Security Assessment

Cybersecurity

Penetration Testing

Dark Wolf follows a disciplined approach to plan, execute, and report on penetration tests that use the same tactics and techniques as script kiddies, organized criminal organizations, and nation-state actors. Our goal is not just to breach an information system, but rather to report to executive and technical audiences on the strengths and weaknesses of their security posture to facilitate security hardening. Our reports provide detailed recommendations with screen shots to recreate and close vulnerabilities. We have extensive experience delivering penetration testing services to the Department of Defense, Homeland Security, and commercial sector.

Red / Blue Team

Our engineers employ a comprehensive and ethical approach based on the MITRE ATT&CK Framework to emulate Nation-State Advanced Persistent Threat (APT) groups. We apply the same sophisticated tactics, techniques, and procedures (TTPs) using our own innovative approaches, open source intelligence, and proprietary tools. We provide detailed reporting and status updates so that our customers can quickly close exposures to real world threats, harden perimeter security, and improve organizational security awareness. We provide Red Team services to several Air Force programs.

Social Engineering

Dark Wolf can assess and improve security awareness through coordinated campaigns that mimic nation state efforts to harvest sensitive information and obtain unauthorized access under false pretenses. We employ email based phishing, text based smishing, and voice based vishing to test employee reactions to suspicious communications. We inform our approach with open source intelligence to craft communications designed to personally engage users. Our engineers manage campaigns with industry leading tools that collect and report metrics to inform security education investments.

Covert Entry

Our world-class covert entry professionals can identify, measure, and address the risk of physical intrusion impacting your organization. Using social engineering, specialized tools, and our experience, we can bypass physical security controls including locked doors monitored by security cameras, turnstiles, and manned guard desks. To compliment a penetration test or red team engagement, we can leave behind rogue wireless access points, keyloggers, and USB sticks with fake malware.

Malware & Network Intrusion Analysis

Dark Wolf is a leading provider of malware and advanced Incident Response (IR) services to commercial customers and Federal Government agencies. inspecting networks and storage devices for signs of infiltration. We can reverse engineer and detonate malware to determine its impact, targets, and sources. Our work leads to improved intrusion detection and incident response procedures that further harden an organization against cybersecurity threats.