PenetrationTest.jpg

Penetration Testing

You’ve hardened your perimeter, set up intrusion detection, and increased your monitoring. Yet, your applications may still provide hackers with a route to your sensitive data and files. Our penetration testing replicates the steps a threat agent can take to exploit your vulnerabilities, demonstrates the impact, and provides clear guidance to fix them.

  • External Penetration Testing – Simulating an attacker originating for the external perimeter (Internet).
  • Zero-Day Research –  Perform zero-day research on applications in an attempt to identify exposures prior to attackers finding them in the wild.
  • Customized Red Team Exercises – Perform advanced red team attacks against an organization simulating adversarial type roles.
  • Application Penetration Testing – Perform attacks against web applications or other applications in order to identify what exposures exist.
  • PCI Penetration Testing – Perform penetration tests that comply with PCI DSS 2.x and PCI 3.x.
  • Mobile Penetration Testing – Identify what exposures exist on mobile devices and applications.
  • Physical Penetration Testing – Simulating a physical break in. Our experts will hop fences, lock pick, social-engineer our way in, and attempt to gain unauthorized physical access.
  • Wireless Penetration Testing – An attacker that is attempting to compromise the environment through traditional wireless technologies.
  • Internal Penetration Testing – Simulating an attacker that has established access to the internal network. This could be from an already compromised system, malicious insider, or other avenue.