Many users have laptops that they take to and from their place of work. Sensitive data is stored to disk, and security controls are often poorly deployed As part of Penetration Testers stolen laptop tests, we take a standard users laptop and try to compromise it. This includes breaking in to the OS and bypassing disk encryption. It includes cold boot/RAM tests and Bios based attacks. Once compromised, Penetration Testers looks to use the device to gain access to the corporate network, through VPN attacks or through social engineering compromises. We utilise the information accessible through the laptop to attempt to infiltrate the physical and logical access controls within your wider business fabric. Through this, we attempt to gain access to business information including accounts and credentials, financials and customer and employee records.
