Internal Penetration Testing
Our consultants would review the security posture of your internal network, targeting user workstations and business-critical servers
Our consultants would review the security posture of your internal network, targeting user workstations and business-critical servers
Internal Network assessment is generally performed on a custom scope, for instance on a range of mission critical servers or intranet systems. We review your network for low-hanging fruits, if any, and work our way towards achieving full domain compromise.
Our methodology does not include any automated blind scanning, or any low level attacks i.e. ARP spoofing, or Denial of Service (DoS) attacks. Your business operations are not disrupted – you can trust Defendza to have your back.
An internal penetration testing assessment gives you the best return on your investment and gives you a full understanding of the information security culture within your organisation. Our consultants show you the gaps in your security posture – perhaps around server hardening, patching, network intrusion & detection and segregation policies.
Our report will show you the level of cybersecurity maturity within your organisation’s network team. This will help you decide your security spend in the coming financial year.
We have a dedicated security assessments FAQ section. Read it here.
Below is our methodology designed based on our years of experience delivering this work.
We take customer communication as seriously as reporting or assessment execution. We engage with customers during all stages, and ensure that customer contacts are up to date in the language they understand. Post engagement, a free debrief is conducted to help the customers understand the weaknesses and prepare a mitigation plan.
The assessment-execution phase is followed by the analysis & reporting. Defendza performs analysis on the testing output, evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels.
This phase involves performing password cracking and statistical analysis of the passwords. Conducting password analysis would provide you an indicator of the password culture within the organisation. A list of top used passwords and nature of these passwords, password reuse, privileged accounts and password policies are included during the review. Using our database of leaked passwords and the hardware specialised for password analysis, our consultants will be happy to give you an in-depth review of the password strength based on the hashes supplied.
This is one of the lowest hanging fruits for a threat actor searching for lateral movement. Our real life experience has taught us to live by this 'must have' rule in our methodology. Defendza searches the customer's network for valid credentials that are stored in text-readable formats or any alternative forms of insecure encryption.
The first level of access achieved from the "low-hanging" fruits found in previous phases does not allow full access to the underlying target. An attacker may not perform desired tasks for further activities such as password hashes retrieval, adding privileged users or tasks. Privilege escalation techniques are attempted by exploiting a bug, design flaw or configuration oversight in an operating system, or software/application to gain elevated access. This allows our security experts to perform elevated tasks that are key for lateral movement to infiltrate into the target network.
Using an open-source, commercial, and custom scripts, vulnerabilities that would cause no network or host level impact are targeted for exploitation. The objective here is to find higher-level privileges to achieve the highest possible access on a system. This system is then used as a base for further lateral movement in order to attempt to compromise the entire network, domain, or the agreed target. Based on the scope of the project, this access can be maintained for days to achieve further objectives or considered a completion of the assessment.
The prioritised list of targets is scanned for vulnerabilities. This assessment involves checking both published as well as undocumented vulnerabilities against the target assets. We sift through the scan results for false positives. The manual assessment ensures that only verified vulnerabilities are focused upon.
In this phase, we profile the target, i.e. a network, a server, or a device. This is a non-intrusive exercise and involves activities like analysing the network, understanding the different assets and services, operating systems, programs in use, and anything related to network layout. This is a fundamental step and helps to prepare for the next stage of finalising targets and finding weaknesses.
Defendza as a business, as well as its consultants, are equipped with some of the best-known certifications, accreditations and qualifications globally. These include CREST, GCloud 11 Framework, ISO quality management certifications for the business and our consultants are Ex Check Team Leaders/CCT Infrastructure (2012, 2015) and Web Applications (2009,2012,2015), OSCP (Offensive Security Certified Professional), CREA (Certified Reverse Engineering Analyst), CREA (Certified Binary Auditing Expert), CISSP (Certified Information Security Systems Professional), SANS GSEC & GCIH Silver (Hacker Techniques and Incident Handling), CCNA (Cisco Certified Network Associate), CEH (Certified Ethical Hacker).
Cyber security is a business enabler. We make sure we understand your business and its needs so that we can help you grow your business in the certain knowledge that it’s protected.
Client service underpins everything we do.
Our advisory services follow a 'no surprises' approach offered with clear and concise communication. All the proposals are customised centering on project-based requirements as captured during the scoping discussions.
Much of the manufacturing industry has failed to take proactive steps to defend against cyber attacks—which is a notable problem considering the growing threats the industry faces