Penetration Testing

Benefits

  • Detect and arrange security threats
  • Meet monitoring necessities and evade penalties
  • Circumvent the rate of network downtime
  • Protect customer loyalty and company image
  • Service disturbances and Security breaches are expensive

Benefits

Internal penetration tests are conducted from within an organisation, over its Local Area Network (LAN) or through WIFI networks. The tests will observe whether it is possible to gain access to privileged company information from systems that are inside the corporate firewalls.

Package Options

Entry Level Package – Bare Essentials

  • 1 x Internal Network Vulnerability Assessment
  • Exploitation of 6 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess Group Policies
  • Basic Man in The Middle (MiTM) attacks

Mid-Level Package – Recommended

  • 3 x Segmented Internal Network Vulnerability Assessments (VLANS etc)
  • The exploitation of 12 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess IDS/IPS Policies
  • Assess Group Policies
  • Advanced Man in The Middle (MiTM) attacks
  • Distributed Denial of Service (DDOS) attacks
  • Privilege Escalation exploitation – Exploit lower user rights to possibly Admin once accessis gained
  • Pivoting exploitation – Try pivot from the hacked device to another device which could be aserver
  • WIFI security test only available in Gauteng

External Penetration Testing

This type of testing assesses an organization’s infrastructure from outside of the perimeter firewall on the Internet. It assesses the environment from the vantage point of an internet hacker or a competitor with limited information about the internet-facing environment.

Entry Level Package – Bare Essentials

  • 1 x Domain name
  • Vulnerability Assessment – Includes organisation foot-printing
  • 1 x Automated Website/Web app Vulnerability assessment
  • Exploitation of 3 x External Facing Servers
  • 10 x User Phishing exercise

Mid-Level Package – Recommended

  • 2 x Domain name
  • 2 x Domain name
  • 2 x Automated Website/Web app Vulnerability assessment
  • The exploitation of 6 x External Facing Servers
  • 30 x User Phishing exercise
  • Privilege Escalation exploitation – Exploit lower user rights to possibly Admin once access is gained
  • Pivoting exploitation – Try pivot from the hacked device to another device which could be a server
  • Man in The Middle (MiTM) attacks
  • Distributed Denial of Service (DDOS) attacks
  • WIFI security test only available in Gauteng

External & Internal Penetration Testing Combo

Package Options

Entry Level Package – Bare Essentials

  • 1 x Domain name
  • Vulnerability Assessment – Includes organisation foot-printing
  • 1 x Automated Website/Web app Vulnerability assessment
  • Exploitation of 3 x External Facing Servers
  • 10 x User Phishing exercise
  • 1 x Internal Network Vulnerability Assessment
  • Exploitation of 6 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess Group Policies
  • Basic Man in The Middle (MiTM) attacks

Mid-Level Package – Recommended

  • 2 x Domain name
  • 2 x Domain name
  • The exploitation of 6 x External Facing Servers
  • 30 x User Phishing exercise
  • External Distributed Denial of Service (DDOS) attacks
  • 3 x Segmented Internal Network Vulnerability Assessments (VLANS etc)
  • Exploitation of 12 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess IDS/IPS Policies
  • Assess Group Policies
  • Advanced Man in The Middle (MiTM) attacks
  • Internal Distributed Denial of Service (DDOS) attacks
  • Privilege Escalation exploitation – Exploit lower user rights to possibly Admin once access is gained
  • Pivoting exploitation – Try pivot from the hacked device to another device which could be a server
  • WIFI security test only available in Gauteng