Newsletter

by adidionxlm adidionxlm No Comments

Excellium services newsletter – may 2018 : Penetration test – Wi-Fi

Wi-Fi intrusion tests always begin with a limited target knowledge and without credentials to simulate an opportunistic attacker. They are simulating real attacks on the wireless network. The classical approach using key research and spoofing is currently limited by the technology itself, it is often asked in a second time to use a corporate workstation having a wireless access in order to enhance the attack scenario quality with a better knowledge of the target infrastructure.

Read more

by adidionxlm adidionxlm No Comments

Excellium services newsletter February 2018 : Internal threats

More and more companies are equipped with perimetric protections that provide the main line of defense against attackers.

The defense mechanisms are both related to the deployment of hardware (firewalls, web application firewall, IPS probes …), the implementation of good architecture practices, such as network segregation (dedicated VLANs, use of DMZ, air-gap…), but also intelligent monitoring via the use of SIEM and SOC.

Read more

Top