Wireless Security Assessment
An attack simulation is as important as your wireless network defense products and controls in place. This helps you to assess your attack surface given the latest techniques and tactices in use by threat actors.
An attack simulation is as important as your wireless network defense products and controls in place. This helps you to assess your attack surface given the latest techniques and tactices in use by threat actors.
These days wireless networks are crucial element of core corporate infrastructure. Mobile workforce, and BYOD devices regularly utilise wireless networks in order to have seamless access to internal resources.
Based on the nature of deployment, wireless networks offer unparalleled access to the corporate users, guests, and/or segregated systems. It is important that a threat actor whether at your reception, car park or other public areas are assessed for attack surface offered by the wireless infrastructure.
Validate your security policy and controls. For instance, you may be using the best of security controls for wired networks, however a weak authentication on one access point allowing route to corporate environment could be one bridging point between wireless and wired networks.
In order to identify gaps in your current wireless security policy such as reducing the network leakage, weak authentication schemes, an assessment is certain to find those gaps.
We take customer communication as seriously as reporting or assessment execution. We engage with customers during all stages, and ensure that customer contacts are up to date in the language they understand. Post engagement, a free debrief is conducted to help the customers understand the weaknesses and prepare a mitigation plan.
The assessment-execution phase is followed by the analysis & reporting. Defendza performs analysis on the testing output, evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels.
The first level of access achieved from the "low-hanging" fruits found in previous phases does not allow full access to the underlying target. An attacker may not perform desired tasks for further activities such as password hashes retrieval, adding privileged users or tasks. Privilege escalation techniques are attempted by exploiting a bug, design flaw or configuration oversight in an operating system, or software/application to gain elevated access. This allows our security experts to perform elevated tasks that are key for lateral movement to infiltrate into the target network.
Using an open-source, commercial, and custom scripts, vulnerabilities that would cause no network or host level impact are targeted for exploitation. The objective here is to find higher-level privileges to achieve the highest possible access on a system. This system is then used as a base for further lateral movement in order to attempt to compromise the entire network, domain, or the agreed target. Based on the scope of the project, this access can be maintained for days to achieve further objectives or considered a completion of the assessment.
The prioritised list of targets is scanned for vulnerabilities. This assessment involves checking both published as well as undocumented vulnerabilities against the target assets. We sift through the scan results for false positives. The manual assessment ensures that only verified vulnerabilities are focused upon.
Based on the response received from the reconnaissance phase, the target list is prioritised. The priority would be based on "low-hanging" fruit that could aid in gaining a foothold within the network trivially.
The first step of reconnaissance activity includes passively identifying the hosts and services visible on the Internet. This includes limited Open Source Intelligence phase. During red teaming or related offensive security projects, this exercise involves extensive information gathering about a customer's people, processes and technology in use. Research based threat intelligence is an integral part of any offensive exercise.
Overall, the aim of this phase aims to harvest as much information as possible about your organisation that would be used for later phases.
Cyber security is a business enabler. We make sure we understand your business and its needs so that we can help you grow your business in the certain knowledge that it’s protected.
Our reports are comprehensive and include all the evidence that supports our findings. We give you a risk rating that considers how likely an attack is as well as the impact it could have. We don’t create panic scenarios. Our mitigation is detailed, covering both strategic and tactical areas to help our clients prepare a remediation plan.
Apart from the range of commercial and open source tools available for specific testing, our team has its own custom scripts for efficient testing. We provide accurate results to make sure our clients completely understand any vulnerabilities we report.
|
|
|
|
|
|
Much of the manufacturing industry has failed to take proactive steps to defend against cyber attacks—which is a notable problem considering the growing threats the industry faces