Offensive Services
Battle test the effectiveness of
your existing security controls
Penetration Testing
Penetration testing takes an adversarial approach to identifying and exploiting vulnerabilities to demonstrate the potential impact of compromise. We offer penetration tests in the following areas: â–ª Internal Network â–ª External Network â–ª Wireless Network â–ª Web Apps & APIs â–ª Physical Offices â–ª Cloud Services â–ª Mobile Apps
Social Engineering
Social engineering is the psychological manipulation of people for the purpose of getting them to carry out actions or divulge confidential information beneficial to an attacker. We offer social engineering testing via: â–ª Telephone â–ª Electronic message (email, chat, and SMS) â–ª Postal mail â–ª Physical site visits
Assumed Breach Testing
Assumed breach testing starts from the position of a "compromised" system on the network. From the context of a compromised system and the corresponding user account, we demonstrate the impact this could have on the business. This form of testing can also be used to show risk from a trusted, but malicious insider perspective.
Red Team Assessment
A red team assessment tests your threat prevention, detection, and response capabilities through targeted attacks that seek to evade detection while pursuing a specific goal. It can include multiple attack vectors spanning physical, electronic, and social engineering domains. This level of testing is typically reserved for organizations with a mature security program.