Take Control

The tactics, techniques and procedures that adversaries use evolve at a rapid pace. To stay ahead of malicious actors, it is essential to work with a team that knows how they operate and can recommend relevant solutions.

Our Services

We understand that every organisation, environment and security needs are unique.
The services provided by SilentGrid are always tailor-made for our customers' specific needs. Our engagements provide a customised combination of multiple elements from our service portfolio to ensure optimal coverage for your security concern at hand.

Assumed Breach

Assess your defensive readiness for the scenario where a sophisticated threat actor managed to establish an initial foothold on your network

Red Teaming

Evaluate your organisation's security controls, procedures and overall security maturity by simulating a sophisticated end-to-end real-world attack

Penetration Testing

Manually assess your infrastructure and software to identify vulnerabilities that could be leveraged to compromise the security of your digital property

Perimeter Assessment

Map your publicly exposed resources and uncover attack surfaces you might not be aware of

Adversary Emulation

Use tools, techniques and procedures of attackers to assess your detection and response capabilities

Password Analysis

Assess your current employees' security awareness by running a password analysis against your Active Directory environment

image
image
image
image
image
image
image
image
image
image image

Client Portal

All our clients get access to a dedicated portal*, which allows them to:


  • Track engagements and identified issues in real-time
  • Access project details
  • Focus and monitor remediation efforts
  • Get a concise view of current and historical projects
  • Access various statistics


*opt-out available

image
image
image
image
image

Certifications and Recognitions

SilentGrid is a CREST ANZ approved company. Our expertise is supported by the internationally most recognised certifications in the offensive security industry.

image
image
image
image
image
image
image
image
image

From our Blog

Navigating a SQL injection attack

SilentGrid delves into the impact of a SQL injection that affected a healthcare application, which claimed to adequately protect the privacy of its users


Read Post

Hands-On Modbus Security

In the realm of industrial control, Industrial Control Systems (ICS) play a crucial role in overseeing complex processes, with the widely used Modbus protocol serving as a key player in communication. This blog will delve into the security concerns surrounding ICS, placing a particular focus on the Modbus protocol, which will be discussed through a simple lab using OpenPLC. The exploration concludes with recommendations to defend against common attacks. Modbus Brief Overview If you're unfamilia


Read Post

Local File Read to RCE

During a recent engagement against a web application, a known vulnerability, CVE-2020-35340 was exploited to gain remote code execution on the server hosting the application


Read Post
image
image
image
image
image
image
image
image
image
image
image

Keep up to date

Sign up now to our mailing list and receive the latest from our blog.