External Infrastructure
External Infrastructure assessments identify what is possible from an external attackers' perspective, which systems are accessible from the public domain and how they could potentially be exploited.
The general approach is to identify as much information as possible about your business or organisation. This is done using open-source intelligence (OSINT), utilising various sources of information such as email addresses, employee names and roles, potential usernames, software utilisation, directory, and folder structures, and operating systems are harvested.
WIRED | René Gielen, VP of Apache Struts, https://www.wired.com/story/equifax-breach-no-excuse/
The more information an assailant has, the more useful it becomes. As such, this should be addressed by any organisation that has a low-risk tolerance when it comes to cybersecurity.
Unfortunately, some aspects cannot easily be controlled; however, being aware of their existence and how the information can be weaponised goes a long way in focusing attention and dealing with areas that require it.
An automated scan is undertaken to identify any low hanging fruit, each system and each service is then manually interrogated for security concerns.
Laneden works closely with our clients to understand their drivers and build an appropriate scope of works.
We provide a thorough and independent examination of your corporate infrastructure to identify security vulnerabilities within the software, systems and network configurations.
We can provide an on-site debriefing of the findings explaining how attackers could potentially gain control of your systems and exfiltrate data.
A comprehensive report is written containing an executive summary which is consumable by anyone in the organisation regardless of their technical background.
The well-defined report contains enough detail to allow you to not only understand the potential attack vectors but also concise and clear guidance on how to either mitigate or remediate the concerns.
WIRED| Bas van Schaik, Researcher Semmle, https://www.wired.com/story/equifax-breach-no-excuse/