An engineer acts like an attacker hacking in from the outside with an end goal of breaking into your network from the perimeter. Threat Potential follows a detailed methodology, including performing reconnaissance, full TCP and UDP port scanning and enumeration, exploitation, credential stuffing and password spraying attacks, and more.
An engineer emulates an attacker hacking from inside the network with an end goal of gaining access to sensitive accounts, documents, and obtaining domain admin credentials. Common attacks scenarios include LLMNR/NBT-NS poisoning, SMB relay, kerberoasting, pass-the-hash, pass-the-password, golden and silver ticket attacks, and more.
Wireless testing is the evaluation of your wireless posture. Nearly every business provides wireless access for their employees. Some go as far as allowing guests on the network. Our engineers evaluate WPA password strength, perform evil twin attacks, conduct WPA-Enterprise bypassing attacks, and evaluate network visibility and segmentation.