Skip to content

Put your cybersecurity to the test with TeamARES

How prepared is your organization to detect, prevent, and respond to cybersecurity attacks? As one of the most sophisticated Red Teams in the world, TeamARESTM can go deeper into your ecosystem to find out.

Red Team Experts. Real-World Tactics.

Our comprehensive approach is the result of decades of collective red-teaming experience, dozens of published zero-days, and hundreds of successful customer engagements. TeamARES uses hands-on, manual methods, in addition to automated methods, that are tailored to your organization to shine a light on all potential risks and vulnerabilities before they can be exploited. That means acting from a cybercriminal’s point of view and not an assumption. No penetration test is too large or small. TeamARES conducts external, internal, application, segmented, black box, grey box, white box, and targeted penetration tests to name a few. Our tests are scoped and conducted to align with your strategic business objectives and are not just an automated standard test that you can receive from anyone. Once completed, you will find that our timely and contextual documentation will align our key findings from the test to help support those same objectives. Customers of every size across all industries trust TeamARES to get the job done.

The TeamARES Difference

Renowned Expertise

TeamARES represents decades of experience in digital forensics, penetration testing, incident response, vulnerability management and malware reversing.

Extension of Your Team

Internal teams can get tunnel vision, overlooking vulnerabilities that are unique to your organization. TeamARES challenges assumptions to strengthen your capabilities with expert Red Team testing, incident response and more.

Adversarial Thinking

TeamARES has a proven track record of discovering zero-days and developing exploits. We consistently challenge ourselves to uncover new methods of attack and unearth every possible risk.

Insightful Intelligence

We keep track of recent attacks and vulnerabilities to help you stay ahead of threats. In addition, our superior customer service means we’re always within reach to answer any questions or walk you through remediation steps.

Zero-Day Reporting

TeamARES is always on the alert for emerging malware and cyber threats. Here’s an example of what our team has discovered.
CVE Number
Title
Summary
CVE-2020-13856 –
CVE-2020-15836
MoFi Router Vulnerability Disclosure
Multiple critical vulnerabilities have been discovered in the MoFi4500 router, an OpenWRT based wireless router that provides Internet access via LTE.
CVE-2020-3980
VMWare Fusion Local Privilege Escalation
VMware Fusion contains a local privilege escalation vulnerability that allows an attacker to inject a malicious path into the system-wide PATH environment variable.
CVE-2020-2032
Global Protect Local Privilege Escalation
A race condition vulnerability in the Palo Alto Networks GlobalProtect app on Windows allowed a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade.
CVE-2020-11543
Hard-Coded Credentials in OpsRamp Gateway
During a recent penetration test, CyberOne‘s TeamARES researchers discovered that OpsRamp Gateway has an administrative account named vadmin that allows root SSH accessto the server. This account was unknown to clients unless requested through a support process. At that time the vendor states they would provide the account to the client and request that they change the password.
CVE-2020-11586 –
CVE-2020-11599
CIPAce Enterprise Platform
CyberOne‘s TeamARES researchers have released a steady cadence of advice regarding the importance of testing your systems regularly for vulnerabilities. The following vulnerabilities uncovered during an external penetration test drives home this necessity.
CVE-2020-11542
Authentication Bypass in Infinias elDC32 Webserver
With access to a system’s control interface, a malicious actor can unlock controls remotely, allowing them to gain physical entry to restricted areas. However, lessons learned from other breaches can help everyone better understand how to prevent unwanted access.
CVE-2020-9323 –
CVE-2020-9325
Tiff Server 4.0 from AquaForest
The product Tiff Server 4.0 from AquaForest is vulnerable to the following:
  • Unauthenticated File and Directory Enumeration
  • Unauthenticated Arbitrary File Download
  • Unauthenticated SMB Hash Capture via UNC
  • CVE-2019-12876
    ManageEngine Privilege Escalation Windows
    After running into ManageEngine products on a number of penetration tests, we decided to take a closer look at their products and see if there were any vulnerabilities that we could take advantage of.

    Be prepared for anything with TeamARES