We are going to look for a way to access any of your organization's assets that rest conected to insecure networks. An attacker or a malicious user needs just one open door to start compromising all your systems.
Once we are in, we need to escalate our privileges. The higher the level we achieve, the greater the amount of assets that we will be able to compromise and the firmer the control we could exercise over them.
We will try to access to as many resources as possible, pivoting and escalating until your security measures put a stop on our tests. Every compromised asset poses a latent risk to your organization.
To properly determine how much it's going to cost, how long it's going to take and how many resources the auditing process needs, we have to know the kind and quantity of assets that lie exposed, which ones to audit and where is the limit on the intrusion process. Don't worry, fill in a simple form and we will take care of the rest.
After setting up a date and defining a work schedule, we can start the intrusion process. It is a long process, but we must avoid being detected. Yet if we find any vulnerability that could pose a risk to your assets we will warn you inmediately.
This is perhaps for you the most important part of all this process. This represents the sum of all our efforts and hard work, and it reflects your assets real status. This is what sets us appart from our competitors, so we are going to make sure that it is redacted with utmost care and precission.