ESED Attack
Ethical Hacking technique to validate the security level of a system or IT infrastructure
The best defense is a good offense
To assess the security level and vulnerabilities of a company, we conduct controlled and harmless attacks against its IT system.
Definition of validation points
We select the equipment and servers on which the tests will be executed. The attacks are harmless and are carried out in a controlled manner thanks to an orchestrator agent installed on the machines where the tests are conducted.
Execution of simulations
We recreate controlled attack scenarios to assess the effectiveness of the defenses of an IT infrastructure. These simulations allow us to identify vulnerabilities, test the incident response, and strengthen threat detection and mitigation capabilities without affecting actual operations.
Presentation of results
We prepare recurring reports to measure the obtained results. The attacked company can see in detail its vulnerabilities, weaknesses, and security gaps, enabling it to implement specific and tailored cybersecurity solutions to address them.
Techniques we use
Execution
Execution involves techniques that allow us to determine whether the code controlled by the attacker runs locally or remotely. Techniques that execute malicious code are usually combined with others to achieve broader objectives, such as exploring a network or stealing data.
Persistence
Persistence consists of techniques that attackers use to maintain access to systems during restarts, credential changes, and other interruptions that could disrupt access. Persistence techniques include any access changes, actions, or configurations that allow an attacker to maintain their position in the systems.
Privilege escalation
Privilege escalation involves techniques used by attackers to obtain higher-level permissions on a networked system. Attackers can usually explore a network with unprivileged access, but since they require elevated permissions to complete their objectives, they typically try to exploit system weaknesses, misconfigurations, and known vulnerabilities to escalate their position.
Defense Evasion
Defense evasion consists of techniques that attackers use to avoid detection during their attack. Techniques used for defense evasion include disabling or uninstalling security software or encrypting data and scripts.
Credential access
Credential access involves techniques for stealing passwords. Techniques used to obtain such passwords include keylogging or credential dumping. The use of legitimate credentials—i.e., real ones—can facilitate attackers' access to systems, making detection more difficult and giving them the opportunity to create more legitimate accounts.
Discovery
Discovery consists of techniques an attacker uses to gain knowledge about the system and the internal network. These techniques help the attacker observe the environment and orient themselves before deciding how to act. It also allows cybercriminals to explore what they can control and what is around the entry point.
Lateral movement
Lateral movement involves techniques that attackers use to enter a network and control systems remotely. To achieve their goal, cybercriminals typically move between various devices connected to the same network using lateral movement.
Collection
Collection consists of techniques used to gather information and detect information sources. Common collection methods include screenshots, keystrokes, among others.
Command and control
Command and control consist of techniques that cybercriminals use to communicate with systems that are already under their control within a network or botnet. They usually try to mimic normal traffic to avoid detection.
Exfiltration
Exfiltration consists of techniques that attackers use to steal data from their network. Once the data has been gathered, attackers typically package it using compression and encryption to avoid detection while removing it.
Impact
Impact consists of techniques that cybercriminals use to disrupt the availability of a service or compromise the integrity of server data by manipulating operational and business processes.
Ransomware
Ransomware attacks involve encrypting information on systems, making all documents inaccessible. Once the attack has been executed, attackers demand a ransom to provide the decryption key for the information. The technique involves testing different ransomware attacks to validate whether systems are protected against this type of attack or not.
Validations we perform
Vulnerability scanning
Credential theft
Firewall testing
Antivirus testing
Simulation and execution of cyberattacks (ransomware, phishing...)
Penetration testing
Do you need more information or do you have any questions?
Please fill out the following form, and a cybersecurity IT specialist will get in touch with you.