Help Us, Help You.
Maximising Value in Offensive Security Assessments: Why More Information Leads to Better Results
When organisations engage offensive security firms like SilentGrid for adversary simulation or penetration testing, a common assumption emerges: the assessment should mirror real-world attack conditions as closely as possible. This often translates to providing minimal information to the testing team, based on the logic that "it's not a real test if you know more than an attacker would know." While this reasoning appears sound at first glance, it fundamentally misunderstands the nature of offensive security assessments and how to extract maximum value from them.
The Time Asymmetry Between Assessments and Real Attacks
The critical distinction between a contracted security assessment and an actual attack lies not in the information available, but in the time constraint. When SilentGrid scopes an engagement, we calculate a specific number of days required to assess your systems to a reasonable degree of confidence. This timeframe is negotiated, budgeted, and finite.
Threat actors operate under no such limitations. Before launching an attack, they may spend days, weeks, months, or even years mapping your attack surface and understanding your infrastructure. Even opportunistic attackers who discover your systems by chance face no hard deadline for their reconnaissance activities. Their only consideration is whether the potential return justifies their time investment.
This temporal asymmetry creates a significant challenge for time-bound assessments. The question becomes: how can we provide equivalent value to what an attacker with unlimited time might accomplish, within the constraints of a contracted engagement?
The Enumeration Challenge
A substantial portion of offensive security work involves enumeration, the systematic process of discovering what exists within a target environment. This includes identifying API endpoints and their parameters, discovering files and directories on servers, mapping IP address ranges, and uncovering DNS entries associated with your domain.
In practice, enumeration consists largely of educated guessing. For every correct guess, there are thousands of incorrect attempts. It is not unusual for enumeration activities to consume days or even weeks of an assessment timeframe. While this work is necessary, it represents a significant expenditure of resources on activities that may yield limited security insights.
By providing comprehensive details about your attack surface, you enable the assessment team to redirect this time toward identifying and exploiting actual vulnerabilities in systems that exist, rather than searching for systems that might exist.
The Question of Defensive Controls
Another frequent point of confusion concerns defensive systems. Organisations sometimes question why we request that security controls be disabled or configured to permit testing traffic. The reasoning parallels the time constraint issue: given sufficient time and resources, defensive systems can be circumvented. Rather than dedicating engagement time to bypassing controls (an exercise whose outcome is largely predictable) we can provide more value by assessing the security of the underlying systems directly.
This approach assumes that defensive bypass has occurred and evaluates what an attacker would encounter next. This provides insight into your security posture beyond the first line of defence.
How Organisations Can Maximise Assessment Value
There are several practical ways organisations can help offensive security teams deliver more comprehensive results:
Identify High-Value Targets: Communicate which assets are most critical to your organisation. If a particular server contains sensitive customer data, that information allows us to appropriately focus our efforts. While we will identify additional high-value targets during our assessment, understanding your priorities ensures alignment with your risk concerns.
Provide Documentation: Architecture diagrams, design documents, and technical specifications significantly accelerate our understanding of your environment. Whether high-level overviews or detailed technical documentation, these materials allow us to quickly contextualise what we discover and identify potentially vulnerable areas more efficiently.
Share Previous Findings: If you have conducted prior security assessments, sharing those results enhances the current engagement rather than diminishing it. Some organisations withhold previous findings to "test" whether we can independently discover the same issues. This approach wastes valuable time. With prior findings, we can verify remediation, identify similar vulnerabilities that may have been overlooked, and build upon previous work rather than duplicating it.
Ensure Rapid Communication: Assign a technical point of contact who can respond quickly to questions during the engagement. Time spent waiting for answers to technical questions is time not spent identifying vulnerabilities. Quick access to knowledgeable personnel substantially improves assessment efficiency.
Provide Appropriate Credentials: Security threats do not originate solely from external actors. Authenticated users, whether employees or customers, can compromise systems either accidentally or maliciously. Credentials can be leaked, stolen, or sold. Therefore, testing authenticated access is essential.
Furthermore, providing multiple accounts at different privilege levels is crucial. Effective security testing requires evaluating both horizontal privilege separation (ensuring one user cannot access another user's data) and vertical privilege escalation (ensuring standard users cannot access administrative functions).
The Most Common Source of Delay
The single most frequent cause of wasted time during offensive security engagements is waiting for access to be provisioned or problems with provided access to be resolved. Before an engagement begins, organisations should verify that:
• All credentials function correctly
• Systems are accessible from the testing perspective (typically the public internet)
• Test environments accurately represent production systems
• Systems contain realistic data sufficient to access all functionality
• Any required VPN or special access mechanisms are operational
Testing these elements before the engagement begins prevents the assessment team from consuming billable hours troubleshooting access issues that could have been identified and resolved in advance.
Reframing the Assessment Paradigm
The goal of an offensive security assessment is not to recreate an attack with perfect fidelity, that would require unlimited time and resources. Rather, the goal is to identify as many vulnerabilities as possible within a defined timeframe, prioritise them appropriately, and provide actionable remediation guidance.
Threat actors have one significant advantage: time. By providing comprehensive information about your environment, you allow the assessment team to neutralise that advantage and focus engagement time where it matters most; identifying the vulnerabilities that pose genuine risk to your organisation.
At SilentGrid, our objective is to deliver maximum value during every engagement. When organisations partner with us by providing comprehensive information, assigning responsive contacts, and ensuring smooth access to systems, they enable us to dedicate our expertise to finding and documenting security vulnerabilities rather than navigating logistical obstacles.
The difference between a good security assessment and an excellent one often lies not only in the skill of the testing team, but also in how effectively the client organisation facilitates the work. By understanding these dynamics and preparing accordingly, you ensure that your investment in offensive security delivers the greatest possible return.
Help us to help you.