Adversary Simulation

Companies with established and vetted security programs often ask what's next in the maturity model. Even after years of regular audits, assessments and penetration tests, what comes next? For many, an Adversary Simulation is the obvious progression.

An Adversary Simulation is the evolution of offensive security testing. It builds on penetration testing by simulating a known, sophisticated, and advanced adversary. Time has proven that it is impossible to prevent all attacks, so corporate security staff must be capable of quickly detecting and removing intruders from their networks. An AssureIT Adversary Simulation takes your configurations, controls and capabilities to the next level.

Everyone has a plan until they get punched in the face.

Mike Tyson

We begin with a threat modeling session that will determine what type of Adversary we intend to simulate. Based on the simulated threat actor, SynerComm's consultants model an attack scenario that very closely mirrors the tools, tactics, and procedures of the specific adversary.

Take Your Security Program to the Next Level

  • Direct (typically in person) cooperative simulations with top penetration testers
  • Network defenders safely experience common and sophisticated attacks
  • Validate and improve incident response capabilities
  • Strive to be 1 step ahead of your adversaries

SynerComm is uniquely positioned to provide Adversary Simulations. Our A-Team of consultants bring over 13 years of penetration testing, vulnerability research and exploit development experience to every engagement. This is backed by decades of experience defending Fortune 500 companies.

The Basics:

  1. Initial Compromise
  2. Command and Control
  3. Internal Information Gathering
  4. Persistence
  5. Later Movement
  6. Privilege Escalation
  7. Data Exfiltration

Advanced Examples:

  • Source Code Manipulation
  • Covert Command and Control
  • Golden Ticket

Each phase of the simulation has an offensive and defensive component. This provides an opportunity to validate the effectiveness of your controls as well as an opportunity to tune and improve their capabilities.

By design, an Adversary Simulation is highly tailored to an individual organization. Here are some ideas to get you started:

  • Advanced and covert data exfiltration
  • Internal workstation compromised through phishing attack
  • Webserver or DMZ breach
  • Remote access or VPN breach
  • Malicious insider
  • Web application attack vectors
  • Lost or stolen device - laptop/mobile/desktop
  • Ransomware simulation
Real Time Analytics