PENETRATION.TESTING

A penetration test is a method for which systems, devices, networks and applications are tested for security vulnerabilities by a human

This brings a logical aspect of testing and therefore issues can be identified, exploited and leveraged that would likely be missed by signature based vulnerability assessment products alone. Whether you want to assess the security posture of a system, application, network or an entire organisation, we will identify and exploit as many vulnerabilities as possible during the engagement. By exploiting these security weaknesses we’re able to show you how far an attacker could get if they were to find them first.

 

Application Penetration Testing

Whether you require a web application or thick client assessment, testing will involve a wide variety of manual checks, supported by automated scanning. Our testing methodology addresses the OWASP Top 10 and our stringent checks will not only identify signature-based vulnerabilities, but also logical issues that require human processing.

External Network Penetration Testing

Identifies security misconfigurations and vulnerabilities in your public infrastructure. This type of testing simulates the viewpoint of a remote, unauthenticated attacker and provides assurances about the attack surface of your perimeter security.

Internal Network Penetration Testing

Identifies security misconfigurations and vulnerabilities in your private infrastructure. This type of assessment often involves an element of on-premise testing that covers end-user workstations, servers and network devices running varied operating systems or bespoke software.

Wireless Network Assessment

Our assessments can help you identify flaws in your wireless  authentication mechanisms, weaknesses in network segregation/isolation and aid in identifying rogue access points within your organisation.

Reporting

After the assessment you will receive a detailed report outlining the identified vulnerabilities ordered by criticality, methods of exploitation, as well as likelihood and impact metrics that will assist you in evaluating and addressing the risk to your business. We will also provide remedial steps to ensure your security posture is strengthened moving forward.

Why choose a Penetration Test?

  • A point in time assessment of your environment which serves not only as a benchmark for ongoing security programs, but to assure your clients who may require evidence of your security posture
  • Consider a penetration test if you want to see how far an attacker could get by exploiting vulnerabilities, as opposed to how many vulnerabilities there are
  • The best way to locate, assess and measure logical security vulnerabilities that wouldn’t be found using automated tools
  • Ideal if you want to identify the overall security posture of a specific set of systems, devices or applications