Penetration testing

Penetration testing

Benefits

  • Detect and arrange security threats
  • Meet monitoring necessities and evade penalties
  • Circumvent the rate of network downtime
  • Protect customer loyalty and company image
  • Service disturbances and Security breaches are expensive.

Description

Penetration testing is a proactive approach to discovering exploitable vulnerabilities in your web applications, computer systems, and networks. Our manual testing process goes beyond automated scanning and into complex security exploitation. Gain a thorough understanding of these vulnerabilities and begin to remediate the issues before an attacker is able to interrupt your business operations.

  • Secure your data and systems
  • Prevent business interruption
  • Protect your brand image

Internal Penetration Testing

Internal penetration tests are conducted from within an organisation, over its Local Area Network (LAN) or through WIFI networks. The tests will observe whether it is possible to gain access to privileged company information from systems that are inside the corporate firewalls.

Package Options

Entry Level Package – Bare Essentials

  • 1 x Internal Network Vulnerability Assessment
  • Exploitation of 6 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess Group Policies
  • Basic Man in The Middle (MiTM) attacks

Mid-Level Package – Recommended

  • 3 x Segmented Internal Network Vulnerability Assessments (VLANS etc)
  • The exploitation of 12 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess IDS/IPS Policies
  • Assess Group Policies
  • Advanced Man in The Middle (MiTM) attacks
  • Distributed Denial of Service (DDOS) attacks.
  • Privilege Escalation exploitation – Exploit lower user rights to possibly Admin once access is gained
  • Pivoting exploitation – Try pivot from the hacked device to another device which could be a server
  • WIFI security test only available in Gauteng

External Penetration Testing

This type of testing assesses an organization’s
infrastructure from outside of the perimeter firewall on the Internet. It
assesses the environment from the vantage point of an internet hacker or a
competitor with limited information about the internet-facing environment.

 

Package Options

Entry Level Package – Bare Essentials

  • 1 x Domain name
  • Vulnerability Assessment – Includes organisation foot-printing
  • 1 x Automated Website/Web app Vulnerability assessment
  • Exploitation of 3 x External Facing Servers
  • 10 x User Phishing exercise

Mid-Level Package – Recommended

  • 2 x Domain name
  • 2 x Automated Website/Web app Vulnerability assessment
  • The exploitation of 6 x External Facing Servers
  • 30 x User Phishing exercise
  • Privilege Escalation exploitation – Exploit lower user rights to possibly Admin once access is gained
  • Pivoting exploitation – Try pivot from the hacked device to another device which could be a server
  • Man in The Middle (MiTM) attacks.
  • Distributed Denial of Service (DDOS) attacks.
  • WIFI security test only available in Gauteng

External & Internal Penetration Testing Combo

Package Options

Entry Level Package – Bare Essentials

  • 1 x Domain name
  • Vulnerability Assessment – Includes organisation foot-printing
  • 1 x Automated Website/Web app Vulnerability assessment
  • Exploitation of 3 x External Facing Servers
  • 10 x User Phishing exercise
  • 1 x Internal Network Vulnerability Assessment
  • Exploitation of 6 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess Group Policies
  • Basic Man in The Middle (MiTM) attacks

Mid-Level Package – Recommended

  • 2 x Domain name
  • 2 x Automated Website/Web app Vulnerability assessment
  • The exploitation of 6 x External Facing Servers
  • 30 x User Phishing exercise
  • External Distributed Denial of Service (DDOS) attacks.
  • 3 x Segmented Internal Network Vulnerability Assessments (VLANS etc)
  • Exploitation of 12 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess IDS/IPS Policies
  • Assess Group Policies
  • Advanced Man in The Middle (MiTM) attacks
  • Internal Distributed Denial of Service (DDOS) attacks.
  • Privilege Escalation exploitation – Exploit lower user rights to possibly Admin once access is gained
  • Pivoting exploitation – Try pivot from the hacked device to another device which could be a server
  • WIFI security test only available in Gauteng

Benefits

  • Detect and arrange security threats
  • Meet monitoring necessities and evade penalties
  • Circumvent the rate f netword downtime
  • Protect customer loyalty and company image
  • Service disturbances and Security breaches are expensive

Description

Penetration testing is a proactive approach to discovering exploitable vulnerabilities in your web applications, computer systems, and networks. Our manual testing process goes beyond automated scanning and into complex security exploitation. Gain a thorough understanding of these vulnerabilities and begin to remediate the issues before an attacker is able to interrupt your business operations.

