Penetration Testing
You’ve hardened your perimeter, set up intrusion detection, and increased your monitoring. Yet, your applications may still provide hackers with a route to your sensitive data and files. Our penetration testing replicates the steps a threat agent can take to exploit your vulnerabilities, demonstrates the impact, and provides clear guidance to fix them.
- External Penetration Testing – Simulating an attacker originating for the external perimeter (Internet).
- Zero-Day Research – Perform zero-day research on applications in an attempt to identify exposures prior to attackers finding them in the wild.
- Customized Red Team Exercises – Perform advanced red team attacks against an organization simulating adversarial type roles.
- Application Penetration Testing – Perform attacks against web applications or other applications in order to identify what exposures exist.
- PCI Penetration Testing – Perform penetration tests that comply with PCI DSS 2.x and PCI 3.x.
- Mobile Penetration Testing – Identify what exposures exist on mobile devices and applications.
- Physical Penetration Testing – Simulating a physical break in. Our experts will hop fences, lock pick, social-engineer our way in, and attempt to gain unauthorized physical access.
- Wireless Penetration Testing – An attacker that is attempting to compromise the environment through traditional wireless technologies.
- Internal Penetration Testing – Simulating an attacker that has established access to the internal network. This could be from an already compromised system, malicious insider, or other avenue.