This is where all requirements are gathered and goals are set. It’s where types of tests, forms, timelines and limitations are codified and agreed. We utilize our own SecurePortal to ensure that all of the required scoping documents are securely transmitted between the client and the company.
Benefits of Infrastructure Penetration Testing
An Infrastructure Penetration test uncovers vulnerabilities residing within your infrastructure and provides a detailed attack narrative to help evaluate the impacts of each finding.
Find vulnerabilities residing in IT systems, applications, or network components
Protect access to sensitive information by finding weaknesses others overlook
Stay compliant
What Zeroday.PRO Offers
Internal Penetration Testing
External Penetration Testing
Wireless Network Pentesting
Our Network Security Testing Methodology
SCOPING
RECONNAISSANCE
In this phase, we will utilise both Passive and Active Information Gathering. Our consultants will collect as much information as they can on the target, employing a myriad of OSINT (Open Source Intelligence) tools and techniques.
ASSESSMENT
The assessment phase aims to check known vulnerabilities against the operating systems and services that have been identified as present in the network. Attempts are also made to exploit common operating system vulnerabilities to check the level of privileged access that can be achieved.
REPORTING
We have developed a comprehensive reporting format that provides optimal insight into our work. The summary lists the key findings along with the top ten recommendations for remedial action. A table of hosts is provided together with the total number of vulnerabilities identified at each severity level.
PRESENTATION
The full assessment report will be created and uploaded to our SecurePortal for review prior to scheduling a de-brief call. The call or meeting is an opportunity for you to discuss any major issues arising from the assessment with the lead consultant who will formally present the findings of the report.
PATCH VERIFICATION
We are happy to re-examine the security weaknesses to ensure that the defense mechanisms have been implemented correctly. This process activity is always free of charge.
Manual vs Automated Penetration Testing
Frequently asked questions about Network Penetration Testing
What does my organization gain from security testing its infrastructure?
Our team of consultants will ensure that we have done everything possible to evaluate the security defenses you have in place at your organization. It is impossible to assess how well an organization’s defensive measures are working, unless they have been tested to react the way a vendor has claimed they are intended to perform.
Our reports detail findings in an easy-to-read layout for executives, but also provide the necessary results, guidelines and suggestions that can help the technical staff mitigate the exploitable vulnerabilities found. This allows management to share results with all organizational stakeholders involved to address the weaknesses in all related operations.
What is the difference between internal and external security infrastructure testing?
External infrastructure testing is concerned with what services, protocols, and applications are being exposed to the internet, e.g. web servers, log-in portals. These systems are considered the most vulnerable, as the constant assault of attacks from external threat actors create a high level of risk to all exposed areas. The systems that are exposed must have flawless configurations focusing on hardening techniques.
The assumption with Internal infrastructure testing is that external threat actors have already penetrated external defenses to find a way inside or the threat is being sourced from an internal actor. The primary focus areas for this type of testing are lateral movement and privilege escalation. The goal of this type of testing is to identify how difficult it is for an internal attacker to move around the internal network and to discover what type of sensitive data may be obtained in the process. This is also an effective way to test the awareness of the defensive team by identifying how quickly it takes for a defensive team to discover the presence of an intruder and if they were able to isolate how the intruder gained access.
What information is needed to scope an infrastructure security test?
In most situations, our clients choose to identify a list of assets they want our consultants to focus on within the scope of the engagement. After the client has established this, they would simply contact our team to set up a meeting to go over the details.
What type of methodology is used for infrastructure security testing?
Zeroday.PRO consultants are trained to follow our own specialized security testing methodology based on industry standards primarily aligned with OWASP, NIST and PTES in order to ensure compliance with most regulatory requirements. The reason for this organizational-specific testing methodology is to create an effective attack plan that produces data results that are valuable, but also have a high-level of validity associated with them. Our consultants take the time to create proof of concepts (POCs) that are easy to understand and follow, but also show exactly how we came to the results, so our clients can use this information to mitigate the vulnerabilities and create a more secure infrastructure.
How long does an infrastructure security test take?
The time it takes an ethical hacker to complete an infrastructure security test depends on the scope of the test, including the number and type of systems, networks and applications.
What happens at the end of an infrastructure security test?
After each infrastructure security test, the ethical hacker(s) assigned to the test will produce a custom written report, detailing any weaknesses identified, associated risk levels and recommended remedial actions.
How much does an infrastructure security test cost?
The cost of an infrastructure security test is determined by the number of days our ethical hackers require to fulfil the agreed scope of the engagement. As part of the initial scoping process, a quote is produced upon completion and return of a short pre-evaluation questionnaire.