default
+

Thank you for contacting us.


One of our expert consultants will review your inquiry.

+

Thank You


We hope you find this resource helpful.
If you have any questions, don't hesitate to contact us.

+

Thank you for contacting us.


One of our expert consultants will contact you within 48 hours.

+

Almost There!

Please fill out the form to complete your
whitepaper download

    +

    Almost There!

    Please fill out the form to complete your
    brochure download

      Compromise Assessment

      A Compromise Assessment will answer the question: Has my company been breached? Packetlabs’s skilled, ethical hackers will take the guesswork out of any unknown security breaches, malware, or signs of unauthorized access. This assessment works to determine the efficiency of your current controls and also supports avoiding unnecessary risks and expenses before a merger and acquisition. Our ethical hackers uncover past or present threats like zero-day malware, trojans, ransomware and other anomalies that may go unnoticed in standard automated vulnerability scans.

      Ensure hackers have not penetrated your defences.

      At Packetlabs, we believe in the old proverb that knowledge is power. Knowing if there have been any indicators of compromise, back-doors, unauthorized access will reduce your company’s dwell time and resource costs. Packetlabs’ Compromise Assessment establishes a baseline if there is a lack of security controls within your present cybersecurity management system. This baseline will be the critical reference point for assessing changes and impact as your company sets out to meet security strategy and business continuity plan objectives.

      This cost-effective service is helpful for businesses that do not have any visible high-priority threats but want to ensure hackers have not penetrated their defences. For those unsure of the effectiveness of their IT infrastructure systems and applications, a compromise assessment is the first step in your security posture journey. Your company’s security gaps will be flagged with a focus on improving cybersecurity hygiene. In addition to identifying any undetected infiltration, Packetlab’s Compromise Assessment report will determine the efficiency of your current security processes and controls and provide recommendations to support proactive solutions for the future.

      Background

      Through the delivery of this assessment, automation is used in the initial stages to increase efficiency. Manual testing by a certified OSCP ethical hacker will drive the majority of the effort to ensure maximum coverage to uncover commonly overlooked issues.

      The following tasks will be completed:

      network security

      NETWORK SECURITY

      os third party patching

      OS AND THIRD-PARTY PATCHING

      cryptography

      Cryptography

      client side protection

      CLIENT-SIDE PROTECTION

      authentication and authorization

      Authentication

      web application security

      WEB APPLICATION SECURITY

      system configuration

      SYSTEM CONFIGURATION

      database security

      DATABASE SECURITY

      email phishing

      E-MAIL PHISHING

      1. Penetration Test based on applications, systems that may be compromised
      2. Complete system configuration reviews for Unix and Windows to identify malicious traits/IOCs
      3. Perform company-wide IOC scan to identify potentially impacted systems
      4. Run company-wise authenticated vulnerability scan to understand attack surface area
      5. Review system logs on select endpoints, servers, firewalls and anti-virus solutions
      6. Active directory assessment to identify potential privilege escalation paths
      7. Open-Source Intelligence (OSINT) gathering to identify any public references to CLIENT infrastructure
      8. Development of Compromise Assessment Report outlining all observations and relative confidence whether a compromise has occurred

      What We Deliver

      Automated and Manual penetration testing by a certified OSCP ethical hacker

      Detection of past or present malware, ransomware, trojans, and other anomalies that may be under the radar

      A comprehensive Compromise Assessment Report to eliminate guesswork, reduce devel time and resource costs or ensure a successful merger and acquisition transaction

      Background

      Related Resources

      May 10, 2016

      PCI PENETRATION TESTING METHODOLOGY

      Packetlabs’ penetration testing methodology is based on industry standards and is primarily aligned with NIST SP800-115 to ensure compliance with most regulatory requirements.

      DOWNLOAD WHITEPAPER
      download_pdf

      101000110010101001001110010110010100010100101111001010100000001

      Background

      Ready for more than a VA scan?®

      Contact us for a free, no-obligation quote on our
      penetration testing services.