Security Assessments

Is Your

Find out now with Loki Labs security assessments. Assessments are personalized for the needs of your organization, and can be adjusted to fit your requirements for scope, depth, and urgency.

The sections below will help you understand your options and the services we can provide. We want you to be confident in your decisions and are more than happy to take the time with you to ensure we accomplish these things together.

How it Works

The first step to better security is to understand which assets present the greatest risk – from your endpoints and online accounts, to your physical facilities and your employees themselves. Every organization has different security concerns and vulnerabilities. At Loki Labs, we work with you to identify and prioritize these areas, which typically fall into four core asset types:


What We Do

Based on each client’s area of need, we apply proven tactics and processes to systematically evaluate and test all targeted assets. Service offerings include:

Vulnerability Assessment
Penetration Test
Red Team Assessment


The “Black Box” Test

This is an optional Open Source Intelligence (OSINT) Information Gathering stage where our team discovers your organization’s digital footprint by gathering as much data as we can using publicly available resources. We start like an attacker would, knowing nothing of your network, other than your organization’s name. It’s a true “black box” scenario.

We utilize open-source information to discover your organization’s footprint and outside boundaries, then progress to using discovered attack vectors to obtain access into your network. This can take a bit of time to do thoroughly but can yield a wealth of information that could be used by an attacker for targeting your operations and personnel.

Vulnerability Assessment

Scanning and Enumeration

Using automated tools and manual processes, we scan for exposed ports and services, known vulnerabilities, misconfigurations, and deviations from industry standards and best practices. We look for the vectors that could give an attacker the opportunity to access your networks, data, or users.

We can run a vulnerability assessment for a project as small as one web application or as large as your entire network. Just give us an estimate of how many and what kind of devices we’ll be evaluating, and if there is anything that is off-limits during the test.


  • External Network Scanning
  • Internal Network Scanning
  • Vulnerability Research & Analysis


  • Website Mapping & Web Application Enumeration


  • Wireless Environment Sampling & Analysis

Penetration Test

Gaining Access, Privilege Escalation, Expanding Access

In this phase, we gain access by leveraging previously discovered vulnerabilities, just like an attacker would. Depending on the services you choose, we can attempt to gain access from the internet, from inside your network (like an insider threat), using social engineering against your personnel, or physically entering your facilities. We can also audit your security policies and review code exposed during this phase.


  • External Network Exploitation & Expansion
  • Internal Network Exploitation & Expansion


  • Wireless Session Hijacking & Password Cracking
  • Physical Security Test


  • Website & Web Application Exploitation


  • Phishing Test

Red Team Assessment

Threat Emulation

Our experienced red team can emulate a specific threat, such as a nation state actor or cyber criminal organization, utilizing representative tools and techniques to survey and breach a network.

This process enables us to accurately assess the security of your network. We can then evaluate the capabilities and response of the cyber security personnel (blue team). After our assessment, we provide a detailed report containing findings along with actionable suggestions to help your teams correct security issues.


  • Threat Emulation

Remediation and Ongoing Support

Working Together to Improve Your Resilience

What good is a security assessment if you’re left without a resolution? If you opt for remediation verification, we will work with you and your team to verify that vulnerabilities are fixed and no longer usable by an aggressor. We will retest the issues we found in our original evaluation once you have had a chance to fix things up. We’ll also provide you with an updated report of our findings and suggestions.

Our work goes beyond merely identifying vulnerabilities – we provide clear, actionable remediation recommendations so you can resolve any issues to protect your organization. We can present these recommendations in a report, or in person. We can provide training to help you maximize the impact of what we’ve learned about your cyber security posture and help you to better prepare for the future.

Ongoing Support

If you are interested in ongoing 24/7 monitoring of your networks, we also offer Managed Security Services. This allows those same world-class cyber operators that conducted your Cyber Security Assessment to watch for threats as they emerge, and react before your organization becomes a cyber crime statistic.

Black Box, White Box, Red Team, Pen Test

No, this isn’t a Dr. Seuss book

Black Box vs. White Box

Our security evaluations can begin with different levels of knowledge about your organization, network, and systems.  In a “black box” scenario, we don’t know much more than the name of your company and the conditions of the testing we are to perform.  We follow established hacker methodologies to gather as much information as we can from all available resources, just the way an attacker likely would.  This reconnaissance phase can be a bit time-consuming, but can offer a very good idea of what information is openly available about your organization, its resources, and personnel.  It is often eye-opening to realize what information is open to the public, or what employees give away on forums and social media.  These pieces of information could be leveraged to gain further access, when pieced together by a determined attacker.  We will then verify the data we collect about your organization and networks with you, before continuing with our security assessment.

In a “white box” scenario, you provide details about your network to facilitate our evaluation, in lieu of the initial reconnaissance phase, or in situations were our “black box” evaluation did not provide enough information for us to continue to conclusion.  This can save time, or could be used to set up a specific test condition or scenario, but may require you to do a bit of work to gather that information.  We may also provide you with software to install on a machine inside your network, or provide you with an appliance for the duration of the assessment, so that we can evaluate your internal networks.

Red Team, Pen Test, or Vulnerability Assessment

Loki Labs can provide a full range of cyber security services for clients of various sizes to suit needs of vastly different scales. It’s important to set the scope, based on your needs, at the outset when requesting services. For government clients, or larger companies with dedicated cyber security teams, we offer Red Team services. In those engagements, we can emulate a specific threat, such as a nation state actor or cyber criminal organization, utilizing representative tools and techniques to survey and breach a network. The purpose of this is twofold. Firstly, it is to evaluate the security of the network. Secondly, it is to evaluate the capabilities and response of the cyber security personnel (blue team). We are capable and experienced at providing this service, however, it may be more than is really necessary for clients without a dedicated defensive team, or for situations were a more tailored approach is needed.

We can offer similar services with a penetration test but in a shorter time frame and without threat emulation. We follow a methodology similar to what a hacker would use to probe your network for vulnerabilities and attempt to gain access using our standard tool kit. If exploitation is authorized, we will use tools to gain and expand access into the network, just as a hacker would do. Of course, this doesn’t have to be “all or nothing”. There can be set conditions where exploitation is authorized when a tailored approach is desired.

In a vulnerability assessment, we don’t use exploits to attempt to gain access. We probe the network to find potential vulnerabilities and gather as much information as possible, but don’t progress past that stage. While not as thorough as a full penetration test, it has a much lower risk of causing system instability and can still be very helpful in finding and fixing potential access vectors.

At any scale, we provide a detailed report after the evaluation concludes.  This report details all findings and provides suggestions for taking action to correct any security issues.