Nepsis will perform remote open-source intelligence, on-site reconnaissance, threat profiling, exploitation, and post-exploitation. Nepsis consultants will perform one or more of the following actions to facilitate access: badge cloning, badge replication, on-site social engineering, surreptitious entry, tailgating, or dumpster diving. This assessment is performed using an opportunistic approach.
Nepsis will perform remote open-source intelligence, on-site reconnaissance, threat profiling, exploitation, and post-exploitation. Nepsis consultants will perform one or more of the following actions to facilitate access: badge cloning, badge replication, on-site social engineering, surreptitious entry, tailgating, or dumpster diving. This assessment is performed using an opportunistic approach.