Run Malware Tests & Simulations on your Companies Infrastructure
Through a phishing simulation, you find out that some of your employees activate macros in Word documents. But what harm could a real attacker do with such a macro? Are there any other file types that an attacker could deliver to your employees? These and other questions will be answered in the technical tests. The e-mail and internet malware filter test gives you an insight on how your mail server and web proxy handle different variations of potentially dangerous file types. You can thus see whether potential malicious code, such as java files, backdoors, scripts, embedded office objects, etc. are detected and blocked by the infrastructure. Based on these results, you can then carry out targeted phishing campaigns or close discovered gaps.
To reduce the risk from malware in your environment, you also need safe and effective ways to test your systems. This is where LUCY’s Malware Simulation Toolkit (LHFC) comes into play. LHFC is an advanced malware simulation suite capable of emulating various threat simulations equivalent to many of the tools employed by hackers. The local windows test (LHFC) will let you know if your defences work in case an employee executes a malicious file.
The Malware Simulation Toolkit is an advanced malware simulation suite capable of emulating various threats. It allows an auditor to access an advanced set of features equivalent to many of the tools employed by cyber criminals. The tool, therefore, allows the LUCY administrator to perform security checks without involving employees outside the IT department.
This functionality provides the answer to one of the most important questions in securing Internet and mail traffic: Which file types can be downloaded from the Web, and which e-mail attachments are filtered out or not?
This feature allows local testing of the client browser and detection of possible vulnerabilities based on custom JavaScript libraries and the browser’s user agent data. The discovered plugins can be automatically compared with the vulnerability databases (CVE) to identify vulnerable devices.
Test your own infrastructure for mail spoofing vulnerabilities.
Interpreting highly technical tests requires a profound expertise in IT security and the know-how of the involved products. It is often possible to improve security by optimizing certain settings (e.g., within the GPO’s, on the web proxy, etc.). Our security consultants will be happy to support you in the planning and execution of technical tests. With over 20 years of experience in penetration testing and consulting, we guarantee a profound analysis.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.