Our Core Services.

Realistic Social Engineering Campaigns

Our social engineering assessments are what make The AntiSocial Engineer Limited so unique. Imagine the worst attacks possible – the ones that keep IT managers awake at night. Then replay these in a safe and secure environment with our experienced consultant.


Traditional & Web Application Testing

We also conduct a more traditional style of security testing –
focussing on web application, wireless and external network tests. Many social engineering attacks, such as DNS poisining or watering hole attacks are built on technical vulnerabilities – we aim to spot them.

Educational Social Engineering Campaigns

We can work with your organisation over a period of time, delivering educational social engineering campaigns. We teach employees common social engineering attacks and help them form a strong layer of defence.


Consultancy

Do you need our help with something? Consultancy services can vary from private discreet advice, working with a board of directors to public talks on social engineering.

Blacklisting

With access to our blacklisting services and API, your organisation will be able

to spot an impersonation before they strike. If you’d like to get started with blacklisting

striaght away see our blacklisting information…  


Realistic Social Engineering Campaigns.

Image

All Aboard!

When a new customer contracts work from The AntiSocial Engineer Limited, we work to ensure they are getting the exact assessment their organisation requires, so the first step of our on-boarding process is to meet face to face and discuss the planned assessment and scope of works.
When we have a clear understanding of your requirements and the necessary legal documents are covered we will then arrange for the safe transfer of files between our organisations, always prioritising your data handling requirements.

With every new customer we work on a ‘scoping’ document that will ensure we work using only agreed methods.

Key Points

  • Full Scoping Process
  • Bespoke planning and delivery
  • Experienced Consultants

Design The Attack

Monitoring incoming staff emails from a compromised inbox.
Text messages, designed to steal passwords.
A polite and well mannered phone call.
A charming guest at your workplace.

A social engineering attack can take many forms, we work to bring simulations of the risks relevant for your organisation.

Key Points

  • Realistic Simulated Attacks
  • A Multitude of Attack Vectors
  • You Are Always In Control


Placeholder
Image

Customise Every Step

We have a wide range of fully adaptive phishing emails and SMShing messages, all of which can be customised for your organisations requirements.

We have genuine knowledge of what emails are currently targeting UK businesses and can replicate the current phishing risks you are likely to encounter.

See more about phishing here…

Key Points

  • Include Bespoke Emails
  • Receive Metrics
  • Realistic Design

Comprehensive Reporting

We provide an in depth comprehensive report authored by our principal consultant and social engineering expert. Our reports stand out from the crowd and offer in-depth strategies on remediation, insights discovered during the assessment and technical reporting. Raw data can be provided in both .xlsx and JSON format to facilitate further analysis.
It is vital that the reporting post campaign is able to portray every piece of information discovered in a clear concise manner. All reporting is dispatched using secure encrypted transfer mechanisms.

Key Points

  • Remediation Plans
  • Evidence Slides, Photos, Screenshots
  • Raw Data Supplied


Placeholder

Social Engineering Assessments.

All Aboard!

When a new customer contracts work from The AntiSocial Engineer Limited, we work to ensure they are getting the exact kind of assessment their organisation requires, so the first step of our on-boarding process is to meet face to face and discuss the planned assessment and scope of works.
When we have a clear understanding of your requirements and the necessary legal documents are covered we will then arrange for the safe transfer of files between our organisations, always prioritising your data handling requirements.

Placeholder

Design The Attack.

Monitoring incoming staff emails from a compromised inbox.
Text messages, designed to steal passwords.
A polite and well mannered phone call.
A charming guest at your workplace.

A social engineering attack can take many forms, we work to bring simulations of the risks relevant for your organisation.

Placeholder

Customise Every Step.

We have a wide range of fully adaptive phishing emails and SMShing messages, all of which can be customised for your organisations requirements.

We have genuine knowledge of what emails are currently targeting UK businesses and can replicate the current phishing risks you are likely to encounter.

See more about phishing here…

Placeholder

Comprehensive Reporting.

We provide an in depth comprehensive report authored by our principal consultant and social engineering expert. Our reports stand out from the crowd and offer brake downs on remediation, insights discovered during the assessment and technical reporting. Raw data can be provided in both .xlsx and JSON format to facilitate further analysis.
It is vital that the reporting post campaign is able to portray every piece of information discovered in a clear concise manner. All reporting is dispatched using secure encrypted transfer mechanisms.

Placeholder

Here’s All The Services.

Redteam


ONsite social engineering

vishing


Phishing

Company Reconnaissance


SMSHING

Web Application Testing


Vulnerability Scanning

Training


Consultancy

Here’s All The Services.







 

Blog


Go!
  • Easy To Follow Posts
  • Awareness Building
  • Educational

Training


Go!
  • Want To Learn
  • Awareness Campaigns
  • Our App (Coming Soon)

About Us


Go!
  • Our Aims & Objectives
  • Our Team
  • Our Clients

Be Social.

Contact Us 24/7


Follow Us On Twitter

Be Social.

Contact Us


Follow Us On Twitter


Connect On LinkedIn


Like Us On Facebook