Identify Internal Vulnerabilities
Is your printer also leased? Are you sure that maintenance on these devices includes security updates every time? In all our audits, printers are the first device through which we get onto the network without problems.
However we get onto your network, we see how quickly we can get administrator rights, and then start scanning the whole network.
In your company, how do people at the counter or reception react when someone wearing a fluorescent vest stands in front of them claiming to be working on ‘the internet’ in the street. What response is given when he wants to check with the modem that everything is OK with you?
So with auditing, we go much deeper than scanning. We effectively enter the internal network and think as a cybercriminal would, with even the possibility of physical access control
- Listing devices with missing patches, ...
- Attempt to crack passwords/logins Active directory
- How quickly full admin on devices/domain
- Internal DNS checks, checks used cerOficates
- Internal site checks, Cloud links
- Backup analysis if backups are found
- Documents scan for password & logins
- Man-in-the middle attack simulation
Of course, we prepare a comprehensive report with risk scales from which we can start defining an action plan.
Services & products