PWN Z1

Audit Your 3P.

Identifying and helping to address hidden weaknesses in your organization’s security

What is PWN Z1?

The original Pwn Plug was the first commercialized penetration testing drop box. It looks superficially like a power brick, intended to fool the casual observer. The Pwn Plug R2 upped the ante with a bit more processing and networking power, and it looked like a Wi-Fi access point. At one point, there was even a variant called the Power Pwn disguised as a (working) power strip. 

BUSINESS VALUE

Challenges your organization’s assumptions and identifies faulty logic or flawed analysis.

Assesses the strength of the evidence base or the quality of your information Identifies alternative options or outcomes and/or explores the consequences of an action or attack plan.

Tests your system, network, applications and more through the eyes of an adversary.

Understands the options for an adversary to break into and move throughout your system.

OBJECTIVES

Client goals that can be attained by sast can be divided into four categories:

Understanding the strengths and weaknesses of physical security controls in critical infrastructures

Known way to adversaries can obtain confidential information about targeted asset

Internal & External Attack Vector

Smartening the cyber security testing process and integrating analytics

Key Features of Hadess PWN Z1

What you can expect from a Penetration Testing conducted by Hadess

THE TOUCH Key features of Hadess PWN Z1 service Understanding the risk, the damage of a well-succeded attack, which information could be impacted and exfiltrated, and so on Interested in learning more? THE TOUCH Key features of Hadess PWN Z1 service Exposing weak physical barriers, such as gaps in fences, not monitored doors, and taking advantage of internet connection plug in the building. Interested in learning more?

We don’t have an antivirus solution that’s waiting on signatures to be developed and pushed out. What we’ve got is that we’re part of a larger collection of organizations that are running Hadess, so any data that we see gets fed back into the system and someone else will benefit from that knowledge.

SCOTT STOOPS
SECURITY ANALYST,
ASHLAND UNIVERSITY

Actionable outcomes of your business securities

Hadess’s certified ethical hackers provide regular feedback throughout an engagement to ensure that your key stakeholders stay informed. Here’s what you can expect to receive post-assessment

Exposing weak physical barriers

Exposing weak physical barriers, such as gaps in fences, not monitored doors, and taking advantage of internet connection plug in the building.

Understanding the risk, the damage of a well-succeded attack

Understanding the risk, the damage of a well-succeded attack, which information could be impacted and exfiltrated, and so on.

Exposing weak physical barriers

Exposing weak physical barriers, such as gaps in fences, not monitored doors, and taking advantage of internet connection plug in the building.

Understanding the risk, the damage of a well-succeded attack

Understanding the risk, the damage of a well-succeded attack, which information could be impacted and exfiltrated, and so on.

APPROACH AND METHODOLOGY

Hadess’s experts adopt a systematic approach to comprehensively test your organization’s threat detection and response capabilities.

THE TOUCH Our PWN Z1 Methodology Sleek, portable, quiet, compact, rugged, shippable form factor Interested in learning more? THE TOUCH Our PWN Z1 Methodology Intel-based hardware delivers professional-grade performance & reliability Interested in learning more? THE TOUCH Our PWN Z1 Methodology Onboard high-gain 802.11a/b/g/n/ac wireless supporting packet injection & monitor mode Interested in learning more? THE TOUCH Our PWN Z1 Methodology Onboard Bluetooth supporting device scanning & monitor mode Interested in learning more?

Compare Hadess

Our ethical hackers and penetration testing service experts possess the skills and experience to identify the latest threats.

RELATED RESOURCES

Do you want quick & free cyber-security analysis of your application?

Secure your entire workforce, including remote employees.

TRY IT FREE

FOR 15 DAYS