Listing Thumbnail

    Network Penetration Testing

     Info
    The Network Penetration Test provides a qualitative risk assessment focused on both the internal and external threats to the target network. The assessment is conducted through a series of controlled testing from external sources as well as sources internal to the target network.
    Listing Thumbnail

    Network Penetration Testing

     Info

    Overview

    The focus of this evaluation is to take a “hackers eye view” of your infrastructure. We perform detailed port and vulnerability scanning and build upon our findings from these tests by adding specific tools and techniques based on our findings. We use different tools based on what services are found to be within our target of evaluation. The tools we use are the same ones that the bad guys use and performing this sort of test helps to better determine the risk posture of your front door.

    TBG Security will follow a modified NIST 800-115 standard when performing network penetration testing.

    Detailed tasks include:

    • Discovery – Engineers begin by identifying hosts to be included in our target of evaluation. Sometimes this information is provided upfront; other times we must use technical means to discern the addresses of live hosts within the target environment.
    • Enumeration – Once they have a detailed list of targets, we will enumerate them to identify available services on each target.
    • Vulnerability scanning – These targets are then fed into our commercial vulnerability scanner and an automated vulnerability assessment is performed.
    • Gain Access – The identified vulnerabilities will then be leveraged to gain access to systems within the target environment.
    • Escalate Privileges – Leveraging exploits and other techniques engineers will escalate privileges to access more of the system and all the files on the machines.
    • System Browsing – Browsing the systems for data, credentials, or other information to expand our influence. If more systems are found additional discovery and vulnerability scanning will be performed.
    • Lateral Movement – Moving laterally within the network to expand influence and look for more valuable data that an attack could be looking for.
    • Reporting - Engineers compile all of the data into a comprehensive repot laying out attacks methods, and risk ratings for each area of the organization.

    DELIVERABLES:

    At the conclusion of the network penetration test, TBG Security will produce a findings and recommendations report containing:

    An executive summary including;

    • The scope of the engagement
    • An overview of our activities
    • A high-level, categorical, risk-based breakdown of findings
    • High level recommendations
    • A high-level plan for remediation

    Detailed findings

    • A risk-based list of addressable issues detailing the network component, exploit description, risk to the environment, sophistication of the attack, impact of the finding, evidence and detailed remediation recommendations.

    In addition to the above report we will also produce;

    A vulnerability spreadsheet including;

    • A list of vulnerabilities identified broken out by host, vulnerability and criticality
    • A list of exposed services
    • A prioritized list of vulnerabilities requiring immediate attention
    • Detailed remediation guidance

    A high-level project plan including;

    • Activities, cost rating, level of effort, benefits to the organization, complexity, sales impact if applicable and whether the project includes people, process or technology.
    • Identified Running and exposed services

    Our findings reports will be delivered in draft form to our primary point of contact for review. TBG will work together with your team to finalize the draft.

    Highlights

    • Penetration testing or pen testing is an essential aspect of any security program. With over 20 years of pen testing experience our team is the best fit to find out how secure your network really is.
    • These penetration tests can be learning opportunities for your team to understand the techniques and tactics used by hackers to penetrate your systems. Your team will learn about the latest tools and exactly how networks are exploited by a threat actor.

    Details

    Delivery method

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Please feel free to call or email with any questions