VULNERABILITY ASSESSMENT(VA)
Vulnerability Assessment is an adversarial attack simulation against an organization, to simulate the case of a particularly targeted hacker group
PROCESS
Discover
PHASE 1
Evaluate
PHASE 3
Assess
PHASE 2
Report
PHASE 4
Outcome: Better transparency and Increased awareness of potential Vulnerabilities and risk to the business.
PENETRATION TESTING(PT)
Advanced Penetration Testing by CREST Certified Experts.
Penetration testing is the authorized simulated cyberattack on computer systems. It is a method of gaining assurance in the security of an IT system by attempting to breach some, or all, of that system’s security defences. Penetration testers are using the same tools and techniques as an attacker might. Be tested targets probably are any IT assets. It depends on what you want, such as external systems, internal networks, office networks, even the physical environment.
PROCESS
Discover
PHASE 1
Evaluate
PHASE 3
Assess
PHASE 2
Report
PHASE 4
Outcome: Better transparency into potential threats and reduced effort by knowing which vulnerabilities can be exploited.
RED TEAMING
Red Team is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
- Social Engineering
- Wireless hacking
- External Access
SIMULATION PROCESS
Phase 1
Reconnaissance
Phase 2
Weaponization
Phase 3
Delivery
Phase 4
Exploitation
Phase 5
Privilege Escalation
Phase 6
Lateral Movement
Phase 7
Command & Control
Phase 8
Exfiltrate & Complete
Assets Coverage
Digital Assets
This includes Applications, Routers, Firewalls, Wireless, etc.
Physical Assets
This includes Buildings/Perimeter, Hardware vulnerabilities.
Human Assets
It includes all staff members.