Secora Consulting

Security assessments

Vulnerability Assessment

A Vulnerability Assessment (VA) is a low cost high value exercise which identifies common vulnerabilities on internal and external networks. Undertaking regular vulnerability assessments is the first step in securing your network. The goal of a vulnerability assessment is to deliver a prioritised list of risks to the organisation to allow for cost effective remediation.

Routine monitoring of your estate is a critical component of cyber security readiness and our vulnerability assessments offer an affordable solution to assess the security of your network. We go beyond automated scanning and manually verify findings to provide your organisation with peace of mind while improving your overall security.

Contact our team today to find out more.

Contact us

Internal Infrastructure Penetration Testing

An internal penetration test replicates an attack conducted by a malicious internal attacker. Internal attacks simulate disgruntled employees or an attacker who manages to gain a foothold on your internal network by circumventing your external perimeter.

Our internal penetration tests offer a cost effective way to evaluate the internal network and assess the negative impact an internal attack could have on your business. We undertake a comprehensive and systematic approach to determine how a malicious attacker could compromise critical systems. During our assessments we uncover routes to sensitive information and intellectual property whilst demonstrating how an attacker could takeover the full network.

Internal penetration tests are often goal based, with the client outlining several ‘goals’ before the commencement of the test. Our team aims to achieve these goals during the test, also highlighting any security flaws uncovered during testing. Goal based penetration testing will help you protect your most critical assets and sensitive information from internal threats.

Contact our team today to find out more.

Contact us

External Infrastructure Penetration Testing

An external penetration test replicates an attack conducted against externally facing infrastructure from the perspective of an Internet borne attacker. Our cost effective external penetration test will enable you to evaluate external threats and identify how a breach could negatively affect your companies availability, profitability and reputation. We provide a detailed analysis of whether sensitive information can be extracted or if the infrastructure can be breached.

External penetration tests are a thorough way of further securing your external infrastructure by exposing the vectors which a malicious actor could use to compromise systems and revealing routes to sensitive information and intellectual property.

To add further peace of mind, our testing also includes unauthenticated web application testing and vulnerability assessments. We look to identify systems that may have been overlooked which could be uncovered and exploited by an attacker.

Contact our team today to find out more.

Contact us

Web Application and Web Services Penetration Testing

Web application and web service penetration tests simulate attacks conducted from the Internet. Our service provides you with detailed findings of any security flaws uncovered and comprehensively documents the current security posture of the application, services and the hosting environment.

Web applications and services are often targeted by attackers to uncover security weaknesses that could be exploited to reveal sensitive data such as credit card details, personal identifiable information and intellectual property. Attackers often take control of user accounts to escalate privileges to administrator users, deface websites or to take control of the hosting server.

Our web application testing focuses on finding security flaws within the in-scope applications providing you with a comprehensive list of attack vectors and how an attacker could use these vectors to negatively impact your business.

To add further peace of mind, we look to identify systems which may have been overlooked, but could be uncovered and exploited by an attacker. We also conduct vulnerability assessments against the hosting infrastructure.

Contact our team today to find out more.

Contact us

Mobile Application Penetration Test

Mobile application penetration tests simulate real-world attacks against mobile application’s front-end and back-end services. Attackers frequently target mobile applications as they can act as a gateway into the corporate network via services and remote access methods.

As mobile applications are installed on end user devices, local attacks against the application or executable binaries are a common attack vector for malicious attackers. With local access to the device, attackers can edit, manipulate or decompile the application. By attempting to understand or retrieve the applications source code an attacker could extract hard coded application secrets or bypass protective features which may expose unsecured corporate endpoints.

Our mobile assessments consist of two parts; testing the security of the application and testing supporting web services. Testing both parts in conjunction offers greater coverage and enables our team to identify all security flaws within the in-scope application and supporting infrastructure. Combining both mobile application and web services allows our consultants to undertake a comprehensive assessment to determine how an attacker could use any identified weaknesses as a potential attack vector to negatively impact your business.

Contact our team today to find out more.

