Introducing the External Attack Surface Assessment & Threat Intelligence Snapshot
Combined to provide you with a clear view of what information is available and advantageous to a cyber-criminal, and where the vulnerabilities are in your externally facing cyber security posture are.
Fill out the form to be contacted by our team.
What could your security weaknesses be?
Permutated domains known to act as phishing and malware distributors or C2 hosts.
Unintentionally exposed file directories containing sensitive information.
Compromised credentials and data breaches.
Identification of threat actors and ATP groups that could potentially target the client
Brand and VIP impersonation risks.
Information leaks by staff, customers and third parties.
Credential stuffing possibilities.
Software information and known exploits.
Social media exposed risks.
External Attack Surface Assessment
The External Attack Surface Assessment consists of four stages:
Identifying your network ranges, domains, IP addresses and network services which are exposed to the Internet.
Identifying issues which are easily exploitable by an Internet-based attacker.
Deciding with key stakeholders which assets are the most appropriate targets for manual exploitation, aiming to identify issues which are beyond the capabilities of automated tooling.
Providing a detailed run-down of the issues identified including the associated technical risk posed to the organisation, and a full list of the identified external assets.
Threat Intelligence Snapshot
The Threat Intelligence Snapshot uses a mixture of intelligence gathering methods, tools and expert knowledge. We detect a range of findings which are advantageous to an attacker and not detected by traditional scanners and penetration testing.
We provide you with a clear view of precisely what a threat actor can see from the outside while engaging in the first stage of the kill chain cycle. You will receive an actionable report with a suggested course of action to remediate against the finding.