Skip to content
scenario-based assessment

Evil Employee

Almost a third of reported offenses in a company can be traced back to actions of employees. Are you protected against threats from the inside?

Scope of the pentest

During this assessment, our ethical hackers simulate and analyse an attack by an an employee (and their device).
The test can be conducted on premises or remotely.

Exemplary test objects:

Network shares

We check which access permissions are set for network shares.

Privilege Escalation

We check, how far a regular employee may escalate their access within the network and their workstation.

Active Directory

We evaluate, how a low privileged domain user may attack your Active Directory environment.

Evil Employee

Our approach

Cyber attacks are constituting an increasing risk, which organizations have to counter wordwide. Many companies are focusing on external attackers, to protect against remotely exploitable vulnerabilities and breaches. External attacks are considered a high risk and are thus prioritized in defense.

However, a 2014/2015 cyber security survey “WIK/ASW Enquete 2014/2015” has identified that almost a third of reported breaches are attributable to actions by employees. The number of undisclosed employee incidents remains unknown. These internal risks are frequently disregarded in risk assessments, even though they can constitute the highest risk potential for an organization.

During our evil employee assessment, we analyze how far an employee with a regular company-notebook and access to the internal IT network can escalate their privileges to exfiltrate data without permission. Would it be possible to retrieve sensitive data without permission? During our test, we focus on areas like patch management, sensitive data on file shares or registry configuration

After we finish the assessment, we show vulnerabilities and possible countermeasures in a presentation to increase the security of your devices against internal threats.

Evil Employee

Almost every organization provides employees, interns and working students with notebooks or desktop computers to perform their business tasks. These systems are usually maintained by the organization and assigned to a domain. Employees are assigned rights, which are necessary for their field of action.

An employee with malicious intents might however attempt to broaden their access in the corporate network. This could lead to a leak of sensitive data, ultimately damaging the company.

Standards and qualifications

We follow recognized international standards for our pentest procedure.

Our penetration testers are highly qualified and certified with several recognized hacking certificates.

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.