Take Control

The tactics, techniques and procedures that adversaries use evolve at a rapid pace. To stay ahead of malicious actors, it is essential to work with a team that knows how they operate and can recommend relevant solutions.

Our Services

We understand that every organisation, environment and security needs are unique.
The services provided by SilentGrid are always tailor-made for our customers' specific needs. Our engagements provide a customised combination of multiple elements from our service portfolio to ensure optimal coverage for your security concern at hand.

Assumed Breach

Assess your defensive readiness for the scenario where a sophisticated threat actor managed to establish an initial foothold on your network

Red Teaming

Evaluate your organisation's security controls, procedures and overall security maturity by simulating a sophisticated end-to-end real-world attack

Penetration Testing

Manually assess your infrastructure and software to identify vulnerabilities that could be leveraged to compromise the security of your digital property

Perimeter Assessment

Map your publicly exposed resources and uncover attack surfaces you might not be aware of

Adversary Emulation

Use tools, techniques and procedures of attackers to assess your detection and response capabilities

Password Analysis

Assess your current employees' security awareness by running a password analysis against your Active Directory environment

image
image
image
image
image
image
image
image
image
image image

Client Portal

All our clients get access to a dedicated portal*, which allows them to:


  • Track engagements and identified issues in real-time
  • Access project details
  • Focus and monitor remediation efforts
  • Get a concise view of current and historical projects
  • Access various statistics


*opt-out available

image
image
image
image
image

Certifications and Recognitions

SilentGrid is a CREST ANZ approved company. Our expertise is supported by the internationally most recognised certifications in the offensive security industry.

image
image
image
image
image
image
image
image
image

From our Blog

Local File Read to RCE

During a recent engagement against a web application, a known vulnerability, CVE-2020-35340 was exploited to gain remote code execution on the server hosting the application


Read Post

Simulated Attack Infrastructure - Building Modules (Part 2)

Attack Infrastructure Automation Part 2 - Terraform module design, software setup and configuration, and operator experience


Read Post

Remote compromise: XXE injection on thin client’s web services

During one of our perimeter assessment exercises, we identified and exploited a vulnerability in an in-house developed thin client


Read Post
image
image
image
image
image
image
image
image
image
image
image

Keep up to date

Sign up now to our mailing list and receive the latest from our blog.