Got any questions?

We do our best to respond as quickly as possible

Security Build Review Service

Security
Hardening Services

A consultant lead manual operating system security hardening assessment. Using industry standard benchmarks and OEM best practices.Learn more  →

Definition

What is a Security Build Review?

A Security Build Review or a Host Hardening Assessment is a security audit against an operating system or a software configuration, helping ensure it meets industry standard good security practices. With the increase of virtualisation technologies (Docker / VMWare ESXi etc), organisations are replicating operating systems for servers, desktops and mobile devices across their whole network. From a risk prospective, taking time to ensure these images are secure helps prevent security issues being replicated site wide and helps reduce the risk of insecurely configured environments can allow unauthorised access and or data breach. Aptive can review operating systems and software configurations against publicly available benchmarks such as, CIS, SCAP and CESG and OEM / vendor best practices.

Proactively identify the latest vulnerabilties

Our penetration testing services help identify the latest vulnerabilties.

  • VMware logo

    VMware VRealize Network Insight

    Remote Code Execution CVE-2023-20887

  • Testimonial Image

    MOVEit Transfer

    Remote Code Execution CVE-2023-34362

  • Testimonial Image

    Fortra GoAnywhere MFT

    Authentication Bypass CVE-2024-0204

  • Testimonial Image

    WordPress Elementor Lite 5.7.1

    Arbitrary Password Reset CVE-2023-32243

  • Testimonial Image

    Redis Sandbox Escape

    Remote Code Execution CVE-2022-0543

  • Testimonial Image

    GitLab 16.0.0

    Path Traversal CVE-2023-2825

  • Testimonial Image

    CouchDB Erlang Distribution

    Remote Command Execution CVE-2022-24706

  • Testimonial Image

    WatchGuard Fireware AD Helper Component

    Credentials Disclosure Critical

Why Perform Security Hardening

Why Performing Regular Security Hardening is Important for Your Organisation

  • Of all UK businesses reported a cyber breach or attack in the last 12 months
  • Of UK charities reported a cyber breach or attack in the last 12 months
  • Of large UK businesses reported a cyber breach or attack in the last 12 months

Security Build Review Service

Security Host Hardening Assessments

Identify Web App Threats

Web Application Penetration Testing

Aptive provide web application security testing using our internal methodology based on the OWASP testing methodology. The service identifies security issues within web apps and provides clear remediation instructions, allowing your organisation to easily fix identified security issues. For more information, see our web app security audit service page.

Web Application Penetration Testing    →
Identify Web App Threats

Identify Mobile App Threats

Mobile App Security Testing

Aptive’s mobile application security testing is a deep dive security assessment against iOS and Android apps, to help identify potential security issues, logic flaws or vulnerabilities.

Mobile App Security Testing    →
Identify Mobile App Threats

Identify Internal & External Infrastructure Threats

Network Penetration Testing

Aptive are a penetration testing company providing internal or external web & network penetration testing services, which identifies and quantifies security issues in an easy to understand report.

Network Penetration Testing    →
Identify Internal & External Infrastructure Threats

PCI DSS Penetration Testing Service

Meet your PCI DSS certification requirements with our manual penetration testing service.

OUR CUSTOMERS

Client Testimonials

Reviews from our clients

Learn More

Learn More About Penetration Testing

  1. LLMNR / NBT-NS Spoofing Attack Explained

    LLMNR / NBT-NS Spoofing Attack Explained

    LLMNR / NBT-NS spoofing attack: how to use LLMNR & NetBIOS poisoning to capture credentials from the network using Kali + Responder.py and how to fix LLMNR & NBT-NS (NetBIOS) spoofing / poisoning attacks.

  2. Local File Inclusion (LFI)

    Local File Inclusion (LFI)

    Local File Inclusion (LFI) explained with examples, and learn how to perform security testing for LFI vulnerabilities. The intent of this document is to assist with web app security assessments engagements by consolidating research for LFI testing techniques. LFI vulnerabilities are typically discovered during application assessments or penetration testing using the techniques contained within this document.

  3. Does SameSite Provide Sufficient CSRF Defence?

    Does SameSite Provide Sufficient CSRF Defence?

    An overview on what the SameSite cookie attribute is, and if it provides sufficient protection against CSRF on it's own without other mitigations.

  4. SSL & TLS HTTPS Testing Guide

    SSL & TLS HTTPS Testing Guide

    The definitive guide for SSL / TLS security testing by Aptive. This article documents the process of using semi automated tools to perform SSL & TLS security assessments and how to validate the tool findings using manual testing methods. The aim is to optimise the TLS & SSL security testing process when performing pen testing to optimise the time spent on TLS security testing.

  5. Unrestricted File Upload Testing & Bypass Techniques

    Unrestricted File Upload Testing & Bypass Techniques

    What is Unrestricted File Upload Testing and how to test for Unrestricted File Upload Vulnerabilities including filter bypass techniques for Windows, Linux, Apache and IIS.

  6. What is Cross-site Scripting (XSS)? XSS Explained

    What is Cross-site Scripting (XSS)? XSS Explained

    An overview of what SQL Injection is, understand the attack, and the potential risk to your organisation.