Network Penetration Testing

Assess Your Company's Digital Security Before Attackers Do

If your business was hacked tomorrow, do you know what would happen? Protecting your valuable assets and customer data is paramount in today's digital landscape. Alongside robust security controls, regular network penetration tests play a critical role, and these tests are precisely what cybersecurity insurers will look for when assessing your policy.

What Is Network Penetration Testing?

Network penetration testing is a security test where experts try to hack into an organization's computer network to find vulnerabilities and weaknesses. It's like a "mock" hack to see if a hacker could get in and cause damage. The goal is to identify any problems and fix them before a real hacker can take advantage. It's basically a way to check the security of an organization's network.

Network Penetration Testing

Assessment Capabilities

The internal and external testing phases are similar in many ways, with the exception of leveraging Open-Source Intelligence (OSINT). These assessments take a comprehensive approach to identifying security vulnerabilities which expose systems and services to potential threats. To accomplish this goal, we will leverage a number of resources and techniques to identify, enumerate, and exploit the targeted systems. The following components are included in this phase:

User Profiling

By leveraging publicly available resources, such as social media and other sites, the platform attempts to gather as much information about the targeted organization, including its employees. Using such information, the platform will create a custom list of potential usernames and email addresses that may be useful for other attacks, such as password attacks.

Reputational Threats

The platform attempts to identify potential areas that could be used to harm your organization's reputation. Such information could include misspelled domain names (registered by an attacker), inflammatory domain names, etc.

Intelligence Gathering

Information about the target environment(s) will be gathered to help map out potential target IP ranges, environments that may contain sensitive information, as well as other information that may be valuable to an attacker. Publicly available resources searched during this phase include current and historic DNS records, search engines, forums, Pastebin, GitHub, and your website.

Vulnerability Analysis

Vulnerabilities are identified through both manual testing as well as automated testing and scanning. As vulnerabilities are identified within the targeted environment, the platform will validate the existence of the vulnerability by attempting to leverage multiple validation techniques (e.g. Nmap, Metasploit, etc). Once validated, the platform will gather proof of validation for reporting purposes. During this phase, the platform also marks false-positives as such to assist the organization with only relevant and validated security vulnerabilities.

Exploitation

Based on the security vulnerabilities identified in the Vulnerability Analysis phase, the platform will cautiously attempt to perform exploitation of security vulnerabilities. Depending on the type of security vulnerability exploited, this process may result in the platform gaining limited, or full, access to the exploited target.

Post-Exploitation

To demonstrate the full impact that a malicious attacker could potentially make within the organization, the platform will attempt to perform post-exploitation within the environment. One of the activities involved in this process is privilege escalation, which is the attempt to escalate access within the environment to privileges that would allow for further access within the environment

Internal Pentest

Using a device connected to your internal environment, our security consultants will discover security vulnerabilities present within the internal network environment. These activities will simulate that of a malicious attacker.

External Pentest

Assuming the role of a malicious attacker from the public internet, our security consultants will identify security flaws within your external network environment. These flaws can include patching, configuration, and authentication issues.

Our Penetration Testing Process

  • Prep and Install Device Onsite

    First, we will come onsite and install a dedicated device on your internal network that will handle these ongoing penetration tests.

  • Configure and Schedule Monthly Pentests

    Next, we will build out the applicable tests and schedule accordingly

  • Review Pentest Results

    After the tests have been performed, we will review the results and begin building the necessary remediation plans

  • Present Report Findings

    After we review, we will present our findings and show you what remediation steps will be required to fill the found security gaps

  • Repeat

    Our pentest commitment cycle is 12 months long. This gives us enough time to show progress month over month and to ensure that security issues find their permanent resolution

How much is this going to cost?

Fill out the calculator below and have the price estimate emailed to you.


Name
This is the number of websites you have that is publicly facing. Usually this will be just 1 website assuming that your website domain matches the domain of your email.
This is the number of physical locations your business has. Traditionally, we WOULD NOT have personal addresses unless the user is a "high profile" user and has access to sensitive remotely.
An external IP address is a unique identifier assigned to a device connected to the internet (i.e. your office router). In most cases this will be one per location unless you have multiple internet connections. This DOES NOT include public website.
An internal IP address is used within your private network to identify devices connected to that network. Internal devices can be computers, servers, router, switches, access points, printers, cell phones, IoT devices, etc. Devices on a Guest Network will be excluded from this quantity.

This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form