Contact us

Thick Client Penetration Test

As thick clients often hold large amounts of sensitive data and are installed on the client side (users computer) they are susceptible to local attacks from malicious attackers. With local access to the device an attacker can attempt to edit or manipulate data, fuzz, inject, review logs and registry keys, read process threads or decompile the source code with the goal of retrieving sensitive information. By attempting to decompile source code an attacker could extract hard coded secrets, find injection points or bypass protective features which may expose unsecured corporate endpoints.

Our thick client penetration testing ensures the security controls implemented in the thick client are robust so that sensitive information cannot be retrieved. Our comprehensive reports highlight any improvements which can be made to further secure the thick client through detailed remediation guidance.

Undertaking a thick client assessment will enable our team to identify all security flaws an attacker could uncover and potentially exploit. Through selective exploitation steps our consultants can determine how an attacker could impact the security of the application and your business data.

Contact our team today to find out more.

Contact us

Wireless Penetration Test

Wireless penetration testing can be utilised to understand the resilience of your wireless controls, segmentation and access point configurations. Our wireless testing service is designed to give you an overall review of the current health of your wireless network.

Testing can be conducted from an unauthenticated perspective with the goal being to break encryption protocols and authentication mechanisms determining if it is possible to gain access to your wireless network. Once on your network we can uncover additional weaknesses such as controller configuration or segmentation issues between guest and corporate networks. Our comprehensive reports are devised to facilitate the improvement of your wireless security posture.

Our wireless testing is a significant way to ensure an attacker cannot access your corporate LAN and retrieve sensitive information or intellectual property by connecting to your access points from either outside or inside from your corporate buildings.

Contact our team today to find out more.

Contact us

Mainframe Penetration Test

Our security consultants include some of the very few penetration testers in the industry who have performed penetration testing against mainframes. Mainframes are the most critical aspect or component of infrastructure and are primarily used by large organisations for critical applications and large data processing. For example, over 90% of all global credit card transactions are processed by IBM mainframes.

Our security consultants have been testing mainframes for several years, during which time we have developed an extensive in-house toolkit to specifically test mainframes. Our mainframe testing not only ensures your mainframe is resilient, but also draws on our extensive knowledge to negate any negative impact giving you the best coverage on your most critical infrastructure.

Contact our team today to find out more.

Contact us

Black Box Testing

Our black box testing is designed to test the resilience of your equipment in the event of theft or misplacement. Our team has worked with numerous clients testing the resilience of a multitude of different device types from mobile phones to laptops.

A typical example of a black box assessment includes reviewing laptops from an unauthenticated perspective to see if any sensitive information can be retrieved from the device. We undertake this assessment by bypassing encryption and authentication mechanisms and attempting to read the hard drive via hardware tampering and software hacking.

Our black box testing is designed to ensure that on the rare occasion of equipment theft or misplacement that the data stored is secure and not retrievable by malicious actors. Black box assessments are a significant way to preserve peace of mind in the event of equipment breach.

Contact our team today to find out more.

Contact us

Social Engineering Assessment

Social engineering is the simulation of real world attackers attempting to compromise the integrity of many different aspects of your perimeter from the physical security of the building, WiFi networks, masquerading as employees, attacking the internal network and conducting targeted phishing and telephone campaigns.

The term social engineering is broad and our team are well versed in carrying out all aspects of social engineering assignments. Social engineering often encompasses an array of attacks to be conducted over a period of time to give a real world view of your security posture.

Our social engineering service is not here to “catch you out”, but is designed to help you identify any gaps in policies and procedures, highlight risk and raise awareness through annual security training, exercises and reviews.

Through ongoing assessments and comprehensive reports, trends can be built to analyse statistics and highlight improved security awareness across each assessment over time.

Contact our team today to find out more.

Contact us

Physical Security Assessment

Physical assessments are a common part of social engineering but are also a stand alone service line. These assessments emulate how an attacker could gain access to your buildings perimeter to retrieve sensitive documentation, connect to your network or even simply to steal equipment.

