In this stage, we manage expectations and outline the boundaries for the penetration test.
Comprehend the environment: We obtain details on your network topology, IP ranges, number of endpoints, applications that are externally accessible, and compliance requirements.
Define the scope: What is to be tested, access levels, and the rules of engagement for testing: external, wireless, cloud.
Engagement Timelines: We define testing windows to mitigate disruptions for your business operations.
Permissions & legalities: Acquire necessary legal authorizations and agreements.
Objective: Develop a business-aligned testing framework with a clear scope of documentation.
Outcome: Documented framework on business objectives and penetration testing aligned goals.
We collect intelligence about your systems using both passive and active techniques. This helps us map the attack surface and identify potential entry points.
Outcome: A detailed profile of your network environment.
The weak points of an organization include, but are not limited to; out of date software, exposed services, permissive firewalls, or unnecessary services. These weak points along with others can be discovered through both automated scanning and manual analyzing.
Outcome: Removal of weak points and a ranked list of vulnerabilities suggesting influence.
Publicly available exploits and custom exploitation techniques are utilized to assess the impact of successfully exploiting a vulnerability. Focused scenarios like Remote Code Execution (RCE) are also applied.
Outcome: Compromised systems are validated through simulation scenarios suggesting the systems are exploitable by attackers.
Successful exploits include but are not limited to; Privilege Escalation, Dirty COW, Process Hollowing, and Lateral Movement, all of which provide sensitive information and data.
Outcome: Examining the depth of compromise suggests possible impacts to business processes.
The action report delivered alongside breach reports contains but is not limited to;
- Executive summary with a high-level overview stating organizational impacts.
- Technical specifics suggesting weak points alongside risk and exploitation tiers with corresponding screenshots.
- PoCs or proofs of concepts detailing the methods and processes of exploitation.
- Step wise instructions or remediation directives.
Outcome: Documentation suggests that these steps will provide a clear course of action to fortify your organization.
After any remediation is done, a retest is run suggesting that all set vulnerabilities are no longer present.
Outcome: Assurance that your network is now secure and resilient against real-world threats.