Intelligence-led Penetration Testing

Intelligence-led pentesting uses threat intelligence to collect, analyze and gather business and technical overview about particular organizations that will use to perform an intelligence-led penetration test.

Condition Zebra’s Intelligence-led Penetration Testing Process

Passive Reconnaissance

Gather any information about the target by using techniques such as war driving, information gathering, and etc. Services information, contacts, and infrastructure plans are enumerated for further use. Human resources (personnel) are also targeted.

Active Reconnaissance

Actively probe infrastructure, services and key personnel of the target to obtain sensitive and sometimes critical information to aid the infiltration attempts in later stages. Techniques used include email phishing, voice phishing, port scanning, physical Infiltration, dumpster diving.

Threat Hunting

Discover vulnerabilities and establish attack vectors by enumerating weaknesses and loopholes (in systems and practices) and penetration testing on the enumerated targets gathered in previous stages. The successful discovery of multiple weak points allows for more elaborate infiltrations.

Attack Vector Analysis

Analyze available options (vectors) and deduce the best course of actions for successful infiltration, leveraging every piece of information gathered thus far.

Attack Simulations

Simulate real-life attacks by putting the infiltration plans into action. Successful infiltration will result in a takeover. The effectiveness of the target’s security measures and personnel will be assessed in this stage.


Successful takeover results in compromise of all sensitive assets. Data are dumped from critical assets to demonstrate the extent of the potential damages.


The final report includes organized information regarding the entire activity, sections such as the following are included:

  • High-level summary
  • Technical Details
  • Proposed remediation


EDR are typically deployed on endpoints and uses various techniques such as machine learning, behavioral analysis and threat intelligence to detect suspicious activities.

Access to intelligence data

Get access to intelligence collected about your organization which shows information about potential threat actors along with their tactics and techniques.

Gain insights

Gain insights into your organization’s resilience capabilities against real-world threat scenarios.

Improve Incident response capabilities

Get to measure your organization and whether it has appropriate countermeasures and responses to detect and avert cyberattacks.

Contact Us

+603-7665 2021

Level 3-10, Block F, Phileo Damansara 1, 46350 Petaling Jaya, Selangor, MALAYSIA.

Monday-Friday: 9am – 6pm

Schedule a FREE CONSULTATION to learn more about Condition Zebra Endpoint Detection & Response – Schedule Appointment or Whatsapp