In this service, the information received as a result of the automated tools, is deeply analyzed, and all unnecessary or superfluous data that would distort the results of the exercise are filtered out.
Our Vulnerability Assessment Service follows this stage by stage methodology:
Etical Hacking and Red Team
This activity aims to find and exploit security vulnerabilities through unstructured attack activities, following the 5 Stages of the Hacking:
Cover the Tracks
This means that the experience and knowledge of the expert is used to seek access the platform, infrastructure or facilities in an unauthorized way in the same way that a Cybercriminal (Malicious Hacker) would, using the same tecniques, tools and procedures, but with the autorization and express consent from the owner of the infrastructure.
The service will last as minimum of 15 business days, during which time the different attack activities will be carried out in order to find security gaps.
This activities can include a variety of attacks and social engineering techniques, like:
Our Ethical Hacking / Red Team service, follows this stage by stage methodology:
Attack Surface Detection (Internal and External)
Companies sometimes have infrastructure under outsourcing management, or temporal infrastructure that in some moment becomes permanent, or forgotten infrastructure containing private information, with low security or not security at all; and the common factor here is: if a nefarious actor finds this infrastructure, exist a big risk of compromise for the company.
History teach us a lot of cases and examples related with this risks, and how with a simple but effective Attack Surface detection scan that infrastructure can be detected and a disastrous attack can be prevented.
In this service we use Commercial and Proprietary technologies to detect vulnerable surfaces belonging or not to the target comany, and let the company know about the risks involved in each one of the detected assets.
Some of the infrastructure and information that this service can detect: