You are here:

Advanced Security Test

Open source intelligence
Phishing
Red teaming
Client device audit
Denial of service simulation
Physical assessments

OSINT analysis

OSINT (Open Source Intelligence) is a method of analyzing publicly available data and information to identify potential threats and vulnerabilities. We analyze publicly available information to give you a better understanding of your digital presence and how it is perceived by attackers. The result of the analysis is an initial assessment of your company’s public attack surface.

Phishing

Phishing attacks are one of the most common attack methods, for example to specifically exfiltrate sensitive data and information from a company or to extort a ransom after successful compromise using ransomware. The approach of an attacker in a phishing attack is quite simple: The attacker tries to send an email or message that looks like it comes from a trustworthy source, e.g. an internal system or an internal company campaign. According to the IT security report of the Federal Office for Information Security (BSI), a successful ransomware attack often begins with a malicious spam or phishing email [1].

We test your systems and employees with simulated phishing attacks to check the effectiveness of your current defense measures and the awareness of your employees.

Red Teaming

Red teaming is a process in which realistic attacks are simulated using selected tactics, techniques and procedures. The Red Team pursues defined objectives within defined boundaries in order to confront the defenders (Blue Team) with a realistic attacker scenario.

The Red Team potentially has a wide range of means at its disposal to achieve its goals. Hidden attacks on the IT infrastructure are just as much a part of the repertoire as social engineering, right through to acting on the customer’s premises.

Analysis of a client device

The security analysis of client devices is carried out with the aim of examining the client system from the perspective of a potential attacker. The analysis focuses on identifying vulnerabilities and misconfigurations that could lead to unauthorized access or compromise system integrity. The analysis covers various types of client devices, including workstations, laptops and mobile devices used within an organization.

Denial of Service Simulation

DDoS (Distributed Denial of Service) load tests are a fundamental component in the security management of network infrastructures. They not only serve to evaluate resistance to overload attacks, but also enable a detailed analysis of system reactions under simulated extreme conditions. By mimicking different types of attacks in a controlled environment, organizations can test the effectiveness of their security measures, identify potential vulnerabilities and develop or optimize appropriate defensive strategies. The aim of these tests is to gain a comprehensive insight into the stability and resilience of the IT infrastructure under attack conditions in order to ensure high availability and security of critical services.

Physical Assessments

Our experts provide physical security assessments to test, evaluate and improve organizations’ physical security measures. Our physical security assessments simulate real-world threat scenarios to uncover obvious vulnerabilities in physical security infrastructure and human weaknesses, because the fact is: attackers always look for the weakest link in the chain and know no physical boundaries.

Sources

[1] The state of IT security in Germany in 2022, BSI: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/Lageberichte/Lagebericht2022.pdf

[2] Microsoft: Zero-Trust Paradigma, https://www.microsoft.com/en-us/security/business/zero-trust

[3] TIBER-EU: European framework for threat intelligence-based ethical red-teaming, https://www.ecb.europa.eu/paym/cyber-resilience/tiber-eu/html/index.en.html