Physical assessments are devised to identify gaps in policies and procedures, highlight risk and raise awareness through annual security training, exercises and reviews to increase your security posture.

Through our ongoing assessments and comprehensive reports, trends can be built to analyse statistics and highlight improved security awareness across each assessment over time.

Contact our team today to find out more.

Contact us

Telephone Assessments (Vishing)

Telephone assessments are a common part of social engineering but are also a stand alone service. Telephone assessments replicate how attackers can deceive staff to retrieve sensitive information through the use of targeted phone calls.

Our telephone assessments are designed to retrieve specific data sets such as user credentials or sensitive information. Data sets can be set as goals by your company to measure success and failure rates of each of our telephone campaigns.

Our telephone engagements are devised to identify gaps in policies and procedures, highlight risk and raise awareness through periodic security training, exercises and reviews to increase your security posture.

Through our ongoing assessments and comprehensive reports, trends can be built to analyse statistics and highlight improved security awareness across each assessment over time.

Contact our team today to find out more.

Contact us

Email Assessments (Phishing)

Phishing assessment are a common part of social engineering but are also a stand alone service line. Phishing assessments are the emulation of how an attacker would aim to breach your network by deceiving your employees via our targeted emails.

Our phishing campaigns are tailored to specific employees and each email contains non-malicious code to provide us with either an ingress point to your internal network or to monitor the number of employees who open the email.

Our phishing campaigns are devised to identify gaps in policies and procedures, highlight risk and raise awareness of staff through annual security training, exercises and reviews to increase your overall security posture.

Through our ongoing assessments and comprehensive reports, trends can be built to analyse statistics and highlight improved security awareness across each assessment over time.

Contact our team today to find out more.

Contact us

Red Team Assessment

A red team engagement is a targeted threat simulation designed to provide insight into how an attacker could breach your security controls, how they might operate once inside your organisation and provide you with invaluable insight to assist in developing your defensive capabilities. Our service is tailored towards replicating realistic threats to your business, helping you identify the effectiveness of controls, raise your security posture and improve your team's responses and reactions in the event of a breach.

Each of our engagements can be tailored to include any of the following to simulate a specific threat actors: attacking external facing systems, phishing and telephone campaigns, physical breaches, attacking web or mobile applications, masquerading as employees, responding to online posts, blogs and job postings as well as bypassing network security to mimic Advanced Persistent Threats (APTs). All our attack vectors are designed to ascertain an ingress point and remain undetected within your network for a sustained period of time, increasing our noise levels to eventually be detected by the blue team or detection systems.

Our goal is to test how long an attacker could remain undetected mimicking an APT and as a result improve your overall detection capabilities. Undertaking a red team assessment will enable you to gain a full view of what an attacker could achieve, the goals of which is to increase your incident response time, assess the effectiveness of defensive solutions, identify gaps in policies and procedures and improve your security posture through detailed findings and solutions. These findings may be presented in a comprehensive report, de-briefings and stakeholder meetings.

Red team engagements are a great way to fully understand how an adversary might operate, test your resilience, improve your detection rates and response times.

Contact our team today to find out more.

Contact us

Remote Threat Simulation

Our remote threat simulation is a zero knowledge full spectrum attack against all externally facing assets from prolonged attacks mimicking slow but persistent threat actors. We have developed custom in-house tools to facilitate the identification of external ingress points which may have been overlooked, but which could be uncovered and exploited by a determined attacker. Our engagements start with zero knowledge about your organisation and we aim to uncover all entry points to your organisation via your external infrastructure. This service has been designed to give you full insight into how an attacker could use any possible external means to compromise your infrastructure in an attempt to gain access to company data or resources.

All attack vectors are designed with the goal of finding an ingress point onto your network and to identify what an attacker could achieve once they have gained persistence. Our comprehensive reports, de-briefings and stakeholder meetings are designed to help you identify any gaps in policies and procedures and guide your team to improve your overall security posture.

Our remote threat simulations are a great way to fully understand how external threats operate and improve your security posture.

Contact our team today to find out more.

Contact us