Attack Solutions, Inc. (ASI) is an innovative provider of cybersecurity services with a global network of security experts and a rapid response team specialized in the prevention, detection, neutralization, and adaptation of cyberthreats. ASI has amassed a professional network of security practitioners with domain expertise to effectively deal with the basic to the most challenging cyberthreat types. We perform real time analytics on global cybersecurity activities observing and discovering attack trends, and applying that intelligence to evolve and adapt potent solutions to neutralize newer attack types.
Cybersecurity is the practice applied to protect computer networks, programs, data, and devices from damage or unauthorized access by malicious actors. ASI traditionally concentrated its cyber efforts on Information Security to maintain the confidentiality, integrity, and availability of data. As computing proliferated down to smaller devices such as phones and specialized controllers, and up towards enterprise systems and global cloud environments, the demand to secure corporate computing assets mushroomed into cybersecurity. ASI observed this trend and evolved its Information Security offerings to an all encompassing cybersecurity practice.
|1||Reconnaissance||ASI gathers technical infrastructure information about the environment and systems that are to be penetrated tested utilizing proven systems inventory techniques and tools such as Netsparker, and Wireshark. This enables our cyber specialists to assimilate a comprehensive directory of all the underlining components of what is to be penetrated and exploited. This reconnaissance phase is performed with strict permission from the client and in extreme cases the infrastructure to be exploited may be mirrored, giving ASI full liberty to perform its cyber duties unobstructed against the mirror, while reassuring the client that its production operations continues uninterrupted.||NMAP, Nessus, Open VAS|
|2||Infrastructure Topology||An end to end visual representation of the client’s infrastructure is assimilated by our assigned team of cybersecurity and network administrators. This representation is based on the inventory gathered in reconnaissance phase. This will cover the client’s local, the internet, and over the cloud infrastructure that are within the scope of the pentest engagement. The end result is a comprehensive topology map of the systems in scope, exhibited as network control flow diagrams using iconographic metaphors. The objective is to diagrammatically represent the digital footprint of affected systems and components using tools such as Visio, SolarWinds, Network Topology Mapper and DataDog.||Microsoft Visio, SolarWinds Network Topology Mapper, Datadog Network Performance Monitoring|
|3||Risk Register||A risk register is a centralised information repository of all known and suspected vulnerabilities. Our engineers will perform risk management activities to create a comprehensive list of security risks identified in the target environment. It is about the identified potential risks, risk’s nature and mitigation steps to be adopted. The team will categorize the listed risks according to the severity of the damage they may cause. Some of the common risk classification labels are Low, Moderate, Elevated, High and Extreme. SpiraPlan with Risk Audit Trial, Risk Management Studio and AI tracker are some of the tools used for this phase.||SpiraPlan by Inflectra, A1 Tracker, Risk Management Studio|
|4||Penetration Testing||Penetration testing or pentesting is a simulated cyber-attack on the target by our specialists after obtaining proper authorization from the client. This phase’s objective is to uncover the system’s security vulnerabilities. Different malicious natured techniques are formulated and applied to evaluate the system against the security vulnerabilities. This test’s result is the identification and reporting of the system’s weak points and security flaws in a realistic manner. Vulnerability scanners will be used to check the presence of security weaknesses in the system having chances of getting attacked. Some of the tools used for this phase are Netsparker, Wireshark and MetaSpoilt.||Netsparker, Wireshark, Metasploit|
|5||Vulnerability Classification||Vulnerability refers to the exploitable weak spots, through which attackers gain access into the systems and extract sensitive information. The nature of the weak spots discovered during penetration testing may vary on their damage causing capability. Our domain experts will analyse and classify the identified vulnerabilities possessing the potential to create major cyber security threats to the client’s system. Sophistication and damage severity is a sample parameter for the classification process. Faulty defences, poor resource management and insecure connection are some of the common vulnerability categories covered by us. Wireshark, Burp Suite and Nmap are tools used in this phase.||Wireshark, Nmap, Burp Suite|
|6||Attack Vectors||Analysis of the network topology and the results of reconnaissance phase help our authorities in consolidating all the possible critical parts that might elevate the risk’s degree. Such a consolidated list is the attack vector, which is an enumeration for listing the critical risks. It refers to the route, electronically followed by an attacker to exploit cybersecurity vulnerabilities. Phishing emails, Malwares and Unpatched vulnerabilities are the common attack vectors. This attack vector is referred by our ethical hacking team to penetrate the system by following Standard Operating Procedures. Nmap, Acunetix and OpenVAS are some of the tools we use here.||Nmap, Acunetix, OpenVAS|
