Why do you need this?
Our Compromise Assessment service offers comprehensive analysis and evaluation of your LAN networking environment. It identifies potential breaches, unauthorised access, or compromised systems, leveraging the powerful capabilities of Velociraptor and log Collectors.
We provide thorough inspection and analysis of network activity, logs, and endpoint data to detect indicators of compromise (IOCs) and unauthorised activities, helping you enhance your organisation’s security posture and mitigate risks.
Scope & objectives
The overall aim of the project is to identify any hosts that may have been compromised and report any findings.
Specific objectives are:
- Install and configure a threat hunting platform, including the provision of remote agents to be deployed by the client onto the target systems. We will be on hand to provide support for the agent deployments.
- Run initial compromise assessment scans.
- Review scan results and provide feedback.
- Provide a high-level report on the results and recommend further actions.
What can you expect?
Velociraptor Endpoint Monitoring
Deployment of Velociraptor agents across your LAN / OT network to collect forensic data for analysis.
Real-time detection of suspicious behaviour, malware infections, and unauthorised access attempts on endpoints, providing early warning of potential security incidents.
Log collection and analysis:
Collection and aggregation of logs from network devices, OT / IOT, servers, applications, and other sources within your LAN / OT environment.
Analysis of log data to identify anomalous activities, security events, and potential indicators of compromise, enabling proactive threat detection and incident response.
Threat hunting and investigation:
Proactive threat hunting and investigation by our security analysts to search for signs of malicious activity, persistence mechanisms, and unauthorised access across your LAN / OT network.
In-depth analysis of suspicious artefacts, network traffic patterns, and system logs to uncover hidden threats and security vulnerabilities.
Incident response and remediation:
Rapid incident response and remediation actions to contain and mitigate identified security threats, minimising the impact on your organisation’s operations and data.
Collaboration with your IT security team to develop and execute response plans, implement security controls, and restore affected systems to a secure state.
What are the benefits?
Early threat detection
A Compromise Assessment enables early detection of security breaches and unauthorised activities, allowing prompt response to mitigate potential risks.
Comprehensive analysis
Thorough inspection and analysis of endpoint data, network activity, and logs provide a holistic view of your LAN/OT environment, facilitating comprehensive compromise assessment.
Proactive security measures
Proactive threat hunting and investigation help uncover hidden threats and vulnerabilities, enabling proactive security measures to strengthen your organisation’s defences.
Our off-network/in- person Compromise Assessment service, powered by Velociraptor and Log Collectors, offers proactive threat detection, comprehensive analysis, and rapid incident response capabilities to safeguard your LAN / OT networking environment against cyber threats. By identifying potential compromises and security risks early, we help you enhance your security posture, minimise the impact of security incidents, and protect your organisation’s critical assets.
Compromise Assessment

Free Pen Test Partners Socks!!!
Pen Test Partners socks are THE hot security accessory this season, if you're a security professional get yours now!