Our Service Offerings

All services are available individually or as a bundle. Our testing is always performed by an accredited and verifiable expert professional in the field of penetration testing. Prior to services being performed, our customers receive resumes and performance histories for all of the resources that will be performing work for their organization.

Internal Penetration Testing

This test examines internal IT systems for any weakness that could be used to disrupt the confidentiality, availability or integrity of the network, thereby allowing the organization to address each weakness.

Our test follows documented security testing methodologies, which include and provide deliverables and reporting around:

▪ Internal Network ScanningFree Stock Photo: Windows start button on a computer screen
▪ Port Scanning
▪ System Fingerprinting
▪ Services Probing
▪ Exploit Research
▪ Manual Vulnerability Testing and Verification
▪ Manual Configuration Weakness Testing and Verification
▪ Limited Application Layer Testing
▪ Firewall and ACL Testing
▪ Administrator Privileges Escalation Testing
▪ Password Strength Testing
▪ Network Equipment Security Controls Testing
▪ Database Security Controls Testing
▪ Internal Network Scan for Known Trojans

External Penetration Testing

An External Penetration Test mimics the actions of an actual attacker exploiting weaknesses in network security without the usual dangers. This test examines external IT systems for any weakness that could be used by an external attacker to disrupt the confidentiality, availability or integrity of the network, thereby allowing the organization to address each weakness.

Our External Penetration Test methodology follows best practice in penetration testing which includes and provides deliverables and reporting around:

▪ Footprinting
▪ Public Information & Information LeakageFree Stock Photo: A laptop keyboard with glasses
▪ DNS Analysis & DNS Bruteforcing
▪ Port Scanning
▪ System Fingerprinting
▪ Services Probing
▪ Exploit Research
▪ Manual Vulnerability Testing and Verification of Identified Vulnerabilities
▪ Intrusion Detection/Prevention System Testing
▪ Password Service Strength Testing

Wireless Assessment

Wireless testing identifies the wireless infrastructure components that can be discovered and connected to, as well as the security mechanisms, which are enforced. Our approach is to conduct a mix of black box and white box testing. We start by completing a site survey, where we use high-powered wireless equipment to locate access points. We then map the wireless infrastructure presence and identify and detect vulnerabilities within the wireless spectrum. We offer a verified set of deliverables and reporting following this assessment.

Spear Phishing Campaigns

Our campaign provides organizations with the ability to improve their employees’ resilience towards spear phishing, malware, pharming, and drive-by attacks. Our campaigns are conducted by experts with experience in spear phishing campaign methodology; which includes periodically immersing employees in simulated phishing scenarios and targeted security education delivered directly to their inboxes, and presenting bite-sized, engaging training, instantly to those found susceptible.

This solution provides clear and accurate reporting on user behavior, changes in behavior, and areas of susceptibility allowing customers to analyze and measure progress over time.

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s