Automated audits for all attack surfaces

360° AUDITS

SPEED AND EFFICIENCY

REPORTS AND ACTION PLANS

OPTIMISED BUDGETS

360° APPROACH

SPEED AND RECURRENCE

BUILD AN ACTION PLAN

YOUR OPTIMISED BUDGET

AUTOMATED AUDIT SOLUTIONS

EXTERNAL ATTACK SURFACE AUDIT

Comprehensive scan of the exposed web surface with over 80 specialised tools.

Prerequisites: Testing without agent installation, probes, or event log collection to reduce impact

Pre-Scan :

  • Discovering subdomains

Passive scan

This scan enables an initial audit to be carried out, with the following deliverables:

  • Determining the attack surface (Shadow IT) to validate the scope of the audit
  • Searching for data leaks: searching for leaked source codes and passwords
  • OSINT: open source intelligence

In-depth web audit

  • Software mapping
  • Vulnerability testing: configuration errors
  • Automated launch of over 80 tools.
  • In-depth analysis of the domain and sub-domains on the Internet (company and employee data).
  • OWASP Top 10: testing the 10 main security risks related to web applications:
    • Faulty access controls
    • Vulnerable and obsolete components
    • Non-secure design
    • Lack of data and software integrity
    • Poor identification and authentication
    • Data injection tests
  • Attacks using ‘intelligent’ passwords (brute force)*

Analysis and classification of vulnerabilities by severity and type.

Recommended solution for each vulnerability

Deliverables in French or English including Mapping, Detailed Report and Action Plan in Word and Excel formats.

AUDIT ACTIVE DIRECTORY & INFRASTRUCTURE PKI (ADCS)

Detection of exploitable technical vulnerabilities and poor administrative practices, providing a clear view of the level of risk.

Prerequisite: execution of a tool on a machine connected to the internal network (standard account).

Identification of poorly protected privileged accounts: Kerberoasting, risky delegations, admin accounts outside Protected Users. Recherche de failles et de mauvaises configurations. Détection automatisée des chemins d’attaque potentiels

Verification of critical configuration settings: NTLMv1, anonymous LDAP, SMBv1, Spooler/PetitPotam.

Password management audit: Rotation, RC4, passwords exposed in SYSVOL and network shares.

Mapping attack paths: via ACLs, trusts, and vulnerable PKI templates (ESC1–ESC11).

Assessment of operational resilience: Backups, recycle bin, monitoring, obsolete machines.

Windows workstation audit: password storage in the browser, presence of a password manager, etc.

Audit Azure Entra-ID & Microsoft 365

Our module offers a turnkey audit of the cloud environment.

Prerequisite: an Azure tenant administrator account

Identification of poorly protected privileged accounts: Kerberoasting, risky delegations, admin accounts outside of Protected Users.

Access security: MFA, privileged accounts, legacy authentication, break-glass.

Privileges & identities: Admin roles, PIM, apps without owners, main services at risk.

Security posture: Secure Score, EDR/AV, Intune, logs & retention.

Analytics & detection: Risky sign-ins, suspicious activity, unusual connections.

Compliance & resilience: GDPR, retention policies, backup & incident response.

CONTINUOUS MONITORING SERVICE

Use of the software map created by Scan.

Ongoing monitoring:

  • BlacklistIP;
  • Account leaks;
  • Scan github, etc.

Automatic dispatch of alerts by the platform (after validation):

  • Data leak;
  • Vulnerabilities on your sub-domains;
  • Attempted attacks on your users (phishing).

THE ADVANTAGES OF CYBERESIST

Thorough audits, tailored to the scope and size of the company, and extremely easy to use.

Thorough audits, tailored to the scope and size of the company, and extremely easy to use.Thorough audits, tailored to the scope and size of the company, and extremely easy to use.
Integrated AI services for personalised, dynamic and scalable audits.
Detailed AUDIT report with a clear management summary to prioritise the ACTION PLAN.
Measurement of discrepancies between AUDITS and ALERT MANAGEMENT FOR NEW VULNERABILITIES for continuous monitoring.

Our recent projects

The latest projects and successes in cybersecurity

Asset Management Company

Forensic analysis and global security audit

Following an email spoofing incident, our team of experts carried out forensic investigations and vulnerability assessments to protect the systems exposed.

ESN

Regular safety audits

Our web security experts implemented strict input validation mechanisms and carried out regular security audits, which effectively mitigated the risk of SQL injection.

DIGITAL AGENCY

In-depth vulnerability assessment

We carried out an in-depth vulnerability assessment of client organisations, identifying and correcting potential vulnerabilities before they could be exploited by attackers.

READY TO USE CYBERESIST®?

DEMANDE DE CONTACT

DEMANDE DE DEMO

INSCRIPTION À LA NEWSLETTER

DEMO REQUEST

CONTACT REQUEST

SUBSCRIBE TO OUR NEWSLETTER