Kyuande Johnson
Ethical Hacking
Passive Reconnaissance
McKean Defense Group
McKean Defense is an employee-owned Naval Life Cycle Management, Engineering, and Program Management business headquartered in Philadelphia, PA. McKean Defense’s engineers work to deploy new shipboard technologies, integrate information technology across shipboard platforms, and develop strategies to support the Warfighter.
The company’s website http://mckean-defense.com/ IP: (70.35.201.37) contains information about executive leadership and details about services provided to Navy Programs. McKean Defense was founded in 2006 by CEO Joe Carolini, Vice President Larry D. Burrill, and Leonard F. DeStefano. Executive board members include Roberta Chagnot (Chief Marketing Officer), Mike Denny (Chief Strategy and Growth Officer) Stuart Macaleer (Chief Financial Officer) Christine Pingelli (Chief Human Resources Officer). McKean Defense has locations in the District of Columbia, California, Virginia, and Pennsylvania.
The company website also contained brief information about Naval programs. Mckean Defense has information uploaded into the Naval Tactical Command Support System (NTCSS) to ultimately support their operations. McKean Defense database administrators collect, verify data accuracy, and enter information from the various activities.
The NTCSS database provides ships force the capability to manage and maintain personnel records consisting of more than sixteen thousand records, material and parts information for identifying equipment onboard for approximately one hundred eighty thousand items, and material and parts information for approximately thirty thousand items. Displaying this information publicly exposes the fact that McKean has access to Navy Database. Which can motivate adversaries to target Mckean Defense Engineers to gain access to the NTCSS database.
Linkedin provided a wealth of information about the technology used in the company. After searching the profiles of many Engineers and IT Specialists. There was some useful information about the technology being used in the company. McKean Defense manages its users with Active Directory. Which means that McKean operated under a Windows Environment. Discovered that they operate under Microsoft Azure. This means that McKean users are using Microsoft Office Products and Authenticating with Microsoft Authenticator. Having Knowledge of the software being used can motivate adversaries to discover vulnerabilities for software that happen to be outdated and running on McKean’s Systems.
McKean uses Spiceworks as its Ticketing System. They are partnered with Datto Cyber Security Company.
Using Google Hacking Queries I discovered McKean Defense’s Password Reset Portal and McKean’s password structure. I discovered the password query by using the search query site:mckean-defense.com. Using this filtered all searches to McKean Sites only. I ended up discovering that there is an online password portal. To find the username/email sequence I filtered searches for McKean PDF documents. (filetype:pdf mckean defense) I ended up finding email addresses of employees in those documents. The email sequence is (First Letter of Name and Last Name @mckean-defense.com). Adversaries having this information can attempt to reset an employee’s password with the reset portal.
McKean Defense username sequence could become a vulnerability when authenticating to Outlook email and the password reset portal. Adversaries can use this knowledge as an advantage to brute force Outlook email and the password reset portal. Unless McKean has some other alias form of the user name for authentication. Adversaries can continue to brute force passwords to attempt to gain unauthorized access and to deny service by locking users out.
Kyuande Johnson
Ethical Hacking
Passive Reconnaissance
McKean Defense Group
McKean Defense is an employee-owned Naval Life Cycle Management, Engineering, and Program Management business headquartered in Philadelphia, PA. McKean Defense’s engineers work to deploy new shipboard technologies, integrate information technology across shipboard platforms, and develop strategies to support the Warfighter.
The company’s website http://mckean-defense.com/ IP: (70.35.201.37) contains information about executive leadership and details about services provided to Navy Programs. McKean Defense was founded in 2006 by CEO Joe Carolini, Vice President Larry D. Burrill, and Leonard F. DeStefano. Executive board members include Roberta Chagnot (Chief Marketing Officer), Mike Denny (Chief Strategy and Growth Officer) Stuart Macaleer (Chief Financial Officer) Christine Pingelli (Chief Human Resources Officer). McKean Defense has locations in the District of Columbia, California, Virginia, and Pennsylvania.
The company website also contained brief information about Naval programs. Mckean Defense has information uploaded into the Naval Tactical Command Support System (NTCSS) to ultimately support their operations. McKean Defense database administrators collect, verify data accuracy, and enter information from the various activities.
The NTCSS database provides ships force the capability to manage and maintain personnel records consisting of more than sixteen thousand records, material and parts information for identifying equipment onboard for approximately one hundred eighty thousand items, and material and parts information for approximately thirty thousand items. Displaying this information publicly exposes the fact that McKean has access to Navy Database. Which can motivate adversaries to target Mckean Defense Engineers to gain access to the NTCSS database.
Linkedin provided a wealth of information about the technology used in the company. After searching the profiles of many Engineers and IT Specialists. There was some useful information about the technology being used in the company. McKean Defense manages its users with Active Directory. Which means that McKean operated under a Windows Environment. Discovered that they operate under Microsoft Azure. This means that McKean users are using Microsoft Office Products and Authenticating with Microsoft Authenticator. Having Knowledge of the software being used can motivate adversaries to discover vulnerabilities for software that happen to be outdated and running on McKean’s Systems.
McKean uses Spiceworks as its Ticketing System. They are partnered with Datto Cyber Security Company.
Using Google Hacking Queries I discovered McKean Defense’s Password Reset Portal and McKean’s password structure. I discovered the password query by using the search query site:mckean-defense.com. Using this filtered all searches to McKean Sites only. I ended up discovering that there is an online password portal. To find the username/email sequence I filtered searches for McKean PDF documents. (filetype:pdf mckean defense) I ended up finding email addresses of employees in those documents. The email sequence is (First Letter of Name and Last Name @mckean-defense.com). Adversaries having this information can attempt to reset an employee’s password with the reset portal.
McKean Defense username sequence could become a vulnerability when authenticating to Outlook email and the password reset portal. Adversaries can use this knowledge as an advantage to brute force Outlook email and the password reset portal. Unless McKean has some other alias form of the user name for authentication. Adversaries can continue to brute force passwords to attempt to gain unauthorized access and to deny service by locking users out.