|7||Ethical Mock Attack||An emulated production environment of the client’s infrastructure will be presented to our proficients. They will utilize the attack vectors to exploit the critical vulnerabilities. This is carried out by following a strict contractual permission with the client. This process will enable our team to inform you, the client about the kind of vulnerabilities experienced, the most targeted information during an attack and the best way to fix the same. This phase’s outcome is a report containing the top most vulnerabilities and recommendations to overcome such risks. Some of the tools used for this phase are Netsparker, Acunetix and Nmap.||Metasploit Framework, Acutinex WVS, Nmap|
|8||Penetration Testing and Damage||As soon as our ethical hacker infiltrates into the system, procedures created to cause all the possible damages are meticulously exercised. The result will be an infiltrated system with actual damages on the weak spots. Then we will list all the possible ways by which a malicious hacker could exploit the system. Even though this phase is performed under a controlled environment by adhering to the agreement clauses mentioned in the contract between us and the client, the actual damage is done to assess the impact. Kiuwan, Metasploit Framework and Nmap are some of the tools used for this phase.||Kiuwan, Metasploit Framework, Nmap|
|9||Findings and Recommendations||It is the post attack activity, where the results of carried out ethical attack is consolidated and presented. Here our cyber security team will do this by presenting a summary report. It will contain the list of the weaknesses successfully exploited; root cause, damages caused, damage’s impact, vulnerability’s category, our suggestions to improve the cyber security and methods to eliminate the listed exploits. This report will contain every detail, so that retesting is possible in future. The report will be prepared and presented section-wise by following a standard template. For this phase, tools like Metasploit and SWOT will be used.||Metasploit, SWOT|
|10||Vulnerability Remediation||The goal of vulnerability remediation is to ensure that the threat entry weak spots are prevented. This is done by fixing the vulnerabilities with customised remedial measures that are effective and reliable. The remedial process consists of prescribing reliable solutions to cover the identified and reported weak spots by our expert group. Remedies are prescribed in the form of patches. These patches will block the security holes discovered during the penetration testing process. This is a collaborative effort between our pentest team and the client. Wireshark, Nmap and Burp Suite are some of the tools we use during this phase.||Wireshark, Nmap, Burp SUite|
|11||System Hardening||Patch based remedies is not a permanent solution. It is essential to equip the system with the capability to tackle future attacks. System hardening phase does this, where our specialised personnel will add robust characteristic to the system through reconfiguration methods. In simple terms it is giving a technical face-lift to the system. The upgrade may be on the operating systems, firewall and intrusion detection software. Our staff will recommend methods that add immunity to handle new attacks after the system hardening phase. SonarQube, Veracode, AppScan, GitLab, Acunetix and Netsparker are some of the tools we use in this process.||SonarQube, Veracode, AppScan, GitLab, Acutinex, Netsparker|
|12||Cyber Policy Formulation||System hardening phase helps the system to acquire the required immunity to handle future attacks. Our architects will recommend a set of policies that ensure that the hardened system is covered by the immunity shield. In this phase, a set of rules and guidelines to protect the system, data and its users from future attacks is prescribed. After the ethical infiltration process, the expert team will go through the existing security guidelines of the system. Then a revised policy will be recommended to overcome the future attacks. DevSecOps tools are used to embed cyber security policies into the studied system.||DevSecOps tools, Acceptable Use Policy, NAC|
|13||Cyber Policy Implementation||Implementation of the formulated cyber policy is imperative to ensure that the hardened system is equipped enough. Our squad will enforce the revised cyber policy rules and guidelines into the hardened system. They will also ensure that the policies remain effective, intact and adhered without any deviations when planned and unplanned changes take place in the system that underwent penetration testing. This will involve re-orienting the system administration team with the revised set of do’s and don’ts to be followed hereafter. Here an Acceptable Usage Policy is enforced by us to ensure that the hardened system follows the implemented policies.||DevSecOps tools, Acceptable Use Policy, NAC|
|14||Penetration Testing Rescan||Any task will remain incomplete without a re-check. In cyber security, penetration testing rescan phase does this. Our penetration testing team will carry out a complete rechecking on the processes viz. Vulnerability Remediation, System Hardening and Formulation and Implementation of Revised Cyber Policies. It also involves a thorough checking of the released patches for their capability to tackle future attacks. Our pundits redo the cycle of infiltration attempt to ensure that the recommendations are implemented and the system under study is immune enough to face future attacks. This rescan serves a safety assurance label for the system to the client.||Kiuwan, Metasploit Framework, Nmap|
If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.