  • Secure your data and systems
  • Prevent business interruption
  • Protect your brand image

Internal Penetration Testing

Internal penetration tests are conducted from within an organisation, over its Local Area Network (LAN) or through WIFI networks. The tests will observe whether it is possible to gain access to privileged company information from systems that are inside the corporate firewalls.

Package Options

Entry Level Package – Bare Essentials

  • 1 x Internal Network Vulnerability Assessment
  • Exploitation of 6 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess Group Policies
  • Basic Man in The Middle (MiTM) attacks

Mid-Level Package – Recommended

  • 3 x Segmented Internal Network Vulnerability Assessments (VLANS etc)
  • Exploitation of 12 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess IDS/IPS Policies
  • Assess Group Policies
  • Advanced Man in The Middle (MiTM) attacks
  • Distributed Denial of Service (DDOS) attacks.
  • Privilege Escalation exploitation – Exploit lower user rights to possibly Admin once access is gained
  • Pivoting exploitation – Try pivot from the hacked device to another device which could be a server
  • WIFI security test only available in Gauteng

External Penetration Testing

This type of testing assesses an organization’s infrastructure from outside of the perimeter firewall on the Internet. It assesses the environment from the vantage point of an internet hacker or a competitor with limited information about the internet facing environment.

Package Options

Entry Level Package – Bare Essentials

  • 1 x Domain name
  • Vulnerability Assessment – Includes organisation foot-printing
  • 1 x Automated Website/Web app Vulnerability assessment
  • Exploitation of 3 x External Facing Servers
  • 10 x User Phishing exercise

Mid-Level Package – Recommended

  • 2 x Domain name
  • 2 x Automated Website/Web app Vulnerability assessment
  • Exploitation of 6 x External Facing Servers
  • 30 x User Phishing exercise
  • Privilege Escalation exploitation – Exploit lower user rights to possibly Admin once access is gained
  • Pivoting exploitation – Try pivot from the hacked device to another device which could be a server
  • Man in The Middle (MiTM) attacks.
  • Distributed Denial of Service (DDOS) attacks.
  • WIFI security test only available in Gauteng

External & Internal Penetration Testing Combo

Package Options

Entry Level Package – Bare Essentials

  • 1 x Domain name
  • Vulnerability Assessment – Includes organisation foot-printing
  • 1 x Automated Website/Web app Vulnerability assessment
  • Exploitation of 3 x External Facing Servers
  • 10 x User Phishing exercise
  • 1 x Internal Network Vulnerability Assessment
  • Exploitation of 6 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess Group Policies
  • Basic Man in The Middle (MiTM) attacks

Mid-Level Package – Recommended

  • 2 x Domain name
  • 2 x Automated Website/Web app Vulnerability assessment
  • Exploitation of 6 x External Facing Servers
  • 30 x User Phishing exercise
  • External Distributed Denial of Service (DDOS) attacks.
  • 3 x Segmented Internal Network Vulnerability Assessments (VLANS etc)
  • Exploitation of 12 x networked resources (servers, workstations, CCTV or printers etc)
  • Assess Firewall Rules
  • Assess IDS/IPS Policies
  • Assess Group Policies
  • Advanced Man in The Middle (MiTM) attacks
  • Internal Distributed Denial of Service (DDOS) attacks.
  • Privilege Escalation exploitation – Exploit lower user rights to possibly Admin once access is gained
  • Pivoting exploitation – Try pivot from the hacked device to another device which could be a server
  • WIFI security test only available in Gauteng