Attack Solutions, Inc. (ASI) is an innovative provider of cybersecurity services with a global network of security experts and a rapid response team specialized in the prevention, detection, neutralization, and adaptation of cyberthreats. ASI has amassed a professional network of security practitioners with domain expertise to effectively deal with the basic to the most challenging cyberthreat types. We perform real time analytics on global cybersecurity activities observing and discovering attack trends, and applying that intelligence to evolve and adapt potent solutions to neutralize newer attack types.
Cybersecurity is the practice applied to protect computer networks, programs, data, and devices from damage or unauthorized access by malicious actors. ASI traditionally concentrated its cyber efforts on Information Security to maintain the confidentiality, integrity, and availability of data. As computing proliferated down to smaller devices such as phones and specialized controllers, and up towards enterprise systems and global cloud environments, the demand to secure corporate computing assets mushroomed into cybersecurity. ASI observed this trend and evolved its Information Security offerings to an all encompassing cybersecurity practice.
Item | Phases | Description | Tools |
---|---|---|---|
1 | Reconnaissance | ASI gathers technical infrastructure information about the environment and systems that are to be penetrated tested utilizing proven systems inventory techniques and tools such as Netsparker, and Wireshark. This enables our cyber specialists to assimilate a comprehensive directory of all the underlining components of what is to be penetrated and exploited. This reconnaissance phase is performed with strict permission from the client and in extreme cases the infrastructure to be exploited may be mirrored, giving ASI full liberty to perform its cyber duties unobstructed against the mirror, while reassuring the client that its production operations continues uninterrupted. | NMAP, Nessus, Open VAS |
2 | Application Map / Infrastructure Topology | An end to end visual representation of the client’s infrastructure is assimilated by our assigned team of cybersecurity and network administrators. This representation is based on the inventory gathered in reconnaissance phase. This will cover the client’s local, the internet, and over the cloud infrastructure that are within the scope of the pentest engagement. The end result is a comprehensive topology map of the systems in scope, exhibited as network control flow diagrams using iconographic metaphors. The objective is to diagrammatically represent the digital footprint of affected systems and components using tools such as Visio, SolarWinds, Network Topology Mapper and DataDog. | Microsoft Visio, SolarWinds Network Topology Mapper, Datadog Network Performance Monitoring |
3 | Risk Register | A risk register is a centralised information repository of all known and suspected vulnerabilities. Our engineers will perform risk management activities to create a comprehensive list of security risks identified in the target environment. It is about the identified potential risks, risk’s nature and mitigation steps to be adopted. The team will categorize the listed risks according to the severity of the damage they may cause. Some of the common risk classification labels are Low, Moderate, Elevated, High and Extreme. SpiraPlan with Risk Audit Trial, Risk Management Studio and AI tracker are some of the tools used for this phase. | SpiraPlan by Inflectra, A1 Tracker, Risk Management Studio |
4 | Vulnerability Assessment Scan | Vulnerability Scanning is the phase in the Pen Testing Cycle in which the application and its environment are traversed using a selection of sophisticated cyber tools to uncover the system’s security vulnerabilities / weaknesses. Typical weaknesses may be open ports, poorly secured APIs, weak credentials, authorization that can be escalated, and other system constructs that can be easily exploited. Automated scanners will check the presence of security weaknesses in the system having greater chances of getting attacked. This is one of the most critical phases in the Pen Testing Cycle, as it highlights and pinpoint security exposures that may become visible to bad actors. Some of the tools used for this phase are Netsparker, Wireshark and MetaSpoilt. | Netsparker, Wireshark, Metasploit |
5 | Vulnerability Classification | Vulnerability refers to the exploitable weak spots, through which attackers gain access into the systems and extract sensitive information. The nature of the weak spots discovered during penetration testing may vary on their damage causing capability. Our domain experts will analyse and classify the identified vulnerabilities possessing the potential to create major cyber security threats to the client’s system. Sophistication and damage severity is a sample parameter for the classification process. Faulty defences, poor resource management and insecure connection are some of the common vulnerability categories covered by us. Wireshark, Burp Suite and Nmap are tools used in this phase. | Wireshark, Nmap, Burp Suite |
6 | Attack Vectors | Analysis of the network topology and the results of reconnaissance phase help our authorities in consolidating all the possible critical parts that might elevate the risk’s degree. Such a consolidated list is the attack vector, which is an enumeration for listing the critical risks. It refers to the route, electronically followed by an attacker to exploit cybersecurity vulnerabilities. Phishing emails, Malwares and Unpatched vulnerabilities are the common attack vectors. This attack vector is referred by our ethical hacking team to penetrate the system by following Standard Operating Procedures. Nmap, Acunetix and OpenVAS are some of the tools we use here. | Nmap, Acunetix, OpenVAS |
