GEANONIMISEERDE ENGAGEMENTS

Case studies

Voorbeeld-cases met focus op attack chains, bewijs en remediation. Details zijn bewust geanonimiseerd.

SaaS platform • Auth chain Scope: Web + API • Resultaat: account takeover → data exposure
  • BOLA/IDOR op API + token audience verkeerd gescoped.
  • Chain: low-priv → privilege escalation → export van klantdata.
  • Fix: authZ checks centraliseren + resource-level policies + tests.
FinTech • Cloud keys & lateral Scope: AWS • Resultaat: secrets → lateral movement → admin
  • Secrets in CI logs + permissive IAM policies.
  • Chain: key reuse → role assumption → access tot prod data store.
  • Fix: short-lived creds, least-priv IAM, secret scanning, guardrails.
Enterprise • AD escalation Scope: Internal • Resultaat: workstation → domain admin
  • Misconfig + weak delegation leidde tot privilege escalation.
  • Chain: foothold → ticket abuse → DC admin (met bewijs, geen impact).
  • Fix: hardening GPO’s, tiering model, detection tuning, patch cadence.
E-commerce • Supply chain Scope: Web + CI/CD • Resultaat: build tampering (prevented)
  • Over-permissive deploy token + missing branch protections.
  • Chain: PR abuse → pipeline secrets → attempted artifact modification (stop op RoE).
  • Fix: signed builds, protected environments, least-priv tokens, approvals.