Keep Your Business Safe & Secure with Blue Bastion™
Blue Bastion’s Offensive Security Services team includes highly technical and experienced consultants whose goal is to make their own job more difficult. We do so by actively helping our clients and their security teams become better at identifying threat actor tactics, techniques, and procedures (TTPs). Both the offensive and defensive teams at Blue Bastion consistently work together to help each other’s skillset.
With access to our Security Operations Center’s toolset, including but not limited to Carbon Black and CrowdStrike, the Offensive Security team members test their skills and toolset against tools and techniques deployed by advanced blue teams.
The following is a high-level overview of Blue Bastion's penetration testing process and accepted methodology:
Application Penetration Testing
External Penetration Testing
Assumed Breach Internal Penetration Testing
Wireless Penetration Testing
Hardware Security Testing
Cloud Security Assessments
Physical Security Assessments
Blue Bastion’s red team utilizes a combination of commonly used passwords, custom dictionaries based on the client’s environment, and brute force attacks to report on password hygiene.
Graphic examples of what this may look like include:
Red Team Adversary Emulation
Open-Source Intelligence (OSINT)
Do you want to find out what kind of information about your organization exists on the internet or dark web? We’ll do a deep dive into your organization’s external footprint and report back with what we find.
Blended Threat (Purple Teaming)
Whether onsite, over the phone, or via email, Blue Bastion’s social engineers will use real-world scenarios tailored to your organization to assess the security awareness of your employees. Quit using easily identifiable templated phishing emails to train your team and start identifying weaknesses that are truly impactful to you.