NEED HELP?
Get the help you need on our official LINE
qrcode
@incognitolab
Add Line Friends via QR Code
Go to LINE’s Add Friends menu Use Search by ID or QR Code to register!

INCOGNITO LAB

WHAT WE DO

Incognito Lab provides a full-range of professional cyber security services for organisations of all sizes and of all industrial sectors. More than 10+ years in the field, our foundation and mastery delivered to the clients were brought with passion and responsibility.

PENETRATION TEST

Highly-ethical standard and solid experienced of our certified team can provide a full range of security assessment services to meet your requirement.

RED TEAMING

We will bombard your security controls from adversaries' perspective in order to measure your security capabilities and train your people.

CONSULTING

Developing and maintaining effective information security strategy and standard can be difficult without experienced individuals. Incognito Lab's consulting services are set to be your partner.

TRAINING

Incognito Lab team develops training courses and brings our knowledge to help organisations secure their business.

WHAT'S NEW

We wish to contribute to the industry, educate people, and empower organisations to know the adversaries and fight against cyber attacks. The ways we convey come from our works and our passions.
Screen Shot 2564-09-07 at 08.30.37
ARTICLES
SEP
07
2021

IT and Cyber Risk Management 101 - TGIA x Incognito Lab Webminar

คุณวุทธินันท์ ตันสุคตานนท์ Senior Consultant/Senior Lead Auditor ได้บรรยายเกี่ยวกับตัวประกาศฉบับนี้ พร้อมทั้งอธิบายแนวทางการกำหนดกลยุทธ์เพื่อแต่ละบริษัทประกันสามารถวางแผนเพื่อปฏิบัติตามประกาศดังกล่าวตามบริบทของแต่ละบริษัท โดยให้พิจารณาเริ่มต้นจาก 3 องค์ประกอบต่อไปนี้ 1. การสนับสนุนจากผู้บริหารระดับสูง (Leadership) 2. ทรัพยากรขององค์กร (Resource) 3. การเตรียมการติดตามการกำกับดูแลและบริหารจัดการความเสี่ยงด้านเทคโนโลยีสารสนเทศ (Maintain the program)
READ MORE
ICL_Logo_Color
ICL LOGBOOK
SEP
01
2021

ICL LogBook 2021

Log book ประจำปี 2021 รวบรวมข่าวด้าน Cybersecurity ที่น่าจดจำเก็บไว้
READ MORE
1*Bq783IFHBE90M514T_Magg
ARTICLES
AUG
19
2021

Kerberoasting Attack

Kerberoasting เป็นเทคนิคหนึ่งในการโจมตี Kerberos มีเป้าหมายเพื่อ crack หา Password
READ MORE

WHY INCOGNITO LAB

As a vendor-neutral company with no external investment, we could apply our team’s years of solid experience and diverse skills to provide security know-how on technical and non-technical subjects. We did not just test but we believe that a strong cyber security drives our client's business growth and innovation; this is our goal.
0%
SUCCESS
RATE
0
NO. OF
OUR CLIENTS
0
CYBER DRILLS
*NOT PHISHING
0
YEARS OF
APPEARANCE
0
BLANK PENTEST
REPORT
WHATWE HACKWEBAPPS34% 5%IOT/KIOSK5%APIS18%MOBILEAPPS28%INFRASTRUCTURE*including ADOTHER*Cloud,Wireless,Thick Client Apps,ICS/SCADA,Physical,VDI10%
AWARDS AND RECOGNITIONS
Black Hat
2014
Black Hat
Hacktivity
2015
Hacktivity
SANS Holiday Hack Challenge - Honorable Mention
2016
SANS Holiday Hack Challenge - Honorable Mention
NRCT - Expert System on Security Analytics and System Security Surveillance for General Users
2016
NRCT - Expert System on Security Analytics and System Security Surveillance for General Users
SANS Holiday Hack Challenge - Super Honorable Mention
2018
SANS Holiday Hack Challenge - Super Honorable Mention
SANS Holiday Hack Challenge - Honorable Mention
2020
SANS Holiday Hack Challenge - Honorable Mention
CERTIFIED PROFESSIONALS
Giac Certified Expert
GIAC Security
Expert
Certified Information Systems Auditor
Certified Information
Systems Auditor
Certified Information Security Manager
Certified Information
Security Manager
Certified Information Infomation Systems Security Professional
Certified Information Infomation
Systems Security Professional
Systems Security Certified Practitioner
Systems Security
Certified Practitioner
Certificate of Cloud Security Knowledge
Certificate of Cloud
Security Knowledge
Giac Reverse Engineering Malware
GIAC Reverse
Engineering Malware
Giac Certified Incident Handler
GIAC Certified
Incident Handler
Giac Certified Intrusion Analyst
GIAC Certified
Intrusion Analyst
Giac Mobile Device Security Analyst
GIAC Mobile Device
Security Analyst
AWS Certified Security Specialty
AWS Certified
Security Specialty
AWS Certified Solutions Architect Associate
AWS Certified Solutions
Architect Associate
SEE MORE
Certified Information Systems Security Professional (CISSP)
GIAC Security Expert (GSE)
GIAC Penetration Tester (GPEN)
GIAC Certified Forensic Analyst (GCFA)
eLearnSecurity Certified Professional Penetration Tester (eCPPT)
EC-Council Certified Ethical Hacker (CEH)
CREST Registered Penetration Tester (CRT)
AWS Certified Security - Specialty
Certified Information Systems Auditor (CISA)
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
GIAC Mobile Device Security Analyst (GMOB)
GIAC Certified Intrusion Analyst (GCIA)
eLearnSecurity Web Application Penetration Tester (eWPT)
EC-Council Certified Security Analyst (ECSA)
Offensive Security Certified Professional (OSCP)
AWS Certified Solutions Architect – Associate
Certified Information Security Manager (CISM)
GIAC Web Application Penetration Tester (GWAPT)
GIAC Reverse Engineering Malware (GREM)
GIAC Security Essentials (GSEC)
eLearnSecurity Certified Threat Hunting Professional (eCTHP)
CREST Practitioner Security Analyst (CPSA)
Offensive Security Certified Expert ( OSCE)