Email Threat Simulator

Email threat simulator

keepnet-email-threat-simulatorBy learning new generation phishing attacks, email threat simulaor can test the new generation APT products (Fireeye, Deep Security etc.) and the anomaly detection systems (SIEM) along with traditional protection mechanisms (Antispam, Antivirus, Content Filter etc.) and configure the protection options you observe.
95% of all cyber attacks on enterprise networks are the result of successful spear phishing.

At Keepnet Labs we have taken a holistic approach to this problem by creating complimentary product modules that focus on People, Process and Technology.

Our Email Threat Simulator module regularly tests your technological investments (such as firewalls, anti-spam and anti-virus), using simulation logic to mimic the attack vectors targeting organisations like yours through your email services.

The results allows you to find weakness in your technology in a safe environment and take the necessary action proactively before you are attacked.

One click enough to start threat simulation

No installation, no configuration or permission needed!

Email Harvesting

Including in the Email Threat Simulator module is the email harvesting feature. We scan the wider web ecosystem to quantify traces of your organisational and employee email addresses which could be harvested for spam and spear phishing.

Domain Squatting

Also known as CEO fraud, domain squatting is the process of mimicking your corporate domain with alternative, similar domains to attempt to trick employees into responding with sensitive data. Our Email Threat Simulator tests your technology infrastructure to quantify the deliverability of such emails and thereby assess vulnerability.

Vulnerability Scanner

This feature scans your e-mail service against known vulnerabilities. It integrates with automation scanning softwares such as Nessus and Nexpose as well as with third party services such as Mxtoolbox.

Client Side Attacks

Attacks that target vulnerabilities in client applications, forcing them to interact with a malicious server or process malicious data. Our Email Threat Simulator tests the detection and delivery of such attacks.

Malicious Attachments

Our Email Threat Simulator contains known harmful substances in email attachments. Harmful attachments not recognised by anti-viruses are also available and they are expected to be detected by behaviour analysis. This feature integrates with the Metasploit penetration testing tool and various other third party services.

Ransomware Samples

Ransomware is a type of malicious software that blocks access to the victim’s data or threatens to publish or delete it until a ransom is paid. Our Email Threat Simulation contains annotations that simulate known ransomwares and their actions.


Our Email Threat Simulation inspects your infrastructure to test for known and frequently misconfigured functions in your email services. Additionally, it also has test scenarios to determine sub-optimal configuration and make best practice recommendations.

Browser Exploits

Our Email Threat Simulator includes penetration tests that contain a link or abusive piece of code that exploits the known vulnerabilities of internet browsers.

File Format Exploits

Many popular file formats (pdf, mp4, html, doc, etc.) can contain exploits. The Email Threat Simulator contains all these known file format exploits and integrates with the Metasploit penetration testing tool and various other third party services.

Let's talk!

Fill in the adjacent form and one of our sales associates will get back to you.