ESED Attack

Ethical Hacking technique to validate the security level of a system or IT infrastructure

The best defense is a good offense

To assess the security level and vulnerabilities of a company, we conduct controlled and harmless attacks against its IT system.

Definition of validation points

We select the equipment and servers on which the tests will be executed. The attacks are harmless and are carried out in a controlled manner thanks to an orchestrator agent installed on the machines where the tests are conducted.

Execution of simulations

We recreate controlled attack scenarios to assess the effectiveness of the defenses of an IT infrastructure. These simulations allow us to identify vulnerabilities, test the incident response, and strengthen threat detection and mitigation capabilities without affecting actual operations.

Presentation of results

We prepare recurring reports to measure the obtained results. The attacked company can see in detail its vulnerabilities, weaknesses, and security gaps, enabling it to implement specific and tailored cybersecurity solutions to address them.

asesoramiento-360
ESED Attack manual
Find all the details about ESED Attack in its technical manual.
Download manual
ESED Attack: Security validation of computer systems

Techniques we use

Execution

Execution involves techniques that allow us to determine whether the code controlled by the attacker runs locally or remotely. Techniques that execute malicious code are usually combined with others to achieve broader objectives, such as exploring a network or stealing data.

 

ejecucion

Persistence

Persistence consists of techniques that attackers use to maintain access to systems during restarts, credential changes, and other interruptions that could disrupt access. Persistence techniques include any access changes, actions, or configurations that allow an attacker to maintain their position in the systems.

Persistencia

Privilege escalation

Privilege escalation involves techniques used by attackers to obtain higher-level permissions on a networked system. Attackers can usually explore a network with unprivileged access, but since they require elevated permissions to complete their objectives, they typically try to exploit system weaknesses, misconfigurations, and known vulnerabilities to escalate their position.

escalada-de-privilegios

Defense Evasion

Defense evasion consists of techniques that attackers use to avoid detection during their attack. Techniques used for defense evasion include disabling or uninstalling security software or encrypting data and scripts.

evasión-de-la-defensa

Credential access

Credential access involves techniques for stealing passwords. Techniques used to obtain such passwords include keylogging or credential dumping. The use of legitimate credentials—i.e., real ones—can facilitate attackers' access to systems, making detection more difficult and giving them the opportunity to create more legitimate accounts.

acceso-a-credenciales

Discovery

Discovery consists of techniques an attacker uses to gain knowledge about the system and the internal network. These techniques help the attacker observe the environment and orient themselves before deciding how to act. It also allows cybercriminals to explore what they can control and what is around the entry point.

descubrimiento

Lateral movement

Lateral movement involves techniques that attackers use to enter a network and control systems remotely. To achieve their goal, cybercriminals typically move between various devices connected to the same network using lateral movement.

Movimiento-lateral

Collection

Collection consists of techniques used to gather information and detect information sources. Common collection methods include screenshots, keystrokes, among others.

Recopilación

Command and control

Command and control consist of techniques that cybercriminals use to communicate with systems that are already under their control within a network or botnet. They usually try to mimic normal traffic to avoid detection.

comando-y-control

Exfiltration

Exfiltration consists of techniques that attackers use to steal data from their network. Once the data has been gathered, attackers typically package it using compression and encryption to avoid detection while removing it.

exfiltración

Impact

Impact consists of techniques that cybercriminals use to disrupt the availability of a service or compromise the integrity of server data by manipulating operational and business processes.

Impacto

Ransomware

Ransomware attacks involve encrypting information on systems, making all documents inaccessible. Once the attack has been executed, attackers demand a ransom to provide the decryption key for the information. The technique involves testing different ransomware attacks to validate whether systems are protected against this type of attack or not.

ransomware-2

Validations we perform

Vulnerability scanning

Credential theft

Firewall testing

Antivirus testing

Simulation and execution of cyberattacks (ransomware, phishing...)

Penetration testing

Do you need more information or do you have any questions?

Please fill out the following form, and a cybersecurity IT specialist will get in touch with you.