• Reconnaissance: Identification of publicly available information about corporate network. Several Open Source Intelligence (OSINT) methods such as google search, shodan search are utilized to get the target system data and other critical and important information.
• Vulnerability Assessment: Performing automated vulnerability scanning to detect potential vulnerabilities.
• Exploitation: Perform manual exploitations to identify security vulnerabilities which can be exploited by the attackers to take control over the corporate network.
• Risk Determination: Assessment of identified vulnerabilities to determine the likelihood and impact on the organization.
• Reporting: An in-depth report including both technical details and executive summary providing you with all the details of identified vulnerabilities, impact, Proof of Concepts, exploitation techniques, demos and fix recommendations.