Our Approach

Akimbo Core began working in 2019, to address the weaknesses in the traditional approach to security testing. 

With companies relying on approaches that lead to a long mean-time-to-detection and that don’t take the whole organisational context into account — We wanted to do something different. 

That’s why we take a platform-first approach to security and continuous security testing.

Continuous Security Testing

The Problem

Many organisation’s utilise penetration testing to find, and remediate, security vulnerabilities within their internet facing systems. Traditional cybersecurity approaches such as penetration testing are often conducted annually, but that is not in-line with the way that systems and applications are developed. Regular changes and updates can introduce risks faster than those methods can detect.

Modern organisations are constantly at risk from cybercriminals. Keeping everything up-to-date and locked down is a fundamental part of cybersecurity - but issues may be missed and risk may unintentionally be introduced to your systems. To ensure that these problems can be found and fixed quickly, it's critical that your security stance is constantly tested.

Our Solution

We use penetration testing techniques to continuously assess your external risk profile, alerting you to changes on your attack surface or the threat landscape.

Akimbo Core offers “Always-on” Security Testing. This is a modern approach to cybersecurity that offers the benefits of penetration testing but is more effective and constantly active. We apply human intelligence to the complex parts and develop application-specific automation for the repetitive tasks.

This allows us to test far more frequently, more much efficiently and effectively when compared to traditional penetration testing.

We provide information about your security stance through an online platform, available 24/7, that allows you to view the security testing that's taking place, see your organisation's current level of risk, and gain assistance in remediating discovered security issues.

Akimbo Core Dashboard Screenshot

State of the Union

A dashboard shows the current security stance of your organisation, including outstanding issues as well as the on-going security testing work conducted.

Attack Surface Monitoring

New systems are highlighted within the dashboard to ensure they're not missed from the testing scope.

Vulnerability Alerts

High risk issues cause vulnerability alerts so you don't miss critical vulnerabilities or weaknesses. These can be configured to your desired threshold.

Continuous Asset Monitoring

The Problem

Many organisations focus their attention on perimeter security, however with the potential for targeted phishing attackers, insider threats, and a remote workforce – the idea of relying on a strong perimeter is outdated.

Organisations need to make sure that their assets are protected from attack from all angles, including when staff are working remotely, or from home.

Our Solution

There is more to cyber defence than strong perimeters, we track your assets to ensure they are hardened against attacks.

Our asset monitoring systems continuously monitor your systems to ensure they are hardened against attack. Tracking their vendor support, and offers actionable guidance to mitigate the risk of known vulnerabilities and to prevent exploitation.

All of your organisational assets are tracked within our dashboard allowing you to monitor their status and remediation over time.

Best Practice or Compliance

Whether you’re looking to track and harden your assets for best practices, or compliance reasons, our system can monitor your systems against the security requirements of your choice.

Each asset has a health bar that shows you how close it is to your compliance goal.

Akimbo Core Dashboard Screenshot

The Platform

A continuous view of the risk exposure of your organisation, with configurable alerts for new issues as soon as they are discovered. Our platform gives full control of your testing activities too.

The Problem

With a fluctuating risk profile, it can be very difficult to understand the current level of danger your organisation faces. Plus, many traditional security testing services have a significant delay between issue discovery and reporting – with reports often not arriving until many days after the end of the engagement.

Additionally, many security testing services still deliver reports in an unmanageable format – such as PDFs over email.

Our Solution

If you want a PDF copy of your report, we’ll send you one. However, our portal-first approach to security reporting gives you a continuously updated view into your organisations security.

Regardless of the type of security assessment requested, we continuously update your view of your organisation’s risk via our web platform.

You can view vulnerabilities as soon as they are confirmed. You can communicate directly with the testing team, such as to request additional information or to request a retest of a remediated issue. You can view a high-level report of the state of your systems, ideal for management meetings – or you can drill down into the technical detail needed to remediate a complex issue.

Akimbo Core Dashboard Screenshot


With new security issues being found constantly, it’s difficult to keep track of them all – or get any other work done if you even try.

That’s why we’ve set our platform up with configurable notifications, so that you can tell us what “critical” means to your business, and we’ll make sure to alert you to those issues, without overloading you with more minor details.

The Workflow

There’s no “I” in team, and so we’ve developed our platform to work well with teams of any size.

You can assign vulnerabilities to specific staff for remediation, you can message team members to discuss issues, and you can securely share issue details with those in your organisation that need to know.

Akimbo Core Dashboard Screenshot

Your Team

Granular access control allows you to share just the information you need with the people that need to see it. With group permissions simplifying the whole thing.

For example, you could give the management team an overview dashboard, your tech team all of the details needed to fix things, and your auditors read-only access to track compliance activities.

Knowledge Base

Some vulnerabilities are easy to fix, perhaps just a quick configuration change or a software update to install. Sadly, software vendors don’t always get it right and sometimes vulnerability remediation can be painful.

To simplify the process of hardening your systems we have a knowledge base of common hardening actions and articles covering the “how, what and why” of system hardening. From talking about modern approaches to password security, to the depths of group policy options.

All to make keeping your systems secure, simple.

Akimbo Core Dashboard Screenshot

Want to get in touch with the team?

Looking to learn more about Cybersecurity?

Strong Passwords: The Problem with Rotation

Password rotation has previously been included within best practice guides as a method of minimising the risk of compromised passwords being valid at the time a threat actor attempts to use them. Recent research has indicated that the enforcing password rotation is linked to increased risk of weak passwords, due to users selecting passwords based on patterns - such as `Password1`, `Password2`, `Password3`, or patterns such as `Summer 2021`, `Autumn 2021`, `Winter 2021`.

Read More

Exploiting Path Traversal

Path Traversal, also known as Directory Traversal, is a vulnerability where a user can alter a path used by an application. For file retrieval functionality this can allow an attacker to access files that are not intentionally disclosed. For file upload functionality this can allow for website defacement, code execution and stored cross-site scripting attacks. 

Read More

Exploiting SQL Injection with Sqlmap

We've previously posted about manually finding and exploiting SQL injection vulnerabilities. However one of the reasons SQL Injection is such a high risk vulnerability overall if due to the fact that exploitation can often be entirely automated. One tool for exploiting this vulnerability is sqlmap. From the point of view of security testers, SQL Injection can be time consuming to exploit, especially with slow extraction methods such as Time-based blind. However by automating exploitation can allow security testers to demonstrate the issue risk whilst freeing up time to check other areas of the assessment scope.

Read More

SQL Injection: Filter Evasion with Sqlmap

We've previously written about many different techniques for Finding and Exploiting SQL Injection vulnerabilities. However, there are often restrictions and interim technologies such as Web Application Firewalls that can prevent certain payloads from being used. In some instances filters can be bypassed through common encoding mechanisms, however often these will be ineffective and other methods much be used.

Read More

Finding Command Injection

Command Injection vulnerabilities occur where user supplied input is insecurely included within an operating system command, allowing an attacker to execute additional commands or alter the syntext of the executed command. This vulnerability typically allows for confidential data theft and may allow a threat actor to target internal network connections for further attacks.

Read More

Strong Passwords: The Problem with Complexity

Weak passwords are those which are predictable and can be easily guessed. To ensure that users do not select weak passwords organisations may look to enforce password complexity. Complexity refers to the requirement to use a mixed character set. For example, on Active Directory accounts complexity requires three of the four: uppercase, lowercase, numbers, and symbols. However it is still possible to select weak passwords with complexity enabled, such as `Welcome!`, `Summer2020`, or `Password123456`.

Read More