Our security engineers will simulate advanced attack strategies to be expected in the real world. Because you can't risk what tools miss.
Penetration testing is the highest level of security assessment offered. Unlike vulnerability assessments, a penetration test uses ethical hacking techniques to attempt to exploit the weaknesses found in order to measure the severity of these attacks. The difference between a real attacker and our security engineers are the permissions given and the detailed scope of work agreed upon before starting the test. The objective of this exercise is to first identify if an external attacker can infiltrate the network, and if done, what information would be available to them. False positives are eliminated and a Business Impact Analysis is conducted.
Penetration testing requires a high level of expertise and knowledge in order to be successful, going far beyond anything any automated tool can provide. In most cases, a successful penetration tester will have to write custom tools and exploits; thus, extensive programming knowledge and experience are needed. Although the exact scope and length of each test varies, most penetration tests are divided into the following areas:
Reconnaissance will begin with techniques that search public registration data, Domain Name System (DNS) server information, newsgroup postings, and other publicly available information to collect information (e.g., system names, Internet Protocol [IP] addresses, operating systems, technical points of contact) that may help the assessor to identify vulnerabilities. During this phase we try to learn everything we can about your organization including employees, security policies, physycal security and infrastructure.