Identify weaknesses in your networks before an attacker does. Our Network Security process tests your network from the inside to assess your company’s security posture. We also include an Active Directory password audit so that organisations can understand the quality of passwords in use.
We test to assess web applications for any vulnerabilities such as SQL injection or Cross Site Scripting (XSS) in accordance with the OWASP standard.
Our techniques assess an organisation’s resilience to attacks such as phishing, usb-style attacks and/or water hole attacks. These attacks seek to test the individual staff within an organisation.
An important aspect of any security audit project is Wi-Fi or wireless penetration testing ito assess the threat from an insecure Wi-Fi network.
Understand the risk, threats and challenges for IoT vendors and receive key insights on how to protect your IoT infrastructure.
We begin every project by using a number of techniques to prioritise assets in terms of their vulnerabilities. This will chart a path to any possible exploitation vectors, which will be discussed with the client before any exploitation attempts are made if needed. If we identify any critical vulnerability that requires immediate attention, we’ll inform the organisation straight away to minimise the window of exposure.
Post exploitation, Defence Logic will use any access or privileges to attempt privilege escalation attacks penetrate your networks at the highest level possible. Detailed records will be kept charting our path including recovered data and copies of files that were changed. Our aim is to minimise disruption to any systems.
We produce a full report for your organisation which details the testing outcome and the paths taken to achieve any outcomes. Our risks are classified in accordance with the CVSS rating for any vulnerabilities found.