Comprehensively test the effectiveness of the defense system to create a real sense of security for customers.
Jingan Technology has many years of experience in the field of red-blue confrontation and has accumulated rich experience in social engineering attacks, near-source attacks, and upstream and downstream attacks in addition to conventional boundary breaching methods. Competitive Security Technology's security service solutions focus on results, but also focus on the process, and will provide full analysis of all potential risks in the attack chain and provide recommendations for rectification.
service list | |
---|---|
Red Team Test Attack | Network Penetration & Application Penetration (Remote) -> Vertical Penetration (Remote) -> On-Site Review (On-site ) -> Red Team Summary Report (Remote) -> Vulnerability retest (Remote ) |
Sorting Out the Exposure of Internet Assets | Collect data including organizational structure, IT assets, sensitive information leakage, supplier information, etc., and analyze risks in all aspects (remote) |
Email Risk Detection | Collect email addresses exposed on the Internet, and conduct attack tests on email accounts such as password blasting, password retrieval, and service attacks (Remotely) |
Upstream and Downstream Attacks | Under the authorization of all parties, carry out red team attack testing operations (remote) on upstream and downstream, branches, supply chain enterprises, partners, etc. |
Social Engineering Attack | By sending phishing emails, IM chats, watering hole attacks and other social engineering methods, enterprise employees can open a breach into the system and the intranet (remotely) |
Assessment of Near Origin Attacks | Carry out attack tests such as identification bypass, device remote control attack, fake WIFI phishing, access control cracking, and near-source physical intrusion at the customer site, with the purpose of bypassing identification, sniffing important information, obtaining system permissions, and obtaining employee information. (On site) |
Jingan Technology has made great achievements in the national large-scale offensive and defensive drills for many times, and has unique insights into the construction and effect testing of the actual combat-based protection system, and has helped many leading customers in the industry to establish a defense-in-depth system.
In view of the tight timeframe of the exercise, fully combine various basic security checks and core business/critical node asset lists as well as professional red team attack test summaries to output kill chain summaries and risk convergence recommendations to quickly converge significant risks that can be exploited by attackers in a short period of time.
Do a comprehensive physical examination of security equipment, and test from the two aspects of traffic collection coverage and protection strategy effectiveness, so as to avoid security equipment from having "shape" but not "spirit"; and assist customers to complete security strategy optimization to ensure the detection coverage of security equipment, to rationalize the detection capabilities of submitted Security equipment.
With rich experience in large-scale confrontation projects, combined with the actual situation of customers, formulate the best practice process that fits the customer's situation, break the communication barriers of all parties through collaboration, and complete the efficient handling of security incidents.
List of core business/key node assets that will be focused on by attackers in actual combat is output.
After the offensive and defensive drills are over, Jingan Technology can assist customers to review the defensive gains and losses of Internet exposure reduction, phishing email protection, on-site social engineering protection, 0Day vulnerability protection, VPN protection, big data protection, target protection, etc., and check and dispose of them. Effectiveness and process availability, and put forward security reinforcement suggestions, and output the "Technical Warfare Report" and "Blue Team Summary Report".
Jingan Technology has strong technical strength in attack traceability and countermeasures based on the industry's leading deception defense technology. We can trace the identity of the real person, countermeasure the attacking team members and obtain their personal computer privileges in the attack and defense exercise activities, thus assisting customers to establish an effective traceability and countermeasure system to turn defense into attack and overcome the enemy in the attack and defense exercise activities.
Company Name: Shanghai Jingan Information Technology Co., LTD
Email:info@easmcn.com
Official Accounts
Mini Programs