Vulnerability & risk scans
For optimum cyber security, availability and compliance
There are two kind of vulnerability and risk scans: organizational and technical.
The organizational part is about threats and risks around business continuity; part of which is a recovery plan, security incidents and their response processes. The technical part is related to the supporting activities like backup and disaster recovery, automated vulnerability scans and pen-testing.
With this in mind we work with 3 type of vulnerability and risk scans:
All scans are available as a one-off and customer friendly, flexible subscriptions. Where subscriptions vary from a guided DIY (i.e. Do IT Youself) to a full managed service..
The Essential scans investigate which doors are open and the chances of a “successful” burglary. We do this by knocking digitally at every door. If there is an answer, we ask who is present and what function everyone has.
Expressed in technical terms: via an automated scan we test all 65535 TCP ports for establishing a connection. If this is successful, the device is queried for software functions and version numbers.
In addition, the chance of success with a targeted attack is examined. We do this by researching things with the hacker perspective into:
- Access to the company website via DNS and certificates.
- Easy to execute attack scenarios; for example with fake invoices.
- Publicly available personal and company information.
The aim of this part of the research is to determine to what extent visitors and e-mail can easily be redirected to a rogue website and dito mail server.
The Standard scans are the same as the Essential scans, with the following additions:
- The Essential scans are now also executed on the internal network
- All Essential scan results are now completed with a check on patch levels.
- Map and scan of all inbound and outbound network/application traffic.
- Logins with commonly known usernames and passwords.
- Logins with usernames and passwords of normal users and administrators.
The commonly known usernames and passwords are set by the hardware and software vendors before their products leave the factory. These are also described as such in the manuals.
The aim of the Standard scans is providing insight into the digital footprint of an organization; including available personal and company data should an intruder gain access through one of the user accounts.
The ZeroRisk scans take the Standard scans as a starting point. This is complemented by Red team style attacks and some operational scans.
A Red-team-style attack means that our Ethical Hackers make numerous more than serious intrusion attempts to determine what degrees of freedom there are in obtaining company data or installing and activating malware/ransomware.
This is combined with a number of operational scans such as:
- social engineering,
- various forms of access controls and
- backup-and-recovery in case of disaster.
Afterwards you know where your vulnerabilities and risks are; both operationally and technically.