User Tools

Site Tools


technical_tests_without_involving_employees

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
technical_tests_without_involving_employees [2018/06/08 15:05] – [Spoofing Test] lucytechnical_tests_without_involving_employees [2020/01/13 14:47] (current) – changed "pssoing" to "spoofing" lucy
Line 7: Line 7:
 You have invested time, effort, and money in defenses. However, employees may still execute a malicious file. How do you know your defenses will work? To reduce the risk from malware coming into your environment, you need safe and effective ways to test your systems. This is where LUCY’s Malware Simulation Toolkit (LHFC) comes in place. LHFC is an advanced malware simulation suite capable of emulating various threat simulations equivalent to many of the tools employed by hackers. More info about this test can be found [[create_a_purely_technical_test_with_the_malware_testing_suite|here]]. You have invested time, effort, and money in defenses. However, employees may still execute a malicious file. How do you know your defenses will work? To reduce the risk from malware coming into your environment, you need safe and effective ways to test your systems. This is where LUCY’s Malware Simulation Toolkit (LHFC) comes in place. LHFC is an advanced malware simulation suite capable of emulating various threat simulations equivalent to many of the tools employed by hackers. More info about this test can be found [[create_a_purely_technical_test_with_the_malware_testing_suite|here]].
  
-{{ lhfc22.png?600 }}+{{ tech_test_1.png?300 }}    
 +{{ tech_test_2.png?300 }}
  
 Main Questions answered by this tool:  Main Questions answered by this tool: 
Line 19: Line 20:
  
  
-===== Mailand Webfilter Test =====+===== Mail and Webfilter Test =====
  
 The Email and Internet malware protection test checks whether the implemented security measures are sufficient to defend against an unstructured or structured malware attack via the e-mail infrastructure or internet infrastructure. With our software you can check which file types could potentially enter the company and which are blocked by the security infrastructure. LUCY works with a wide range of file types that can be brought to the end system via e-mail or on a website for download. You can thus see whether potential malicious code, such as Java files, backdoors, scripts, embedded Office Objects are detected and blocked by the filter infrastructure.  Based on these results, you can then carry out targeted phishing campaigns. More info about this test can be found [[mail_and_webfilter_test|here]]. The Email and Internet malware protection test checks whether the implemented security measures are sufficient to defend against an unstructured or structured malware attack via the e-mail infrastructure or internet infrastructure. With our software you can check which file types could potentially enter the company and which are blocked by the security infrastructure. LUCY works with a wide range of file types that can be brought to the end system via e-mail or on a website for download. You can thus see whether potential malicious code, such as Java files, backdoors, scripts, embedded Office Objects are detected and blocked by the filter infrastructure.  Based on these results, you can then carry out targeted phishing campaigns. More info about this test can be found [[mail_and_webfilter_test|here]].
Line 53: Line 54:
 The spoofing test will verify, if an anonymous user from the internet can send a spoofed email on behalf of another domain. The test can be found under "tools": The spoofing test will verify, if an anonymous user from the internet can send a spoofed email on behalf of another domain. The test can be found under "tools":
  
-{{ spoofing-test.png?600 }}+{{ tech_test_3.png?600 }}
  
 Procedure: Procedure:
Line 59: Line 60:
   - Step 1: Enter the domain you are trying to spoof   - Step 1: Enter the domain you are trying to spoof
   - Step 2: Enter a mail recipient, where the spoofed email should get sent to   - Step 2: Enter a mail recipient, where the spoofed email should get sent to
-  - Step 3: After a short time you will see if the pssoing test worked+  - Step 3: After a short time you will see if the spoofing test worked
  
 {{ spoofing-test3.png?600 }} {{ spoofing-test3.png?600 }}
technical_tests_without_involving_employees.1528463122.txt.gz · Last modified: 2019/07/25 12:51 (external edit)