Cyrensic uses professional and open-source tools and a standard methodology to perform penetration testing and Social Engineering tests. Our expertise with tools includes Core Impact, Metasploit, Kali Linux, Acunetix, BurpSuite, Social Engineering Toolkit, Lucy, and others. Our experience has shown that these tools allow rapid, repeatable, and safe testing.
Penetration testing is the ‘acid-test’ for your security preparations and defenses. It attempts to break into your computing systems. It uses the same tools and techniques that hackers use. Simply stated, it illustrates what a skilled hacker could do to your system and then poses these critical questions: Can my defenses be evaded? What systems can be broken into? What data can be accessed? Are my passwords strong enough? And, importantly, can I detect that an attack is taking place? |
As part of a penetration test, Cyrensic can also perform Social Engineering attacks against your organization’s personnel. Social Engineering testing provides valuable insight into the effectiveness of your organization’s Security Awareness program and immediate feedback to end-users.
We can provide simple attacks to all personnel that include obvious “red flags” that should be detected, and thus avoided. We can also tailor “spear-phishing” attacks against selected, critical personnel (e.g., your system administrators) that use techniques designed to induce them to click on an exploit or link. |
In both cases, extensive reports are provided, such as:
|