During this phase, an operational environment is discussed and established with the help of written/verbal communication & scoping questionnaires, defining:
Open Source Intelligence (OSINT) techniques are used in combination with neutral observation actions in order to collect as much information as possible regarding the targets to be tested. The more the information, the most attack vectors can be crafted. The intelligence gathered can be of the following types:
Based on the information gained from the previous steps, the phishing payload are crafted, targeting specific employees, combining real facts regarding each target, in order to be as realistic as possible. The payload, apart from the social content, includes a type of attack, such as client-side exploits, clickjacking, cookie stealing or other stealing attack.
The core phase of the phishing exercise starts here, with carefully crafted emails, spoofed web pages, documents, videos, and other physical or intelligent digital articats that simulate a credential, session or other type of information stealing action.
When the phishing campaign completes, a risk-based report is generated including an executive and technical report, success ratio and mitigation recommendations.
SpearIT can additionally offer training services for your personnel, in order to establish or maximize the already established security awareness withing the team. The training can either target specific employees/departments or be offered in a more systematic way to your internal compliance officer/security department in order to integrate awareness to your organization's security policy.
We cover both web applications and infrastructure, whether external or internal, using a hybrid methodology that combines automated tools with manual techniques. During scoping, we define which assets are tested, which are excluded, and allowed attack types.
We tailor the attack vectors based on your risk profile, technology stack, compliance obligations, and threat landscape. We use reconnaissance, enumeration, and exploitation while respecting agreed boundaries.
Yes — our infrastructure & webApp pentest services can extend to cloud services, APIs, and hybrid environments. We treat web and infrastructure assessments as part of one unified workflow.
We deliver multi-layered reports including (a) executive summary, (b) intelligence-level insights, and (c) detailed technical findings with traceability and mitigation guidance.
Yes — our mitigation verification phase retests vulnerabilities after patching or configuration changes, ensuring that fixes are effective and have not introduced new risks.
We coordinate schedules carefully, specifying time zones, blackout periods, and communication protocols. Testing is done in a controlled manner to avoid disruption, and in some cases we separate non-destructive tests from those with higher potential impact.
We define impact thresholds and testing windows in the RoE (e.g., non-business hours for destructive tests), separate low-impact from high-impact tests, and agree specific rollback and test abort criteria. A real-time communications channel and a named escalation contact are mandatory.
The Rules of Engagement document that is mutually agreed between SpearIT and the interested party, defines a simple, reliable stop mechanism (e.g., hotline + authenticated request) and immediate remediation support. The provider must be able to halt testing immediately on instruction and document the action.
Yes — a scoped NDA is standard and essential. It protects sensitive system details, test methodologies, and any personal or business data encountered during the engagement.