Effective Cyber Security Assessments

Identify security vulnerabilities in your applications and networks

Advanced Attack and Penetration Services

Effective Security performs attack & penetration services that simulate risks to various infrastructure layers from unauthenticated attackers, malicious users, abusive business partners, and rouge employees.

The Benefit of Performing Security Assessments

Security assessments identify vulnerabilities in applications, systems, infrastructures and architectures and provide detailed recommendations on the required mitigation methods:

  • Cost-effective prioritization of security recommendations and suggested mitigation plans
  • Code-level mitigation, Configuration improvements and Virtual-patching patterns
  • Deployment modifications, System hardening recommendations and required network controls

External Security Assessments Services

Identify vulnerabilities in applications, networks, and architectures
Thorough, efficient, proven and tested penetration testing methodologies, using any of the following approaches:

  • Grey-Box: maximize vulnerability detection ratio by providing low privileged user accounts and prior knowledge on the target
  • Black-Box: measure and evaluate exposure level by simulating real-hacking scenarios without prior knowledge on the target
Web Application Penetration Testing
Simulating an unauthenticated attacker or a malicious low-privileged user, attempting to identify vulnerabilities in the web application that could abuse the business logic, corrupt the information stored, or grant access to administrative features, confidential information, financial data or the internal network.
Covers both logical vulnerabilities and technical vulnerabilities listed in TECAPI RvR, OWASP Top10 / Attacks / Vulnerabilities, WASC Threat Classification, CWE (Common Weakness Enumeration) and CAPEC (Common Attack Pattern Enumeration and Classification).
External Network Penetration Testing
Identifies vulnerabilities in the organization internet facing assets, systems, servers, and networking equipment, while covering known vulnerabilities, configuration and deployment flaws, enumeration methods and mapping techniques listed in ISECOM OSSTMM, CVE/NVD, Security Focus BID and additional methodologies, vulnerability repositories and toolsets.
Can simulate both unauthenticated attackers (Black-Box) and low privileged users (Grey-Box).

Internal Security Assessments Services

Identify Vulnerabilities Available to Insider Threads or Attackers in Proximity
Internal security assessments are performed in physical proximity or from within the organization, and aim to identify methods that can be used by malicious employees, attackers in proximity, Trojan horses and ransom-ware during an exploitation attempt against the organization internal network.
These assessments can either be performed on-site, or remotely using a shipped-in remotely-controlled testing device, at your convenience.
Internal Network Penetration Testing
Identifies possible exploitation paths in the organization internal network and the extent of their impact, either by simulating an attack from a compromised employee station, accessing the network from a semi-legitimate restricted sub-contractor VPN access, or by simulating an attack from an external station connected to the organization network.

Covers a variety of privilege escalation methods, Internal-network MITM attacks, passive/active target acquisition and vulnerability identification and exploitation of security vulnerabilities, CVE/NVD, Security Focus BID and additional methodologies, vulnerability repositories and toolsets.

Interested in this service?

If you are interested in our service, send us an inquiry and we will get back to you as soon as we can!