ATTACKIFY





  • Home
  • Security Controls

Validate endpoint security controls and perform a number of compliance checks to ensure systems are securely configured.

Security Controls

ATTACKIFY has a number of endpoint security control modules designed to audit endpoints according to a number of compliance requirements, password policies & endpoint exploitability according to Service Pack, Hot fixes and patches installed on endpoints audited against Microsoft Security Bulletin Data.

Some of the modules included are:

  • LLMNR/NBT-NS Attack Mitigation Audit
  • DLL Search Order Hijacking Check
  • Password Policy Audit
  • Windows Compliance Audit - High Priority
  • Unquoted Service Path Chaekcs
  • User Account Control
  • Current Vulnerability Exposure
  • CIS Benchmarks
  • Software CVE Inventory Scanning

Related Modules

Phishing

Usually phishing / spearphishing is the first approach by which adversaries attempt to gain initial access to an organizations environment.

more info

Exfiltration

Exfiltration modules allow you to discover various techniques that can be used to exfiltrate sensitive data from within the organization to external C2's. Discover which services, ports and protcols can bypass your DLP solutions.

more info

Ransomware

Select from a number of modules to simulate ransomware behaviour on endpoints and communication over networks.

more info