>_ What to expect
Our Penetration Test service simulates a scenario of attacking a company's infrastructure, which is useful for highlighting vulnerabilities in systems and processes to verify the effectiveness of existing defenses.
The activity, which faithfully replicates the operational methods of a real adversary, involves operations such as researching and enumerating corporate resources, identifying known and unknown vulnerabilities on different assets, and employing social engineering techniques to weave targeted, personalized, and as effective as possible attacks.
Through the use of these methodologies, we identify critical points and enable the client to become aware of the measures necessary to reduce the impact of a potential cyber attack.
>_ Operational Modes
We work remotely and independently, with or without the assume compromise principle, and with the utmost caution to avoid any disruption to production systems.
Any conditions and constraints on the execution methods can be freely defined during the preliminary definition of engagement rules.
KICKOFF
Scope
Definition of systems under examination and engagement rules.
Preparation and signing of the disclaimer document.
OSINT
Passive Enumeration
Enumeration of employees, metadata, internet domains, compromised credentials, tenants or 365.
INTERNET
External Perimeter
Active analysis of internet domains, password-based attacks.
Network scans and identification of known and unknown vulnerabilities on exposed services.
PHISHING
Social Engineering
Definition of targets, pretexts, payloads, and phishing campaigns aimed at collecting credentials or gaining access to client systems.
INTRANET
Internal Network
Enumeration of systems, Active Directory, configurations, and vulnerabilities.
Attacks aimed at escalating privileges within the local forest.
CLOUD
AzureAD
Search for attack paths and attempts to escalate to Global Admin privileges.
REPORT
Results Presentation
Executive report, technical report with analysis and details on the reproducibility of identified issues, classified with CWE and CVSS references.