Ensure hackers have not penetrated your defences.
At Packetlabs, we believe in the old proverb that knowledge is power. Knowing if there have been any indicators of compromise, back-doors, unauthorized access will reduce your company’s dwell time and resource costs. Packetlabs’ Compromise Assessment establishes a baseline if there is a lack of security controls within your present cybersecurity management system. This baseline will be the critical reference point for assessing changes and impact as your company sets out to meet security strategy and business continuity plan objectives.
This cost-effective service is helpful for businesses that do not have any visible high-priority threats but want to ensure hackers have not penetrated their defences. For those unsure of the effectiveness of their IT infrastructure systems and applications, a compromise assessment is the first step in your security posture journey. Your company’s security gaps will be flagged with a focus on improving cybersecurity hygiene. In addition to identifying any undetected infiltration, Packetlab’s Compromise Assessment report will determine the efficiency of your current security processes and controls and provide recommendations to support proactive solutions for the future.
Through the delivery of this assessment, automation is used in the initial stages to increase efficiency. Manual testing by a certified OSCP ethical hacker will drive the majority of the effort to ensure maximum coverage to uncover commonly overlooked issues.
The following tasks will be completed:
- Penetration Test based on applications, systems that may be compromised
- Complete system configuration reviews for Unix and Windows to identify malicious traits/IOCs
- Perform company-wide IOC scan to identify potentially impacted systems
- Run company-wise authenticated vulnerability scan to understand attack surface area
- Review system logs on select endpoints, servers, firewalls and anti-virus solutions
- Active directory assessment to identify potential privilege escalation paths
- Open-Source Intelligence (OSINT) gathering to identify any public references to CLIENT infrastructure
- Development of Compromise Assessment Report outlining all observations and relative confidence whether a compromise has occurred
What We Deliver
Automated and Manual penetration testing by a certified OSCP ethical hacker
Detection of past or present malware, ransomware, trojans, and other anomalies that may be under the radar
A comprehensive Compromise Assessment Report to eliminate guesswork, reduce devel time and resource costs or ensure a successful merger and acquisition transaction