In-depth security tests of all system components from the perspective of an external or internal attacker.
During a penetration test the analysts from Nullsecurity Labs take the perspective of an attacker. The goal is to find vulnerabilities on the systems in scope and exploit them or use them for further attacks.
The analysts from Nullsecurity Labs try to infiltrate as many components of the infrastructure as possible by exploiting multiple vulnerabilities. Before the test starts the scope and the level of penetration of systems will be defined with the customer.
Manual, semi-automated and automated security tests to identify vulnerabilities.
In Vulnerability Assessment the goal is to identify vulnerabilities without actively exploiting them. Thereby, an overview of the vulnerabilities is given so they can be fixed or mitigated.
At the beginning of the test, the scope and time frame are defined with the customer. Critical systems are excluded during the automated tests and analyzed separately by semi-automated or manual security tests.
Security analyses of the components within a cloud environment.
During a Cloud Security Test, the settings of the environment at the cloud provider (AWS, GCP or Azure) are verified and tested for misconfiguration. Additionally, vulnerabilities in the service's APIs, applications and cloud instances will be identified.
The analysts of Nullsecurity Labs search among other systems for tokens that give access to the resources used within the cloud environment or for exposed and unprotected APIs.
Security analyses based on a situation developed with the customer.
At the beginning of a Scenario Based Audit, a procedure for the attacks is specified in cooperation with the customer. Afterwards, the analysts of Nullsecurity Labs perform the planned attacks.
The analysis which are performed during the scenario based audit are not limited to technical approaches but contain, among others, tests of physical access control systems or social engineering campaigns. The goal depends on the specified scenario and can e.g. increase the security awareness of the employees or verify the implemented security mechanisms.
Unrestriced security tests are performed to bypass security mechanisms deployed by the customer in order to do lateral movement through their infrastructure.
By emulating a sophisticated attacker and using typical as well as unconventional methods the analysts of Nullsecurity Labs try to infiltrate the infrastructure of the customer as far as possible. Thereby, the focus is on bypassing the security protections deployed by the customer.
The goal of Red Teaming is to verify the security measures deployed by the customer as well as the identification of missing protection methods. In addition, Blue Team reactions to advanced persistent threats are also tested and trained.
Analyses of source code for security vulnerabilities.
In a white box approach, the analysts of Nullsecurity Labs analyze source code written in the programming languages C, C++, C#, Golang, Java, Perl and PHP. During the source code analysis, vulnerabilities in the source code and logical bugs that result in unexpected behaviour are identified. In addition a dynamic analysis of the compiled source code is performed. A static analysis only inspects the source code of a program while a dynamic analysis inspects the application at runtime.
By performing a Source Code Audit, vulnerabilities and logical bugs are directly identified within the source code. Afterwards, they can be fixed or mitigated which results in an overall increase of the applications security.
Verification of the hardening measures deployed by the customer including advice for additional adjustments.
During a Hardening Review, the analysts of Nullsecurity Labs verify the hardening measures deployed by the customer at client and server systems with a Windows or Linux operating system. Also, consultation is offered for additional hardening actions.
Hardening measures improve the security of systems by significantly increasing the complexity of attacks. These result partly in a mitigation of several attack methods. For example, attacks with ransomware and exploitation of common vulnerabilities are more difficult during according protections.