Ridge Security Automated Penetration Testing Solution Delivers Advanced Post-Exploitation Techniques

Ridge Security helps you stay on the front lines of cyber defense with advanced tools in latest release of RidgeBot

SANTA CLARA, Calif.--()--Ridge Security, cutting-edge automated pen-testing solution provider, announces new capabilities in RidgeBot 3.4, for post-exploitation validation. This new release further differentiates RidgeBot from vulnerability scanners and 1-step auto-exploitation tools that are currently available and strengthens RidgeBot’s position as a true risk-based vulnerability management platform.

Post-exploitation operations are advanced hacking techniques, often utilized by an APT (Advanced Persistent Threat) attacks, including the notorious DarkSide hacker group that recently targeted the Colonial Pipeline. Post-exploitation refers to the phase of operation after a victim’s system has been compromised by the attacker. After gaining an initial foothold in the network, the attacker collects information about the environment and the organization, exfiltrates the data and pivots from the compromised target to further penetrate deeper into the internal networks.

In this release, RidgeBot performs post-exploitation tactics by using privilege escalation and implanting a Botlet on the compromised system. This Botlet will act as a pivot to further penetrate the servers in the same class C IP network segment or across network segments if the victim machine has dual-network cards.

RidgeBot’s post-exploitation capability delivers massive benefits to the organization, allowing them to:

  • Discover and validate business risks deep down in their internal networks and reveal any lateral movement paths.
  • More effectively combat ever growing APT and ransomware attacks.
  • Control the depth and scope of the post-exploitation configuration to meet the needs of their environment.

RidgeBot couples ethical hacking techniques with AI-driven, decision-making algorithms to help identify and validate weak credentials and frequently exploited vulnerabilities, to minimize damage from simple or sophisticated, extortion-encryption attacks such as ransomware attacks. To see the demo, please visit: https://youtu.be/DzYvgEPqKCY

About Ridge Security Technology

Ridge Security offers risk-based vulnerability management by providing an automated penetration testing system. Ridge Security is located in the heart of Silicon Valley and is expanding into other areas including Latin America, Asia and Europe.

Contacts

Lydia Zhang
President, Co-Founder of Ridge Security
marketing@ridgesecurity.ai
(408)8001025

Release Summary

RidgeBot’s post-exploitation capability allows users to validate security risks in their internal networks and more effectively combat ransomware.

Social Media Profiles

Contacts

Lydia Zhang
President, Co-Founder of Ridge Security
marketing@ridgesecurity.ai
(408)8001025