Reconnaissance and Enumeration: Our process begins with reconnaissance, focusing on targets most likely to be exploited for unauthorized network access. This includes the enumeration of services available from the public network, as well as the identification of employees who could potentially be targeted in phishing campaigns.
Information Gathering Techniques: We utilize a variety of methods for data collection, including: Network scanning and service enumeration tools; Passive discovery of potential vulnerabilities or test services; Active and passive domain, and subdomain enumeration; Utilization of external services and active querying of your DNS servers; Search engine-based reconnaissance; Examining databases for domain information (including internal ones); Checking for leaked IT infrastructure details (e.g., IP addresses, API keys, password leaks, etc.); Locating test or developer domains and resources; Gathering employee information from publicly available services, like social media and professional portals.
Test Scenario Development: Based on the reconnaissance, we build attack scenarios to be implemented in the next stages of the testing process.
Red Teaming Tests: The tests focus on detecting significant security vulnerabilities using a proven cybersecurity methodology. This phase could involve detecting Code Execution vulnerabilities, SQL/NoSQL Injections, LDAP Injections, Server-Side Template Injections, XML External Entity vulnerabilities, Broken Authentication and Session Management Authorization Bypass, and many more.
Social Engineering Campaigns: As part of our testing process, we may include elements of social engineering campaigns to test employee behaviour and evaluate the effectiveness of the security measures in place. These tests could include phishing emails, vishing calls, and on-site tests.