We used latest BackTrack distro with metasploit framework to exploit the vulnerability.Īfter getting meterpreter shell, we were able to perform various tasks like creating/deleting directories, users, taking hashdump etc. During the penetration testing, we found critical remote code execution vulnerability in the Windows server which led us to the server compromise and returned meterpreter shell. Websense was installed on a Windows 2003 server along with SQL server installed on the same server to store the web access logs. On hitting one unauthorized website, our team could easily trace the IP address of the running Websense instance. Our penetration testing team requested the LAN access from the customer so that the content filtering infrastructure can be checked from inside of the LAN. Objective of this assignment was to get an assurance on the security posture of company’s content filtering infrastructure. Customer is using Websense content filtering product to filter the non-business and malicious internet traffic from getting accessed at the end-users workstations. Torrid Networks was recently engaged by a Gurgaon, Delhi NCR, INDIA based company to conduct a comprehensive penetration testing of its content filtering infrastructure.
0 Comments
Leave a Reply. |