ADVERSARY SIMULATION

Are You Prepared For An Advanced Persistent Threat?

We conduct simulated attacks based off real, modern techniques. Immersive scenarios that will challenge the most advanced security controls.

Adversary Simulation Services

The Tevora Difference

Advanced persistent threats continue to adapt their techniques to bypass detection and compensating controls, leaving your physical and network environment vulnerable to compromise. In this evolving threat environment, you need a partner that can help you manage your risk.

Expertise

Our elite adversary simulation team utilizes best in class social engineering techniques with an adversarial perspective during each engagement.

Client Relationships

We are a relationship-driven company striving to make a lasting impact on clients. We build deep, enduring partnerships with your team, which helps us better understand your unique needs.

Proven Track Record

The world’s leading companies call on us to help them thwart cyberattacks. We take lessons we’ve learned from those complex organizations and challenges to apply in our engagements.

Are your defenses strong enough to withstand an attack?

Tevora’s Adversary Simulation Capabilities

Phone Pretexting Campaign

Email Phishing Campaign

SMS Social Engineering

Comprehensive Social Engineering

Targeted Social Engineering Exercises

Tailgate Exercises

Physical Security Controls Review

Comprehensive Physical Penetration Testing

Purpose

Test and validate client’s security awareness and vulnerability to phone pretexting attacks.

Process

Uses customized attack scenarios in which Tevora conducts pretexted phone calls to attempt to collect sensitive data such as passwords, internal tools, and arbitrary command execution. Common scenarios include calls impersonating information technology staff, internal developers, or third parties requesting sensitive information or access to endpoints.

Purpose

Test and validate client’s security awareness and vulnerability to email phishing attacks.

Process

Uses reconnaissance efforts and client’s goals to craft customized attack scenarios in which Tevora sends phishing emails to a broad range of client’s staff. The main objective is to induce staff to reveal credentialed data or click on links that real attackers could have used to deliver malicious payloads.

Purpose

Test and validate client’s security awareness and vulnerability to SMS social engineering attacks.

Process

Uses customized attack scenarios in which Tevora sends targeted SMS messages to induce client’s technical and non-technical staff members to reveal credentialed data and other sensitive information. 

Purpose

Test and validate client’s security awareness and vulnerability to comprehensive social engineering attacks.

Process

Uses reconnaissance efforts to create advanced social engineering attack scenarios that take an adversarial perspective to adapt to each client’s environment. Scenarios may include phone pretexting or email social engineering, depending on the client’s requirements. The main objective is to induce staff to reveal credentialed data or allow command execution or payload delivery.

Purpose

Test and validate client’s security awareness and vulnerability to on-site social engineering attacks.

Process

Uses customized attack scenarios in which Tevora leverages on-site social engineering techniques to gain unauthorized access to client facilities or obtain access to sensitive client information. Scenarios typically target technical and non-technical staff and are uniquely crafted based on goals of each client.

Purpose

Test and validate client’s security awareness and vulnerability to tailgate social engineering attacks.

Process

Uses customized attack scenarios in which Tevora leverages on-site tailgate social engineering techniques to gain unauthorized access to client facilities. Engagement typically takes place over several time periods and egress points to test possible adversary entry points into secure areas.

Purpose

Analyze client’s physical security controls to identify deficiencies.

Process

Conducts a working session with client team, individual interviews with key staff, and physical controls walkthrough to identify deficiencies in physical security controls. Tevora conducts client meetings and analysis remotely. Review is performed from an adversarial perspective to identify real-world vulnerabilities to latest techniques used by sophisticated attackers.

Purpose

Test and validate client’s security awareness and vulnerability to attacks that circumvent physical controls or use on-site social engineering techniques to gain physical access to restricted areas, gain network access, or compromise sensitive data.

Process

Conducts reconnaissance using a black box approach to profile client’s environment. Based on reconnaissance findings, uses a variety of physical infiltration methodologies to gain covert access to client’s restricted areas, networks, and sensitive data.

Driven By The Wins

We’ve racked up more than our share of praise. Here are some of the awards and credentials we’ve earned for our performance, growth, and innovation.

1
2
3
4
5
6
PA-QSA-logo (1)
8
9
10
ISO-logo
12
A2LAAccredited-logo (2)
hitrust-logo
PCI-3DS_logo
7
AICPA SOC-logo
pci-dss-logo (1)
StateRAMP-logo
OC Best Places-logo
OCBJ-Fastest-Growing-Private-Companies
ISO27001-logo
TPN-logo
fedRAMP-logo (5)
DVSB-logo (1)
Foregenix-Logo
ISO27017_logo

Our Guiding Principles

Insightful Advice

We care about our clients and each other. We want every relationship to be long-term, so we look to make personal connections and real friendships with everyone we work with.

Expert Resource

We draw from our team’s deep knowledge to devise strategies, design processes, and come up with smart solutions to address each client’s unique risks and daily threats.

Confident Delivery

We are a steady presence in a high-risk industry. We take our responsibilities seriously and follow through with excellence, every step of the way.

Get Started with Tevora Today

Experience a partner that is trustworthy, reliable, and produces the quality you demand.