| Adversary Simulation

Conducting simulated attacks based on real, modern techniques. Our Adversary Simulation Services involve immersive scenarios that will challenge the most advanced security controls.

Are your defenses strong enough to withstand an attack?

Tevora’s Adversary Simulation Capabilities

Phone Pretexting Campaign

Email Phishing Campaign

SMS Social Engineering

Comprehensive Social Engineering

Targeted Social Engineering Exercises

Tailgate Exercises

Physical Security Controls Review

Comprehensive Physical Penetration Testing

Purpose

Test and validate client’s security awareness and vulnerability to phone pretexting attacks.

Process

Uses customized attack scenarios in which Tevora conducts pretexted phone calls to attempt to collect sensitive data such as passwords, internal tools, and arbitrary command execution. Common scenarios include calls impersonating information technology staff, internal developers, or third parties requesting sensitive information or access to endpoints.

Purpose

Test and validate client’s security awareness and vulnerability to email phishing attacks.

Process

Uses reconnaissance efforts and client’s goals to craft customized attack scenarios in which Tevora sends phishing emails to a broad range of client’s staff. The main objective is to induce staff to reveal credentialed data or click on links that real attackers could have used to deliver malicious payloads.

Purpose

Test and validate client’s security awareness and vulnerability to SMS social engineering attacks.

Process

Our adversary simulation team uses customized attack scenarios in which Tevora sends targeted SMS messages to induce client’s technical and non-technical staff members to reveal credentialed data and other sensitive information. 

Purpose

Test and validate client’s security awareness and vulnerability to comprehensive social engineering attacks.

Process

Uses reconnaissance efforts to create advanced social engineering attack scenarios that take an adversarial perspective to adapt to each client’s environment. Scenarios may include phone pretexting or email social engineering, depending on the client’s requirements. The main objective for our adversary simulation services team is to induce staff to reveal credentialed data or allow command execution or payload delivery.

Purpose

Test and validate client’s security awareness and vulnerability to on-site social engineering attacks.

Process

Uses customized attack scenarios in which Tevora leverages on-site social engineering techniques to gain unauthorized access to client facilities or obtain access to sensitive client information. Scenarios typically target technical and non-technical staff and are uniquely crafted based on goals of each client.

Purpose

Test and validate client’s security awareness and vulnerability to tailgate social engineering attacks.

Process

Uses customized attack scenarios in which Tevora leverages on-site tailgate social engineering techniques to gain unauthorized access to client facilities. Engagement typically takes place over several time periods and egress points to test possible adversary entry points into secure areas.

Purpose

Analyze client’s physical security controls to identify deficiencies.

Process

Conducts a working session with client team, individual interviews with key staff, and physical controls walkthrough to identify deficiencies in physical security controls. Tevora conducts client meetings and analysis remotely. Review is performed from an adversarial perspective to identify real-world vulnerabilities to latest techniques used by sophisticated attackers.

Purpose

Test and validate client’s security awareness and vulnerability to attacks that circumvent physical controls or use on-site social engineering techniques to gain physical access to restricted areas, gain network access, or compromise sensitive data.

Process

Our adversary simulation services team conducts reconnaissance using a black box approach to profile client’s environment. Based on reconnaissance findings, uses a variety of physical infiltration methodologies to gain covert access to client’s restricted areas, networks, and sensitive data.

Driven By The Wins

We’ve racked up more than our share of praise. Here are some of the awards and credentials we’ve earned for our performance, growth, and innovation.

Our Guiding Principles

Insightful Advice

We care about our clients and each other. We want every relationship to be long-term, so we look to make personal connections and real friendships with everyone we work with.

Expert Resource

We draw from our team’s deep knowledge to devise strategies, design processes, and come up with smart solutions to address each client’s unique risks and daily threats.

Confident Delivery

We are a steady presence in a high-risk industry. We take our responsibilities seriously and follow through with excellence, every step of the way.

Get Started with Tevora Today

Experience a partner that is trustworthy, reliable, and produces the quality you demand.