Cybersecurity Services:

PENTESTING CYBERSECURITY ASSESSMENTS APPLICATION SCAN CLOUD SCAN NETWORK SCAN SECURITY ARCHITECTURE REVIEW PHONE CONSULTING SPEAKING ENGAGEMENTS CONTACT
Cloud Penetration Testing
Cloud penetration testing refers to trying to hack into cloud resources to access data or perform unwanted actions in a customer's cloud environment. Various cloud misconfigurations allow us to do that. In addition to trying to exploit cloud resources, we perform scans to find security gaps and problems that could lead to a breach or security incident.

Application Penetration Testing
Attacking the cloud platform itself is usually limited unless there is a blatant misconfiguration. Most of the time, infiltration of a cloud platform is by way of phishing and stolen developer credentials, or application flaws in cloud-hosted applications. We always address those two items on cloud penetration test via the following methods:
  • We scan and analyze cloud policies to find policies that create unnecessary or egregious risk.
  • We make policy and configuration recommendations that will, in the event of stolen credentials, reduce the harm they can cause.
  • We perform full application testing to see if we can break into an application to steal data or cloud credentials.
Stealth Versus Coverage
Some companies aim for stealth on penetration tests. We aim for coverage. Stealthy attacks are more advanced and test your team to determine if they can identify an attacker in your network. Tactics such as fuzzing and scanning are generally noisy but they can cover a lot of code paths and vulnerabilities very quickly. We aim for the latter. We can recommend firms that can help you test your security operations team if that is your objective.

Penetration Testing Tools
We use a combination of open source, commercial, and custom tools.

Commercial and open source tools include but are not limited to:
  • Burp
  • Zed Attack Proxy
  • Prowler
  • CloudSploit
  • Metasploit
  • SSL scanning tools
  • Browser extensions that help with various aspects of testing
  • Many tools from various github repositories, customized to meet our needs
  • nmap
  • netcat
Our custom tools include things like:
  • Our own machine image in place of Kali Linux with our own set of tools
  • Analyzing all the attack paths on your network
  • Analyzing cloud configurations for risky or lacking policies
  • An API Fuzzer (spoke about it at RSA 2020) to quickly get coverage when testing APIs
  • A web page fuzzer (in progress) used in conjunction with other penetration testing tools
  • Remote attack websites to track the success of attacks stored and executed later
  • Automated report generation to speed up reporting while still allowing us to add custom analysis for findings
  • And we're constantly working on more!
Reverse Engineering
When we initially test a customer's cloud environment we spend a lot of time finding and reporting on basic security flaws and general misconfigurations. Over time as the customer matures we find less and less basic flaws and spend more time on reverse engineering the applications in the environment so we can dive deeper with fuzzers and other tools. Some customers have hired us repeatedly and each year we understand their environment better and can get deeper into the systems and code to find tricky vulnerabilities. Our ability to offer reverse engineering comes from the fact that Teri Radichel taught herself to program probably about 1982 on a TI/994a and has been reversing engineering systems to fix them since 1994. A deep understanding of architecting systems and networks, combined with masters degrees in software engineering and cybersecurity and 13 security certifications helps!

Understanding and Mitigating the Risk
2nd Sight Lab doesn't just leave you hanging with a big list of findings to review. We offer guidance for fixing those findings in our report and can meet with your team after the test virtually to explain any findings that are unclear or fix any findings that have mitigating factors.
Cybersecurity Resources
Penetration Testing Resources

© 2018 2nd Sight Lab, LLC | Savannah, Georgia