When you buy a burglar alarm or security system an engineer visits your premises to install it and make sure it is correctly configured, so why should your IT systems be any different? Vulnerability assessments test your IT deployment and system configurations to ensure that your company is not wide open to cyber-attack. If your system is going to be put to the test, it is better it is tested by you than by a criminal. Find out about our internal and remote vulnerability assessments below.
Internal Vulnerability Assessment
This service attempts to recreate an attack originating from a user who is connected to the internal network. This stage simulates two types of attacker: an attacker who has successfully breached the network perimeter and is attempting to exploit any services present there; and an insider threat from an employee. Attackers generally investigate the internal networking looking for opportunities for exploitation such as:
• Unpatched or vulnerable services or systems.
• Misconfigured services or systems.
• Default or insecure credentials and user privilege escalation.
• Guest Wi-Fi isolation and corporate Wi-Fi intrusion vulnerabilities. • Vulnerable VLAN and/or VPN configurations.
• Lateral network movement and data exfiltration.
The internal assessment we propose will investigate these areas highlighting vulnerabilities present on your internal network. Our final report explains and discusses
our methodology, our findings and mitigation advice to better secure your internal network.
We always provide a full list of explanations and recommendations in a simple, straightforward language.
Remote Vulnerability Assessment
Once an attacker has conducted the reconnaissance stage, simulated in our Corporate Internet Investigation, they move onto active attack methods. Information gathered in the earlier stage can be used to begin assessing external facing systems. This service will attempt to map your organisation’s internet facing systems which attackers may try to compromise. We will use publicly available exploitation, tooling and techniques as well as some in-house tooling. In short, we will try to get in using as many different means as possible.
We will then help identify potential vulnerabilities that may exist and in our final report discuss mitigations to reduce the attack surface. We will attempt to assess all external facing systems, but be aware that if systems are hosted by a third party permission must be obtained to assess those services. This will be checked with you at the time of starting the service.
This is not to be confused with a full penetration test. The aim of this vulnerability assessments is to identify vulnerabilities in external systems without spending long periods of time on assessments trying to find every possible exploitation vector.
Once your organisation has gone through our services we can recommend our IASME trusted partners network to take on additional services such as a full penetration test. Our trusted partners have been subject to due diligence checks by the accreditation body appointed by the National Cyber Security Centre, the UK’s National Technical Authority who are apart of GCHQ. They are also certification bodies for Cyber Essentials and Cyber Essentials Plus.
If you would like to book a Vulnerability Assessment or would just like to find out more, please contact us.