7 | Ethical Mock Attack | An emulated production environment of the client’s infrastructure will be presented to our proficients. They will utilize the attack vectors to exploit the critical vulnerabilities. This is carried out by following a strict contractual permission with the client. This process will enable our team to inform you, the client about the kind of vulnerabilities experienced, the most targeted information during an attack and the best way to fix the same. This phase’s outcome is a report containing the top most vulnerabilities and recommendations to overcome such risks. Some of the tools used for this phase are Netsparker, Acunetix and Nmap. | Metasploit Framework, Acutinex WVS, Nmap |
8 | Exploitation and Damage | As soon as our ethical hacker infiltrates into the system, procedures created to cause all the possible damages are meticulously exercised. The result will be an infiltrated system with actual damages on the weak spots. Then we will list all the possible ways by which a malicious hacker could exploit the system. Even though this phase is performed under a controlled environment by adhering to the agreement clauses mentioned in the contract between us and the client, the actual damage is done to assess the impact. Kiuwan, Metasploit Framework and Nmap are some of the tools used for this phase. | Kiuwan, Metasploit Framework, Nmap |
9 | Findings and Recommendations | It is the post attack activity, where the results of carried out ethical attack is consolidated and presented. Here our cyber security team will do this by presenting a summary report. It will contain the list of the weaknesses successfully exploited; root cause, damages caused, damage’s impact, vulnerability’s category, our suggestions to improve the cyber security and methods to eliminate the listed exploits. This report will contain every detail, so that retesting is possible in future. The report will be prepared and presented section-wise by following a standard template. For this phase, tools like Metasploit and SWOT will be used. | Metasploit, SWOT |
10 | Vulnerability Remediation | The goal of vulnerability remediation is to ensure that the threat entry weak spots are prevented. This is done by fixing the vulnerabilities with customised remedial measures that are effective and reliable. The remedial process consists of prescribing reliable solutions to cover the identified and reported weak spots by our expert group. Remedies are prescribed in the form of patches. These patches will block the security holes discovered during the penetration testing process. This is a collaborative effort between our pentest team and the client. Wireshark, Nmap and Burp Suite are some of the tools we use during this phase. | Wireshark, Nmap, Burp SUite |
11 | System Hardening | Patch based remedies is not a permanent solution. It is essential to equip the system with the capability to tackle future attacks. System hardening phase does this, where our specialised personnel will add robust characteristic to the system through reconfiguration methods. In simple terms it is giving a technical face-lift to the system. The upgrade may be on the operating systems, firewall and intrusion detection software. Our staff will recommend methods that add immunity to handle new attacks after the system hardening phase. SonarQube, Veracode, AppScan, GitLab, Acunetix and Netsparker are some of the tools we use in this process. | SonarQube, Veracode, AppScan, GitLab, Acutinex, Netsparker |
12 | Cyber Policy Formulation | System hardening phase helps the system to acquire the required immunity to handle future attacks. Our architects will recommend a set of policies that ensure that the hardened system is covered by the immunity shield. In this phase, a set of rules and guidelines to protect the system, data and its users from future attacks is prescribed. After the ethical infiltration process, the expert team will go through the existing security guidelines of the system. Then a revised policy will be recommended to overcome the future attacks. DevSecOps tools are used to embed cyber security policies into the studied system. | DevSecOps tools, Acceptable Use Policy, NAC |
13 | Cyber Policy Implementation | Implementation of the formulated cyber policy is imperative to ensure that the hardened system is equipped enough. Our squad will enforce the revised cyber policy rules and guidelines into the hardened system. They will also ensure that the policies remain effective, intact and adhered without any deviations when planned and unplanned changes take place in the system that underwent penetration testing. This will involve re-orienting the system administration team with the revised set of do’s and don’ts to be followed hereafter. Here an Acceptable Usage Policy is enforced by us to ensure that the hardened system follows the implemented policies. | DevSecOps tools, Acceptable Use Policy, NAC |
14 | Vulnerability Reassessment Scan | Any remediation is incomplete without a recheck. In penetration testing a rescan of the application is performed to confirm that the remediated vulnerabilities have been addressed and are no longer weaknesses that can be exploited. Rescan can be executed against the entire application or can be narrowed to only those vulnerabilities that were remediated. A complete rescan is an expensive approach, but has the advantage of taking a holistic view of the application after remediation. This reconfirms that the remediated items are rectified, and that no additional weaknesses were inadvertently introduced into the application during the remediation. A rescan of only the remediated vulnerabilities is rapid and cost effective, but provides no assurance that against the introduction of further weaknesses.. | Kiuwan, Metasploit Framework, Nmap |
If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.