 office WiFi from an adjacent public café
Discovery and exploitation of a legacy IP camera with an RCE 0-day
Verified that the camera bridged CCTV and enterprise networks
Gained foothold into the enterprise network through the exploited device
Demonstrated a realistic attacker path requiring no internal credentials or physical access
Client: Confidential
SERVICE
Penetration Testing
YEAR
2025
A mid-sized consulting firm hired Fortuna to test if limited VPN access could be leveraged to exploit internal apps and escalate privileges in Active Directory.
Client: Confidential
SERVICE
Penetration Testing
YEAR
2024
Fortuna ran a red-team assessment of the firm's office, simulating an attacker via device exploitation and privilege escalation.