Offensive Security
Penetration Testing
What does it mean?
Penetration testing is a vertical, in-depth operation during which we are to reach the deepest level possible in the system. For this, we select those vulnerabilities which result in the most advantageous stance for execution.
The procedure
After a detailed inspection of the target system our professionals exploit the identified vulnerabilities to ensure attacker:
- into what depths could infiltrate the system
- what data could acquire
- whether could execute a malicious code, open a backdoor and thus create a persistent threat being present
- regarding the above what would be the scale of the attack one could effectuate
Expected Results
As a result, You could get a comprehensive picture of Your information security solutions’ effectiveness and the possible utilization scenarios of the existing vulnerabilities. In addition, we provide help for correcting non-conformities
- Reconnaisance
- Manual and automated testing
- Validation
- Exploiting vulnerability
- Attack modelling
- Risk Assessment
- Reporting
OSINT
Industrial Control System Assessment
ICS, SCADA
For industrial control systems (ICS, SCADA), safety is a basic requirement as they manage critical components. SCADA systems feature HMI (Human Machine Interface) and logical controllers (PLCs) that monitor industrial operations and support systems such as the IT network, web servers, and databases that work together in a common environment.
PLC
A programmable logic controller that has both input and communication ports. It is primarily used to control equipment for industrial usage. Generally speaking, it uses a higher level programming language, running on an internal operating system. Compact and modular PLCs are distinguished in terms of structure.
HMI
(Human Machine Interface or “Human Machine Operator Interface”) is normally a terminal with an LCD display and an operator peripheral. Its task is to provide interaction and feedback on the parameters, status and messages of the equipment.
Social Engineering
Vulnerability Assessment
What does it mean?
A horizontal test, during which we uncover, identify the target system’s weak points that are prone to an attack. An in-depth investigation is not part of the testing, only the validation of the found vulnerabilities.
Types of the Assessment:
- Website / Web application inspection
- Network (LAN, WiFi)
- Mobile application
- Software inspection
Expected results
You can get an extensive picture of the vulnerabilities being present in Your system. In addition, we provide help for fixing the issues.
- Reconnaisance
- Manual and automated testing
- Validation
- Risk Assessment
- Reporting
Red teaming
What does it mean?
A testing methodology-system that includes the complete service set of the Offensive business from OSINT information collection trough penetration testing to social engineering.
A well-designed information security system is a combination of physical security, communication security, computer and network security solutions. To achieve this, measures must be put in place to prevent unauthorized use of the company’s information resources and unauthorized access to sensitive data assets.
This service supports our risk management which aims at determining the company’s risk rating and vulnerabilities related to technology, employees, and facilities.
The procedure
Red teaming involves a series of built-in and parallel attacks:
- OSINT Information gathering
- Vulnerability assessment and Penetration Testing
- Social Engineering
Expected results
The purpose of the attacks is to identify real threats that can be exploited during a possible malicious attack, thereby providing data leaks and compromising the entire system/network to compromise the attacker.
As a result of this operation, physical, hardware, software and human vulnerabilities will be identified, a better understanding of the risk level of the company will be promoted, and suggestions for the correction of recognized non-conformities will be developed.