External Infrastructure

External Infrastructure assessments identify what is possible from an external attackers' perspective, which systems are accessible from the public domain and how they could potentially be exploited.

The general approach is to identify as much information as possible about your business or organisation. This is done using open-source intelligence (OSINT), utilising various sources of information such as email addresses, employee names and roles, potential usernames, software utilisation, directory, and folder structures, and operating systems are harvested.

"A patch that would have prevented the devastating Equifax breach had been available for months."

"Most breaches we become aware of are caused by failure to update software components that are known to be vulnerable for months or even years"



WIRED | René Gielen, VP of Apache Struts
, https://www.wired.com/story/equifax-breach-no-excuse/




The more information an assailant has, the more useful it becomes. As such, this should be addressed by any organisation that has a low-risk tolerance when it comes to cybersecurity.

Unfortunately, some aspects cannot easily be controlled; however, being aware of their existence and how the information can be weaponised goes a long way in focusing attention and dealing with areas that require it.

An automated scan is undertaken to identify any low hanging fruit, each system and each service is then manually interrogated for security concerns.


Laneden works closely with our clients to understand their drivers and build an appropriate scope of works.

We provide a thorough and independent examination of your corporate infrastructure to identify security vulnerabilities within the software, systems and network configurations.

We can provide an on-site debriefing of the findings explaining how attackers could potentially gain control of your systems and exfiltrate data.

A comprehensive report is written containing an executive summary which is consumable by anyone in the organisation regardless of their technical background.

The well-defined report contains enough detail to allow you to not only understand the potential attack vectors but also concise and clear guidance on how to either mitigate or remediate the concerns.

This vulnerability was disclosed back in March. There were clear and simple instructions of how to remedy the situation. The responsibility is then on companies to have procedures in place to follow such advice promptly

WIRED| Bas van Schaik, Researcher Semmle, https://www.wired.com/story/equifax-breach-no-excuse/

FREQUENTLY ASKED QUESTIONS