You can use scans and assessments to find the vulnerabilities in your network, but these tools can’t guarantee how or where a hacker would get in. With our Penetration Testing service, we do more than tell you where your security falls short… we show you.
Our expert team of good guys are trained to think like the bad guys, so they can provide you with a real-world attack simulation. We offer internal and external penetration testing that can be customized to your organization or compliance needs. By simulating a real-world attack on the network, we can find out where your defenses hold up, and where they fail. Let the good guys find your network vulnerabilities first, before the bad guys do. We will help you fix them, they won't.
Penetration testing is one of the most informative and valuable things a company can do to protect their business. It leaves nothing up to theory or lab environments; it takes real testing of deployed systems and networks, and shows how data can be stolen. A changing software landscape with constant patching, and many businesses moving to more cloud based systems, mean that regular penetration tests are necessary to make sure your defenses are keeping up with attackers' ever evolving strategies.
There are several types of penetration tests depending on your business' needs. Testing for vulnerabilities from the outside world into your network is known as an external penetration test. An internal penetration test looks for exploitable systems and processes inside of your network that can compromise data. A full penetration test does both.
You may also hear about Black Box, Grey Box, and White Box testing. In a White Box test, we obtain full information about your network and the devices in it including all IP addresses. We exhaustively test every IP to ensure there are no untested devices, and the test is done in a controlled and informed manner. In a Black Box test, we obtain no information from you other than your business name. We then do research on your business and attempt to penetrate the network using only information that we discovered on our own. A Grey Box test combines elements of both based on the needs of your business, and is the most common form of penetration testing. Don't know which one you need? Ask us! We can help!
After obtaining any relevant information from our contact at the business to be tested, we start by doing research on the company to see if there are any leads for potential exploits, or even just a list of employees. Any information gathered is good information, as it can be used later to help direct testing paths. We also scan the business from the outside looking for any potential exploits. Traffic to and from the business, open firewall ports, and even the firewall itself all build a picture of how a network can be exploited.
After the information gathering and probing phase, we take a step back to develop a plan of attack. Keep in mind, this test is intended to find vulnerabilities we would expect to be secure too. Meaning we still test to see if we can get through your firewall through brute force or any other method, if permitted. However, we also need to simulate a real attack. This is where we will use any non-destructive (or otherwise permitted) means of attempting to gain entry to the network.
Here we launch the attack. We record and document everything we find, both good and bad. If your defenses hold up, we take notes. If your defenses fail, we take notes. This is more than a checklist. We want to show you not just what failed, but how it failed. Once on the network we turn our attention to finding a foothold inside. POS system, phone on the Wi-Fi, even just an unsecured printer can be enough. Once we gain access to one single IP address, we can use that to find ways into the rest of the network.
Our job is partly to determine what information an attacker could gain if they got inside. If the foothold in your network is a janitor computer with the lowest credential authority, that by itself will not grant access to sensitive data (if your IT team is doing their job). We can use that device as a launch pad to gain access to more and more of the network, which is an exponential process. We call this lateral movement. It is a process of searching for data used to move up the chain to administrator status.
While looking for privilege escalation, we are also looking to create a repeatable means of entry. A one time entry into a network usually is not useful, as sensitive information is typically behind layers of security. Looking from the inside out, we can find ways to ensure repeatable entry into a network. Carefully documenting everything we find, we return to searching for pathways deeper into the network.
While looking for privilege escalation, we usually find mention of places sensitive data is stored that we might not expect. We can use that information to pivot our attack and find these previously unknown access points to information. Frequently, we discover ways of getting to data that our customer thought they had closed off, or forgotten repositories of data no one remembers how to get to. Management changes, IT changes, and owner changes can all contribute to lost or forgotten data.
Once we find where the information is stored we can use our previously obtained information to get in. Documenting everything we could gain access to, we take a step back and create a comprehensive report.
Our report is a full breakdown of everything we found, or otherwise gained access to. The person who actually performed the penetration test will go over the report with you giving suggestions regarding the vulnerabilities we found, and answering any questions. This is not a sales call. This is not a list of pass/fail checkboxes, it is a personalized report that we use to show what vulnerabilities we found and how to fix them. We turn over all documentation of our test and we do not keep any data gained or obtained during the testing process.
Copyright © 2023 Aegis Security and Technology - All Rights Reserved.
OK LIC NO: AC440720