Our penetration testing service aims to impersonate a real attack scenario and will aim to move in the same directions as a malicious attacker would. This will be tailored to work with customer requirements and will incorporate many different toolsets and methods and dependant on the engagement.
Innogen will use multiple scanning techniques to asses all exposed ports and services and provide you or your company with a detailed report detailing any vulnerabilities and the risk factors of each vulnerability found. This report is reviewed in detail and accurately assessed by innogen prior to formal submission to the customer.
On average there are currently 3.04 million records compromised every day spanning all industries and organisations, this breaks down to 35 stolen records every second of the day with an average cost of £105 per record.
The year on year cost impact to businesses experiencing data breaches is increasing as the attacks become more targeted, a recent studies into the average costs of a breach have the following costs for large businesses:
SME have been stated to lose approximately £310,000 according to a government study and an experian study shows that SME’s underestimate the cost of a data breach by as much as 40%.
Government figures indicate that a data breach costs SMEs an average of £310,000; yet the SMEs surveyed estimated the cost to be £179,990 – a shortfall of over £130,000.
Contact innogen-security to find out how we can help your business, home or estate strengthen its sites and services.
Exploiting Sudo 1.8.27 The following brief is a quick demonstration of the issue faced by cve-2019-14287. This issue is presented when the user is allowed to run a specified command as any user other than the root user account, specified …
SMB LFI Exploitation The following outlines a very short overview of LFI using SMB in form of a crib sheet. Install Samba: apt-get install samba Remove default Samba config: rm -f /etc/samba/smb.conf Create New smb.conf: vi /etc/samba/smb.conf The following config …
Linux reverse shell without python. During a recent application exploit into an interactive shell the typical path to spawn a reverse shell and upgrade it to tty was sought. It was found that the go to technologies such as python, …