Security Innovation offers a range of services that help organizations resolve vulnerabilities and weaknesses in a portfolio of enterprise applications, a stand-alone application, an embedded software system, or within the software development process itself.
Organized hacking groups such as Anonymous and Lulzsec pose a severe and persistent threat to anyone they deem worthy of attack. Moreover, both commercial and government organizations face the threat of cyber attacks from nation states bent on stealing sensitive military/political information and damaging critical infrastructure.
Since most large organizations rely on a mix of COTS hardware, 3rd party software applications, and custom code to run their IT infrastructure, it’s difficult to apply a single security assessment solution to ensure adequate coverage and protection. Performing penetration tests and code reviews of selected software applications is a great best practice, but what if that's not your weakest point?
The only way to find, fix, and remediate vulnerabilities in a complex IT infrastructure is to simulate attacks on your infrastructure in the same way that Anonymous, Lulzsec or any other attacker would.
Our expert security engineers are put to work for you as ethical hackers, conducting extensive and perpetual attacks on your IT infrastructure - with the sole purpose of identifying means by which data can be stolen or your infrastructure can be taken offline. This isn't just a network or application penetration test -- we validate identified vulnerabilities, follow chaining paths between vulnerable systems, and disclose with certainty which hardware and software applications are putting you at real risk of attack.
As our security experts are conducting the perpetual attacks (automated and manual) and exploiting vulnerable attack vectors, no denial of service or destructive testing will be done intentionally. This allows us to identify insecure software and communication systems without exposing your services to unnecessary operational risks.
Some common problems that we find with this service include
Using automation for network discovery and scanning, we will regularly scrutinize your network to identify exposed applications and services. Such systems may include databases, web applications, workstations, internal infrastructure, or other applications you aren't even aware of. These can pose a serious threat because they may have been built quickly for a proof-of-concept and never taken off-line. This data will help us build the infrastructure map and forms the basis of the attack surface model. We'll target everything until your administrators properly lock-down the infrastructure to deny unauthorized access.
Every time the network and applications are scanned for discovery, the data is maintained in a visual map which correlates the network topology of applications to all discovered application vulnerabilities. In addition, changes over time in the organization’s attack surface can be viewed to provide insights into the effectiveness of security measures or to look for hot-spots. The attack surface modeling process exposes information in a variety of levels and forms. Whether you seek statistical information about the security of a particular application or the entire network, or need complete details of a recently discovered vulnerability, it’s all there. Together, these elements bring together a visual way to investigate your risk profile.
As applications and services are discovered on the network, our experts leverage their expansive knowledge and experience to determine which applications pose the greatest risk to key data. The level of risk is triaged via a series of manual tests on various configuration, development, and design elements. These tests may include techniques to uncover Information Disclosure issues, rapid testing for the OWASP Top 10, vulnerability scanning, and other hybrid approaches.
The heart of attack simulation is ultimately the security assessments of software applications - the source of over 90% of all IT security vulnerabilities. We will apply both automated and manual analysis on your infrastructure to uncover security holes that can be exploited by attackers. Moreover, we will work with your teams and vendors to ensure they understand the vulnerabilities and the steps necessary to remediate them.
Our software security analysis will be both white-box (code review) for applications you own, and black-box (no code necessary) for all applications. All resulting vulnerabilities are updated and delivered via the attack surface model tool. In addition, the application security analysis will focus on the exploitation and attack chaining in a way that our typical services do not. The resulting analysis will reflect a more true-to-life analysis that emphasizes what motivated attackers could actually do.