Custom Simulations
Vulnerability Assessment
Lateral Movement
Our Process
The team and the client define project milestones and determine specific scenarios they wish to test
The team performs intelligence gathering on the client’s digital assets as well as their physical site.
A comprehensive review of client’s resources, training of personnel, and rehearsal of techniques, tactics and procedures are performed after the acquisition of specific tools and resources for the exercise.
The actual performance of the plan takes place wherein the team attempts to establish initial access and exploit vulnerabilities to spread their presence within the client’s infrastructure.
A report is created highlighting the findings and results of the exercise which is presented to the relevant stakeholders of the organization for their reference.