
The shift from manual-based, labor-intensive testing to machine-assisted automation alleviates the current severe shortage of security professionals. It allows human security experts to let go of daily labor-intensive work and devote more energy to the research of new threats and new technologies.
RidgeBot® has a powerful “brain” that contains artificial intelligence and an expert knowledge base that guides RidgeBot®. in attack path finding/selection. It launches iterative attacks based on learnings along the path, achieving more comprehensive test coverage and deeper inspection.
RidgeBot,® a robotic security validation system, fully automates the testing process by coupling advanced ethical hacking techniques and adversary cyber emulation. RidgeBots locate, exploit and document business risks and vulnerabilities discovered, IT security controls failures during the testing process, highlighting the potential impact or damage.
Today’s organizations are facing cyber security challenges from multiple angles. Security teams not only need to validate IT infrastructure has no exploitable vulnerabilities which may be leveraged by a hacker or a ransomware to compromise the mission critical data, but also need to verify the expansive cyber defense solutions deployed can work as expected to detect and mitigate the most current attack techniques used by advanced persistent threats(APTs) and other malicious entities.
Cyberattacks are increasingly sophisticated and forever on the rise, hackers are developing new exploits and
attack methods every month, often using tools to launch attacks automatically. In response to cyber security threats, most organizations utilize security testing(a.k.a. penetration testing) for their computer systems, websites, applications and networks, try to find risk exposures before a hacker does. While security teams’ internal pen testing expertise are limited and expensive, can’t afford to do continuous security validation. Many organizations are looking for an automated penetration testing system to address this challenge in a more manageable and cost-effective manner.

This test utilizes various network attack techniques used by hackers. Based on threat intelligence, exploit knowledge base, it profiles assets, mines vulnerabilities and launches attacks toward target assets. Attack targets: Any assets in Intranet, extranet or private network etc.
This test is packaged with several dozens of commonly used techniques seen in Ransomware attacks. It helps customers quickly validate if their environments are vulnerable to Ransomware attacks or not. And with a remediation plan suggested by the test, the customers can prevent themselves from the Ransomware attacks.
This test launches cyber attacks against target websites, web applications and all related attack surfaces to gain control of the target website. The attack targets include self-developed or CMS based websites.
This test launches attacks from inside of corporate network to validate security system’s response toward an internal threat. It uses advanced techniques such as privilege escalation, lateral movement, domain penetration and others. The target of attack includes: all network accessible internal hosts.
It launches direct or iterative attacks based on sensitive information collected via weak credential or unauthorized access vulnerabilities. Attack targets include: redis, elasticsearch, ActiveMQ, database, web login and other applications.
It launches privilege escalation and iterative attacks based on known 1-day or n-day vulnerabilities detected on. Penetration target the 3rd party framework. Attack targets include: Struts2, spring, fastjson, ThinkPHP and other frameworks.It launches privilege escalation and iterative attacks based on known 1-day or n-day vulnerabilities detected on Penetration target the 3rd party framework. Attack targets include: Struts2, spring, fastjson, ThinkPHP and other frameworks.
This test profiles assets and digs out all attack surfaces based on domain names/sub-domain names, peripherals, encryption key, API, framework, open ports etc.