Adversary Simulation Penetration Testing
Why choose HALOCK? How does the Adversary Simulation Penetration Test benefit an organization?
Are an organization’s investments into incident response technologies, processes, and third-party monitoring providers producing the expected results? Are they able to identify more sophisticated, longer-term attacks in a timely manner and ensure rapid response and containment?
HALOCK’s Adversary Simulation Penetration Test is a comprehensive, highly targeted, and covert test. Experienced penetration testers attempt to infiltrate the environment while evading detection by in-house or third-party monitoring technologies and processes. Since these investments typically represent a significant financial expenditure, this simulation tests whether business goals are being met using existing methodologies and third-party vendors contracted as a safeguard.
HALOCK has the experience to best assess how well an organization’s security awareness policies and procedures are performed. For over two decades, HALOCK has conducted thousands of successful Assumed Breach pen tests for companies of all sizes, across all industries.
HALOCK’s dedicated penetration test team is highly qualified, possesses advanced certifications, and is equipped with the labs, tools, and methodologies necessary to consistently deliver quality, accurate, detailed, and meaningful results.
How is this service different than the Security Awareness Evaluation and Assumed Breach Penetration Tests?
This service is HALOCK’s most comprehensive, long-term, and sophisticated penetration test. The Adversary Simulation Penetration Test differentiates itself from other services and service providers in its pacing and purpose, representing the most tailored and targeted methods a determined attacker would utilize. The core of the approach is stealth, testing for loopholes and workarounds. The goal is not to comprehensively identify potential vulnerabilities but rather to gain access, maintain persistence, and expand the compromise as broadly as possible, without detection.
A Comprehensive Methodology for Assumed Breach Penetration Test
- Information Gathering Initial reconnaissance activities to gather the necessary information to prepare suitable and credible messaging, such as the services the target organization offers, relationships between varying business units or divisions, information exposed on public sources, and other employee or corporate specific information.
- Infrastructure Preparation Systems to transport email, track responses and activity, and host content are deployed and configured.
- Campaign Preparation Target lists are grouped and sequenced, campaign batches are configured and scheduled, and related preparation tasks are completed.
- Campaign Launch Initial test messages are issued to gauge response behavior, identify technical controls that might warrant revising the planned approach, and fine-tuning attack methods.
- Initial Exploits As sessions are established, initial exploits are pursued to establish baseline access through payloads, command and control, scripted actions, identify secondary targets on the compromised network, and establish persistence.
- Secondary Exploits attempts to increase a presence throughout the connected environment by bypassing user access controls, identifying internal weaknesses to exploit, leveraging excessive user rights, and compromising connected systems.
- Exfiltration Attempts to identify local data repositories that would be of value to an attacker stored on locations such as local repositories, mapped drives, databases, and file sync folders.
- Disengaging Winding down activities including terminating sessions, gathering evidence necessary for reporting, and preventing continued contact following the conclusion of the campaign.
- Project Plan: Prior to remote social engineering penetration testing, HALOCK will develop a project plan detailing the specific plan, timing, and related considerations. This ensures all parties know what to expect throughout the execution of testing and reporting.
- Penetration Test Report: The complete results of the remote social engineering pen test are documented in our content rich report which includes the background, summary of findings, detailed findings, scope and methodology, and supplemental content for context and reference.
- Background: An introduction of the general purpose, scope, methodology, and timing of the remote social engineering penetration test.
- Summary of Findings: A concise overview summarizing the social engineering assessment results at a glance, such as key critical findings requiring priority attention, system or recurring issues, and other general results.
- Detailed Findings: Comprehensive results of each vulnerability, including a description of the vulnerability observed, the impact, recommendations for remediation, evidence where the vulnerability was observed, step-by-step demonstrations of exploits performed, and additional reference materials.
- Scope and Methodology: A detailed recap of the specific scope of what was tested, the methodologies utilized, and related historical information necessary for audiences such as auditors to understand the specifics of the test approach.
- Supplemental Content: Additional content and guidance, such as recommended post social engineering assessment activities.