Overview
The focus of this evaluation is to take a “hackers eye view” of your infrastructure. We perform detailed port and vulnerability scanning and build upon our findings from these tests by adding specific tools and techniques based on our findings. We use different tools based on what services are found to be within our target of evaluation. The tools we use are the same ones that the bad guys use and performing this sort of test helps to better determine the risk posture of your front door.
TBG Security will follow a modified NIST 800-115 standard when performing network penetration testing.
Detailed tasks include:
- Discovery – Engineers begin by identifying hosts to be included in our target of evaluation. Sometimes this information is provided upfront; other times we must use technical means to discern the addresses of live hosts within the target environment.
- Enumeration – Once they have a detailed list of targets, we will enumerate them to identify available services on each target.
- Vulnerability scanning – These targets are then fed into our commercial vulnerability scanner and an automated vulnerability assessment is performed.
- Gain Access – The identified vulnerabilities will then be leveraged to gain access to systems within the target environment.
- Escalate Privileges – Leveraging exploits and other techniques engineers will escalate privileges to access more of the system and all the files on the machines.
- System Browsing – Browsing the systems for data, credentials, or other information to expand our influence. If more systems are found additional discovery and vulnerability scanning will be performed.
- Lateral Movement – Moving laterally within the network to expand influence and look for more valuable data that an attack could be looking for.
- Reporting - Engineers compile all of the data into a comprehensive repot laying out attacks methods, and risk ratings for each area of the organization.
DELIVERABLES:
At the conclusion of the network penetration test, TBG Security will produce a findings and recommendations report containing:
An executive summary including;
- The scope of the engagement
- An overview of our activities
- A high-level, categorical, risk-based breakdown of findings
- High level recommendations
- A high-level plan for remediation
Detailed findings
- A risk-based list of addressable issues detailing the network component, exploit description, risk to the environment, sophistication of the attack, impact of the finding, evidence and detailed remediation recommendations.
In addition to the above report we will also produce;
A vulnerability spreadsheet including;
- A list of vulnerabilities identified broken out by host, vulnerability and criticality
- A list of exposed services
- A prioritized list of vulnerabilities requiring immediate attention
- Detailed remediation guidance
A high-level project plan including;
- Activities, cost rating, level of effort, benefits to the organization, complexity, sales impact if applicable and whether the project includes people, process or technology.
- Identified Running and exposed services
Our findings reports will be delivered in draft form to our primary point of contact for review. TBG will work together with your team to finalize the draft.
Highlights
- Penetration testing or pen testing is an essential aspect of any security program. With over 20 years of pen testing experience our team is the best fit to find out how secure your network really is.
- These penetration tests can be learning opportunities for your team to understand the techniques and tactics used by hackers to penetrate your systems. Your team will learn about the latest tools and exactly how networks are exploited by a threat actor.
Details
Pricing
Custom pricing options
Legal
Content disclaimer
Resources
Support
Vendor support
Please feel free to call or email with any questions
- Phone: (877) 233-6651
- Email: info@tbgsecurity.com
- Website: https://tbgsecurity.com/contact-us