top of page
Stole Laptop Assessment
Test the part of your network with the weakest physical security
During out Stolen Laptop Assessment methodology we consider scenarios in which laptops have been lost or stolen and an attacker gains physical access to the device. We use a combination of hardware attacks to try and bypass laptop security and assess what access we gain obtain from the laptop, bypassing login passwords and hard drive encryption.
Despite the use of hard drive encryption, in most cases we are able to gain full access to the laptop, extract Active Directory passwords, and in some cases access to the internal network using poorly configured remote access VPNs.
After demonstrating any weaknesses, we will provide guidance on how your laptops can be secured.
bottom of page