Houston's Technology Consulting
Security Assessment Capability Showcase
Comprehensive security analysis combining domain-level auditing with MITRE ATT&CK endpoint assessment. Two distinct attack surfaces. One unified security posture.
Executive Overview
Combined security posture across external domain and internal endpoint assessment vectors.
Domain Security
Endpoint Security
Methodology
A two-pronged approach combining external domain reconnaissance with internal endpoint telemetry.
Domain Security Assessment
External-facing attack surface analysis
- DNS record enumeration (A, AAAA, MX, NS, TXT, CAA, DNSSEC, DANE/TLSA)
- TLS/SSL configuration and cipher suite analysis
- Email authentication chain (SPF, DKIM, DMARC, MTA-STS, BIMI)
- HTTP security headers (9-header assessment)
- HSTS preload status verification
- Blacklist / reputation checks (9 lists)
- Certificate Transparency log enumeration
- OSINT and site crawl analysis
- Multi-framework compliance mapping (15+ frameworks)
Endpoint Security Assessment
MITRE ATT&CK-aligned internal scan
- Registry autostart enumeration (Run keys, startup folder, WMI)
- Local account and password policy audit
- Network service and listener discovery (TCP/UDP)
- Windows Defender status and exclusion review
- Scheduled task privilege analysis
- PowerShell logging configuration
- Service path vulnerability scanning
- Credential protection assessment (LSA, VBS, Credential Guard)
- C2 indicator detection (outbound connections, DNS cache)
- File obfuscation checks (ADS, hidden executables)
Architecture
Domain Security Assessment
External security posture of houstons.tech — deep scan with crawl analysis.
Grade Breakdown
Top Findings
NIST Cybersecurity Framework
Essential Eight Maturity Levels
ISM Control Assessment
Quick Wins
- Enable 'Always Use HTTPS' in Cloudflare (1 click, fixes HST-002)
- Add security headers via Cloudflare Transform Rules (fixes HST-001, HST-005, HST-006)
- Enable HSTS in Cloudflare SSL/TLS settings (1 click, fixes HST-005)
- Add CAA DNS records restricting cert issuance (fixes HST-008)
- Configure DKIM with Forward Email (fixes HST-003)
Compliance Framework Coverage
Endpoint Security Assessment
MITRE ATT&CK-aligned security posture of ENDPOINT-01 — Windows 11 Pro (Build 26100).
Tactic Grade Breakdown
MITRE ATT&CK Tactic Radar
Findings
Positive Security Controls
- LSA Protection (RunAsPPL) enabled — blocks credential dumping tools
- WDigest plaintext password storage disabled
- Windows Defender operational with 0-day-old signatures
- Virtualization Based Security (VBS) running
- UAC enabled with Secure Desktop prompts
- No Alternate Data Streams or hidden executables found
- No proxy configuration (reduces C2 relay risk)
- No DNS TXT cache anomalies
Technique Coverage Heatmap
Quick Wins
- Set a password on the Tom account — eliminates the #1 critical finding
- Enable Tamper Protection via Windows Security UI (cannot be done via GPO/registry)
- Enable PowerShell Script Block Logging — single registry key
- Restrict RDP to specific IPs via Windows Firewall
- Remove C:\Users\[USER]\AppData\Local\Temp from Defender exclusions
Combined Risk Matrix
Likelihood vs. Impact assessment across all 37 findings from both assessments.
Combined Remediation Roadmap
Prioritised action items from both assessments, merged into a unified remediation timeline.
Capabilities Summary
A comprehensive overview of the security assessment platform's scanning, analysis, and reporting capabilities.
Domain Security Scanning
- DNS record enumeration (A, AAAA, MX, NS, TXT, CAA, DNSSEC)
- TLS/SSL certificate and cipher suite analysis
- Email authentication (SPF, DKIM, DMARC, MTA-STS, BIMI)
- HTTP security headers (9-header framework)
- HSTS preload list verification
- IP and domain blacklist/reputation checks (9 lists)
- Certificate Transparency log monitoring
- OSINT exposure analysis
- Automated site crawl with link validation
- DANE/TLSA record verification
Endpoint Security Scanning
- Registry autostart enumeration (Run keys, startup, WMI)
- Local account and password policy audit
- Network listener discovery (TCP/UDP full scan)
- Windows Defender status and exclusion review
- Scheduled task privilege analysis
- PowerShell logging configuration check
- Unquoted service path detection
- Credential protection (LSA, VBS, Credential Guard)
- C2 indicator detection (outbound connections, DNS cache)
- Alternate Data Streams and hidden executable scanning
Compliance Frameworks
- Australian ISM (Information Security Manual) — 40+ controls
- ACSC Essential Eight — 8 strategies with maturity levels
- PSPF (Protective Security Policy Framework)
- IS18 (Queensland Government)
- ISO 27001:2022 Annex A controls
- SOC 2 Trust Services Criteria
- APRA CPS 234 (Information Security)
- EU NIS2 Directive
- EU DORA (Digital Operational Resilience Act)
- Australian Privacy Act / APPs
- GDPR (EU General Data Protection Regulation)
- CIS Controls v8
- PCI DSS v4.0
- OWASP Top 10 (2021)
- UK Cyber Essentials
- MITRE ATT&CK Framework (14 tactics, 200+ techniques)
- NIST Cybersecurity Framework 2.0
Output & Architecture
- Self-contained HTML reports (zero dependencies)
- Structured JSON analysis data
- PostgreSQL backend for historical tracking
- Grade system: A/B/C/D/F with percentage scores
- NIST CSF radar visualisation
- MITRE ATT&CK tactic radar
- Risk matrix (Likelihood x Impact)
- Prioritised remediation roadmaps
- ISM control pass/fail tracking
- Fully offline-capable — no external API calls at report time