Social Engineering is when our security engineers attempt to obtain credentials, internal procedures or access, in person, over the phone or via email. We follow this up by performing a sweep of the dark web and Internet to obtain remote access tools or leaked credentials. This step is critical to complete a full penetration test.
An important step during the penetration test is to have a vulnerability scan. This information is typically used for compliance reasons. However, this information can be very helpful in identifying all the low hanging fruit in your network environment. After a vulnerability is discovered, our security engineers will attempt breach or take control of the network device.
After the vulnerability has been exposed, is it important so show, explain and educate on how the incident occurred, then how to avoid in the future. After the penetration test is concluded our security engineers will meet up with the client to ensure they have a firm understanding on the exposed vulnerability and how to fully remediate the issue.