NETWORK PENETRATION TESTING
Know your unknowns to assess, quantify the infrastructure security vulnerabilities and prepare a risk mitigation approach meant to reduce attack surface.
What is Network Penetration Testing?
A simulated attack exercise aimed at finding weaknesses in a company’s infrastructure. This exercise is aimed at internal (corporate, production environments) and/or external (internet facing) networks.
Cyphere’s consultant-led Network Penetration Testing to identify software and network security vulnerabilities and explain in relation to the underlying asset’s risk profile. Generally, two types of network penetration testing is carried out, divided into external (internet facing assets) and internal (inside networks of an organisation) assessments. With cloud computing, any assets within the private cloud accessible to staff are considered as an internal network.
Benefits of Network Penetration Testing
Know your unknowns with in-depth assessments
Common Security Vulnerabilities
Logging and monitoring controls are reviewed to identify flaws in event collection, analysis and threat identification.
Network Penetration Testing Services
Our security assessment services cover a broad spectrum of domains such as cloud, wireless, mobile, stealth campaigns, security devices (firewalls, VPNs, WAF, IDS/IPS), phishing, IoT, external & internal networks and solutions.
Internal Penetration Test
A consultant led exercise performed on the internal (or corporate environments) network. This starts with an unauthenticated attacker test case aimed to identify, exploit and infiltrate across the entire network.
External Penetration Test
This exercise is aimed at internet facing assets of your organisation, performed remotely from our labs. External network penetration testing is performed with zero privileges, that is same level access as an internet based user.
Our firewall security assessment service is aimed at checks around configuration and traffic/rulebase.
The device in scope could be any of the perimeter firewalls, cloud based NSGs, small business based all in one firewall, switch or wireless devices.
Secure Hardening Reviews
A secure hardening review ensures no weaknesses are introduced in the security posture of your company keeping exposed services with minimal attack surface.
Default passwords, OS configuration, services, anti-malware controls are assessed in this review.
Active Directory Security Review
Active Directory security is one of the strong pillars against data breaches.
Domain controllers are the heartbeat of your network. Remote compromises could directly impact your business operations, including but not limited to data breach, brand position loss or other reputational and/or legal implications.
Wireless Security Assessment
We simulate various threat scenarios that an attacker may use against your wireless network that could lead to an organisation wide breach.
Assessment test cases include WiFi authentication, encryption, deauth attacks, segregation, access point configuration, signal leakage issues.
IT Health Check
Whether you are a council, NHS trust or a corporate business assessing cyber security first time, Cyphere offers organisation-wide cyber health checks to help you validate your technical security controls across the perimeter firewall, wireless, build reviews, internal and external environments.
Device Security Reviews
Whether it is your device operator, manufacturer or service provider, secure device configuration is an important element in ensuring the security of components responsible for data transport.
Data loss or network intrusions are directly linked to insecure devices within a corporate network.
Network Segregation Reviews
Network segregation process ensures restrictions are in place to avoid unnecessary exposure of systems within particular networks.
Test cases involving segregation checks at user, network, environment level ensure defence in depth approach is followed at all times.
Frequently Asked Questions about Network Penetration Testing
A secure network provides secure environment
Network Penetration Testing Methodology
In order to perform an network pen test, it is important to understand the context of assets in scope for the engagement. Our proven approach to network security assessments is based on more than a decade of experience, industry practices and effective ways to exceed customer expectations.
Cyphere’s pentesting engagement lifecycle methodology is broken down into five phases as demonstrated in the penetration testing methodology diagram.
- Initial Scoping & Objectives Agreement
- Remediation (Optional remediation consultancy to help mitigate risks identified during penetration testing)
Our approach to network pen testing
Recent Blog Entries
Read about the definition of cyber security architecture, it’s meaning, elements, purpose and benefits of usage. Discover how good architectural processes are pillars of strength for data protection.
Read best practices around vulnerability scanning frequency and which factors help you decide how often a scan should be fun.
Discover the most common types of cyber attacks affecting businesses worldwide. It also includes a look at cyber threats and attack vectors.
Discover the basics around SMB protocol, port 445 and 139 and differences. Read about whether SMB is secure and how to protect against dangerous attacks.