Attackers are increasingly targeting corporate networks to gain a foothold within internal environments. Let NuHarbor engineers discover network vulnerabilities before others do.
Cybersecurity services trusted by 500+ organizations and growing!
NuHarbor helped us identify the correct assets to monitor, then tuned our systems for maximum results. Now we only receive notification for true positive alerts so my team can spend more time focusing on their objectives.
IT ManagerState University
We’ve utilized NuHarbor for a few years now to conduct quarterly vulnerability assessments. Our usual policy is to change vendors every few years, but we’ve had such exceptional service from NuHarbor that we see no need to shop around. The reports we receive are comprehensive and prioritize remediation advice.
NuHarbor conducted a web application penetration test on a few of our edge applications. They discovered many configuration weaknesses including insecure direct object reference (IDOR). They notified us immediately and offered advice on how to fix it. Their skilled engineers provided step-by-step assistance and retested to ensure that this critical vulnerability was fixed.
Wifi. Yeah, that’s an unfamiliar animal to deal with. We hired NuHarbor to test the wireless networks we provide for our employees and customers to access store services. NuHarbor came onsite and set up their “toolkit” with antennas sticking out all around. They were able to set up a rogue access point, mimicking our access points, and users unknowingly logged on. NuHarbor initiated an evil twin attack to capture and inject packages into the network stream between user computers and other systems and then delivered findings so we could educate and curve our user behavior.
NuHarbor performed an external penetration test on our networks and alerted us to critical vulnerabilities. They let us know what the affected response might be from the host before they tried to exploit it. We were updated twice a day which was super helpful to me and my staff. They also provided great remedial guidance that helped us quickly correct vulnerabilities.
IT DirectorHospitality Company
Our company outsources our web development. We asked NuHarbor to review the source code and check for insecure API calls. We were astonished at the findings they uncovered. It was an uneasy feeling knowing that the web developer we hired left so many security flaws in our code. I can’t say enough how comforting it was to have the NuHarbor team give us, and our partner, clear recommendations to fix our source code.
NuHarbor waged a phishing campaign against our employees by mirroring a realistic payroll website that we use in our company. The NuHarbor engineers captured several IT administrators’ credentials. With domain administrator access, they were able to compromise our whole domain within 20 minutes of starting the phishing campaign. We had the opportunity to show our leadership how pertinent it is to implement better user account practices, MFA, and improved user security awareness training and build the funds into our annual IT security budget.
NuHarbor performed an internal penetration test of our organization utilizing one of our legacy network protocols. They were able to gain administrative access and push malicious code to our network. Had this been a real attack, we could have lost everything.
IT ManagerFinancial Service Company
NuHarbor assessments provide visibility into our third-party risk exposure. We don’t have the internal resources to conduct yearly assessments of our 40+ vendors. These valuable insights inform the decisions we make when choosing and managing partnerships.
NuHarbor has been instrumental to our SOC operations. Without their flexibility, expertise, and quick reaction, our small SOC team could not operate. NuHarbor continually engages with us at the operational and executive level. They’re always looking for new, creative solutions. Not only are they willing to think outside the box, they actually deliver.
CISOPrivate R1 University
Increase network visibility with our suite of wireless services.
As the shift from wired to wireless infrastructure continues, so do the methods used for detecting attack paths and backdoors. We scan your network for entry points and prevent attackers from gaining access.
Information gathering phase: Engineers find and map wireless networks with 802.11 sniffing techniques. Identify SSIDs (including cloaked), encryption protocols, and authentication methods.
Offensive tests: We evaluate your organization’s detection and response capabilities against commonly exploited attack vectors.
Wireless tests: Evaluate the security of your access point deployment. Our engineers check configurations, credentials, and encryptions. Verify AP isolation and investigate the remote management of the devices. Validate the configurations of your captive portals, VLAN segmentation, and hardware.
Wireless testing checklist
Our testing engineers look for a variety of exploits during wireless penetration testing. Here are some of the ways we find them:
Specific Wireless IPS Tests
Evaluate the detection and response capabilities of the Wireless IDS/IPS.
Captive Portal Testing
Bypass the Captive Portal’s authentication for the guest wireless network.
VLAN Isolation Verification
Connect or reach the internal corporate network via the guest wireless network.
Signal Radiation Testing
Analyze the wireless solution’s signal coverage using standard endpoint and directional antennas.
Evaluation of AP deployment
Evaluate access point configuration (and other wireless networking devices) against vulnerabilities such as weak passwords in remote management of the device.
Specific Vulnerabilities of Wireless Devices
Exploit known vulnerabilities in the wireless network’s equipment.
Verify correct protocol deployment. This protocol is immune to both cracking and brute force attacks due to Public Key Certificates at the Access Point sides, but only if deployed properly.
Verify if AP isolation or client isolation is enabled on the access points.
Offensive testing checklist
We simulate real-world attacks. Here are a few of the attack methods we use to test your defenses:
Determine if the WIPS sensor reports and/or terminates an authorized client that connects to a non-company network.
Spoofing (Client Impersonation)
Spoof an authorized client’s MAC address to verify if the IDS/IPS sensor detects the masquerading attempt.
Deploy an AP to mimic the real access point. Verify if clients connect and if the IDS/IPS sensors detect it. This test depends, both from a feasibility and time perspective, on the availability of authorized clients connecting to the wireless infrastructure.
Deploy an open AP (AP implementing no security features) within the reach of the IDS/IPS sensors to evaluate if they’re found.
Deploy a rogue AP within the reach of the IDS/IPS sensors to evaluate if they’re found and reported.
We make it easy to improve and manage your security.
We believe great cybersecurity exists at the intersection of exceptional service delivery and purposeful deployment of security solutions.
Our security experts are trained to support and communicate in ways you can understand. Cybersecurity solutions are created to answer your questions on your terms.
Easy to Choose
We have an established reputation as security and technology leaders. With a clear definition of cybersecurity outcomes for your business, you can make the best decisions to secure your organization.
Easy to Trust
We deliver clear and consistent communication. Paired with our trusted operations and reporting, your stakeholders can have peace of mind in their cybersecurity decisions.
Our solutions make it easy to progress in your cybersecurity journey.
No matter where you are in your cybersecurity journey, we can help. Whether you're just beginning, looking to improve, or not sure where to go next, our trusted experts are committed to your success and can help you every step of the way.