External Network Penetration Test
Assess the perimeter defenses security of the hosts and services to the Internet. Performed remote to the environment, these tests simulate external attacks to exploit weaknesses with the intent of gaining access to the network.
Internal Network Penetration Test
Assess the security of internal private networks and hosts to see what a malicious individual could compromise from within the environment by exploiting weaknesses to gain access to a private network. Tests are internally executed to the environment to simulate insider threats, targeting networks, hosts, and responding services.
Internal Wireless Penetration Test
Audit wireless security controls designed to protect unauthorized access to corporate wireless services. Tests are designed to exploit wireless vulnerabilities to gain access to private (pro Wireless penetration tests assess the adequacy of multiple security controls designed to protect unauthorized access wireless services.
Remote Social Engineering Penetration Test
Validate the effectiveness of user security awareness, incident response, and network security controls such as malware defenses, local permissions, and egress protections. Tests include issuing carefully crafted emails to lure users to fictitious “malicious” websites, attempts to compromise these users, escalate privileges, and penetrate the internal environment.
Onsite Social Engineering Penetration Test
Gauge the effectiveness of physical security controls, employee response to suspicious behavior, perimeter defenses, and validate network security controls prevent attackers from gaining network access. Tests include attempts to gain physical access using a variety of approaches including establishing fictitious identification, falsified meeting invitations, tailgating.
Remediation Verification Penetration Test
Verifies if identified vulnerabilities have been successfully remediated, providing independent confirmation that corrective measures have been implemented in a manner that prevents exploitation. Tests include reproduction of the vulnerabilities and associated exploits, providing confirmation that corrective measures have been implemented in a manner that prevents exploitation.