Identify external threat actor groups that pose risks to Client, this activity mimics a real-world external and internal attack vector.

A Brief Of The Activities To Be Performed As A Part Of The Assessment Are :

EXTERNAL AND INTERNAL CYBER KILL-CHAIN

Identifying and performing external reconnaissance, weaponization and delivery using organizational profiling and security control analysis

Perform social engineering activity

Setting up command and control, and target objectives

Perform an internal reconnaissance, internal exploitation and enterprise privilege escalation by executing simple password hashes extracting and cracking techniques

Carrying out lateral movement by standard password guessing and exploitation of common vulnerabilities and other low hanging fruits

Pluse Background Img

TARGET MANIPULATION KILL-CHAIN

Performing target reconnaissance and exploitation by simulating data exfiltration

Carrying out weaponization, installation to achieve target objective by standard data egress

Center Background Img

DELIVERABLES

Red team exercise detailed report

Executive Summary

Pluse Background Img