Establish rules of engagement
Unit 42 will issue a survey ensuring alignment on scope, timeline, restrictions, limitations and custom objectives.
Unit 42 will issue a survey ensuring alignment on scope, timeline, restrictions, limitations and custom objectives.
Our team will engage in reconnaissance to find any public-facing information that may be used during the Exploit phase.
Unit 42 will perform a Vulnerability Analysis to identify risks and inspect and verify any false positives.
After gaining initial access, our experts will attempt to bypass security controls using a variety of tools and techniques.
Our consultants will then attempt to replicate likely attacker objectives, such as gathering credentials and accessing sensitive data.
We will deliver a detailed report that describes the impact an attack could have on your business and specific recommendations for next steps.