Cyber Attack Simulation
Is your business aware of how much information makes its way onto the internet? Make sure your employees are aware of today’s online risks, and avoid being targeted by cyber criminals.
Is your business aware of how much information makes its way onto the internet? Make sure your employees are aware of today’s online risks, and avoid being targeted by cyber criminals.
Social engineering is the art of manipulating genuine users into revealing confidential information that can be used to gain unauthorized access to their computer systems. Are you investing in your staff training to prevent this?
An effective phishing campaign can help you analyse the browsing habits of your employees, their information security awareness and effectiveness of your perimeter controls in place
Harness the power of the internet with OSINT. Defendza helps you to gather information for analysis and then prepare for red team attack operations to ensure your business is totally prepared for cyber attacks.
How well will your people, your processes, and your technological controls cope with a cyber attack? With a Red Team attack simulation, you’ll find out.
Defendza as a business, as well as its consultants, are equipped with some of the best-known certifications, accreditations and qualifications globally. These include CREST, GCloud 11 Framework, ISO quality management certifications for the business and our consultants are Ex Check Team Leaders/CCT Infrastructure (2012, 2015) and Web Applications (2009,2012,2015), OSCP (Offensive Security Certified Professional), CREA (Certified Reverse Engineering Analyst), CREA (Certified Binary Auditing Expert), CISSP (Certified Information Security Systems Professional), SANS GSEC & GCIH Silver (Hacker Techniques and Incident Handling), CCNA (Cisco Certified Network Associate), CEH (Certified Ethical Hacker).
Conducting regular penetration assessment offers the following benefits:
Red Team - A cyber attack simulation carried out to conduct a real life attack for assessing the attack preparedness.
Blue/Purple Team - These are exercises where we work in collaboration with your security teams to ensure it is a learning exercise to improve your detection and response capabilities
Given the advancements in Tactics, Techniques, and Procedures (TTP), organisations must evaluate people, processes and the technology in use to avoid potential loss of Confidentiality, Integrity and Availability of their data. The best way is to seek validation from an independent third-party organisation such as Defendza to identify gaps in the current security controls across the estate or specific assets, such as devices in use. With this assessment, you should not only get a picture of your current situation, but also help and knowledge sharing to address the identified risks.
At a high level, our approach towards attack simulation (Red Team) assessments is as follows:
When you decide to give us the go-ahead, our very first step is to gain insight into your motivation, so that we can advise on your real concerns. The comprehensive process we go through to understand this determines the vision for the project. At the technical level, this includes assets to be included, their fragility and importance to the environment.
The first step of reconnaissance activity includes passively identifying the hosts and services visible on the Internet. This includes limited Open Source Intelligence phase. During red teaming or related offensive security projects, this exercise involves extensive information gathering about a customer's people, processes and technology in use. Research based threat intelligence is an integral part of any offensive exercise.
Overall, the aim of this phase aims to harvest as much information as possible about your organisation that would be used for later phases.
This phase involves attack infrastructure setup, and in detail requires many inputs from the OSINT phase performed previously. These include email and related infrastructure software base in use, cloud providers, content delivery networks (CDN), and related pieces of information.
At a high level, based on voice, email and other scoping items, infrastructure setup and test cases are prepared for execution.
The first foothold is gained on the client infrastructure via any of the email phishing, voice phishing or malicious USB drops.
Internal Recon to enumerate information about people, processes, and technologies in internal segments
Move laterally across different network segments.
Achieve and maintain persistent access across different paths
The assessment-execution phase is followed by the analysis & reporting. Defendza performs analysis on the testing output, evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels.
We take customer communication as seriously as reporting or assessment execution. We engage with customers during all stages, and ensure that customer contacts are up to date in the language they understand. Post engagement, a free debrief is conducted to help the customers understand the weaknesses and prepare a mitigation plan.