Ready to strengthen your defenses?
CLIENT
Confidential
SERVICE
Penetration Testing
INDUSTRY
Consulting
YEAR
2025
Problem
Solution
Our assessment revealed that Confluence was still vulnerable to CVE-2022-26134, a widely exploited remote code execution flaw. Fortuna exploited the vulnerability to obtain a local account on the host. Even though the account did not have root privileges, we identified a previously unseen method for sniffing Confluence credentials in transit (using strace to monitor memory usage of the confluence process, and capture cleartext enterprise passwords in transit to the LDAP server). This technique enabled us to recover the domain administrator's password.
Using the compromised credentials, we escalated privileges and achieved full administrative access to the client's Active Directory domain controller, demonstrating complete compromise of identity infrastructure.
Key results
Validated attack path beginning from basic VPN access
Identified and exploited Confluence RCE (CVE-2022-26134)
Discovered a novel internal technique for credential sniffing
Recovered domain administrator credentials
Achieved full domain controller compromise, proving risk of total internal takeover
Client: Confidential
SERVICE
Penetration Testing
YEAR
2025
Fortuna conducted an on-site office penetration test to see if an attacker could access the client's enterprise network via physical or wireless weaknesses.
Client: Confidential
SERVICE
Penetration Testing
YEAR
2024
Fortuna ran a red-team assessment of the firm's office, simulating an attacker via device exploitation and privilege escalation.