- Open source reconnaissance against the organization
- Full port scan covering all TCP ports and the top 1,000 UDP ports of the targets in scope
- Full vulnerability scan of the targets
- Manual and automated exploit attempts
- Password attacks
TYPES OF PENETRATION TESTS WE OFFER
External Penetration Test
Internal Penetration Test
- Active and Passive network reconnaissance including traffic sniffing, port scanning, LDAP enumeration, SMB enumeration, etc.
- Vulnerability scan on all in-scope targets
- Spoofing attacks such as ARP cache poisoning, LLMNR/NBNS spoofing, etc.
- Manual and automated exploit attempts
- Shared resource enumeration
- Password attacks
- Pivoting attacks
Wireless Penetration Test
- Password attacks
- WEP/WPA cracking
- Guest wireless segmentation checks
- Traffic sniffing attacks
- SSID spoofing
- Rogue access point discovery
Web Application Penetration Test
- Website mapping techniques such as spidering
- Directory enumeration
- Automated and manual tests for injection flaws on all input fields
- Directory traversal testing
- Malicious file upload and remote code execution
- Password attacks and testing for vulnerabilities in the authentication mechanisms
- Session attacks, including hijacking, fixation, and spoofing attempts
- Other tests depending on specific site content and languages
Social Engineering Assessment
- Phone-based attacks
- Spear phishing attacks
- Bulk phishing attacks
Physical Penetration Test
A physical penetration test is an assessment of the physical security of your premises. Our engineers will attempt to gain access to your facility by identifying weaknesses and/or using social engineering. Once inside, our engineers will attempt to gather sensitive information, gain access to sensitive areas such as the data center, and attempt to gain internal network access.
Vulnerability scanning
Vulnerability scanning is a regular, automated process that identifies the potential points of compromise on a network. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. Our engineers will conduct this scan for you and use our expertise to remove false positives and produce a risk-prioritized report.
Internet of things IOT Security Assessment
Developing a secure IoT solution depends on a number of security considerations. This assessment will evaluate the IoT device and its associated infrastructure against common attacks. It can include an evaluation of the edge device, the gateway, the cloud infrastructure, and/or any mobile applications. Our engineers will evaluate your IoT Device utilizing the OWASP IoT Framework Assessment methodology.