External Network Penetration Testing
Network level services exposed to the Internet, if exploited, could allow easy entry to a threat actor within your network.
Network level services exposed to the Internet, if exploited, could allow easy entry to a threat actor within your network.
We assess your external infratructure exposed over the internet. This involves assessing internet based services such as device interfaces, web applications, email, intranet or other services.
Defendza conducts this assessment from a malicious threat actor perspective without any privileges. This exercise provides you an assurance that infrastructure exposed on the internet is free from vulnerabilities.
You must know how your infrastructure looks like on the internet (from outside). In order to do this, you require an external infrastructure assessment to assess your attack surface. This test will asess your security controls including firewalls, IDS, IPS, email, DNS and any additional services.
We take customer communication as seriously as reporting or assessment execution. We engage with customers during all stages, and ensure that customer contacts are up to date in the language they understand. Post engagement, a free debrief is conducted to help the customers understand the weaknesses and prepare a mitigation plan.
The assessment-execution phase is followed by the analysis & reporting. Defendza performs analysis on the testing output, evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels.
The first level of access achieved from the "low-hanging" fruits found in previous phases does not allow full access to the underlying target. An attacker may not perform desired tasks for further activities such as password hashes retrieval, adding privileged users or tasks. Privilege escalation techniques are attempted by exploiting a bug, design flaw or configuration oversight in an operating system, or software/application to gain elevated access. This allows our security experts to perform elevated tasks that are key for lateral movement to infiltrate into the target network.
Using an open-source, commercial, and custom scripts, vulnerabilities that would cause no network or host level impact are targeted for exploitation. The objective here is to find higher-level privileges to achieve the highest possible access on a system. This system is then used as a base for further lateral movement in order to attempt to compromise the entire network, domain, or the agreed target. Based on the scope of the project, this access can be maintained for days to achieve further objectives or considered a completion of the assessment.
The prioritised list of targets is scanned for vulnerabilities. This assessment involves checking both published as well as undocumented vulnerabilities against the target assets. We sift through the scan results for false positives. The manual assessment ensures that only verified vulnerabilities are focused upon.
The first step of reconnaissance activity includes passively identifying the hosts and services visible on the Internet. This includes limited Open Source Intelligence phase. During red teaming or related offensive security projects, this exercise involves extensive information gathering about a customer's people, processes and technology in use. Research based threat intelligence is an integral part of any offensive exercise.
Overall, the aim of this phase aims to harvest as much information as possible about your organisation that would be used for later phases.
Cyber security is a business enabler. We make sure we understand your business and its needs so that we can help you grow your business in the certain knowledge that it’s protected.
Our reports are comprehensive and include all the evidence that supports our findings. We give you a risk rating that considers how likely an attack is as well as the impact it could have. We don’t create panic scenarios. Our mitigation is detailed, covering both strategic and tactical areas to help our clients prepare a remediation plan.
Apart from the range of commercial and open source tools available for specific testing, our team has its own custom scripts for efficient testing. We provide accurate results to make sure our clients completely understand any vulnerabilities we report.
Much of the manufacturing industry has failed to take proactive steps to defend against cyber attacks—which is a notable problem considering the growing threats the industry faces