ATTACKIFY





  • Home
  • Security Controls

Validate endpoint security controls and perform a number of compliance checks to ensure systems are securely configured.

Security Controls

ATTACKIFY has a number of endpoint security control modules designed to audit endpoints according to a number of compliance requirements, password policies & endpoint exploitability according to Service Pack, Hot fixes and patches installed on endpoints audited against Microsoft Security Bulletin Data.

Some of the modules included are:

  • LLMNR/NBT-NS Attack Mitigation Audit
  • DLL Search Order Hijacking Check
  • Password Policy Audit
  • Windows Compliance Audit - High Priority
  • Unquoted Service Path Chaekcs
  • User Account Control
  • Current Vulnerability Exposure
  • CIS Benchmarks
  • Software CVE Inventory Scanning

Related Modules

Exploits

Simulate numerous exploit techniques as used by attackers & malware to inject into processes, elevate privileges or impersonate users. Modules are designed to emulate core functionality without potwntially damaging systems.

more info

Execution

Attackers are always finding new methods to bypass execution prevention controls allowing them to execute code or commands without alerting or generating logs.

more info

Execution

Attackers are always finding new methods to bypass execution prevention controls allowing them to execute code or commands without alerting or generating logs.

more info