Security

Certificates

faq

Questions

Depending on the nature of your business, you may require performing penetration tests every six months or once a year. It is recommended to perform them at least every year or whenever a significant change is made.

Keeping data confidential

Be a step ahead of your attackers. You will get an understanding of where you stand against an ever-changing threat landscape. You will get a report that will help you address all the weak points as well as set up a much more efficient system.

Prove your integrity

Give your customers and suppliers a peace of mind, that their information is secure and well protected. You will get a real-world test of your security policies and procedures. That will provide you with an understanding of how well everything is implemented and working on a day-to-day basis.

Be on track with legal and regulatory requirements

These include PCI DSS, FCA, HMG, ISO 27001 and CoCo to name a few. All these standards and regulatory requirements provide good directions on what is required to keep infrastructure secure.

1. Scope definition & pre-engagement interactions

We set the scope of work and exact requirements for the exercise. We agree on the type of test, timeline and limitations that I must take into consideration.

2. Intelligence gathering & threat modelling

Intelligence gathering is an information reconnaissance approach that aims to gather as much information as possible. This information is used as attack vectors when trying to penetrate the targets during the vulnerability assessment and exploitation phases.

3. Vulnerability analysis

This phase aims to discover flaws in networks, systems and/or applications, using active and passive mechanisms, which can include host and service misconfiguration, current patching levels, or insecure application design.

4. Exploitation

With the help of the vulnerability analysis from the previous step, all external and internal-facing systems that are in scope are attacked. This involves a combination of available and custom-made exploits and techniques in order to tamper with improper configurations, bypass security controls, access sensitive information and in general to establish access to the targets in question.

5. Post-exploitation

The purpose of this phase is to determine the value of the compromised targets by trying to elevate privileges and pivot to other systems and networks that are defined within the scope. Importantly, the compromised systems will be cleaned of any scripts and further attacks that have been launched to make sure the systems are not subjected to unnecessary risks as a consequence of my actions.

6. Reporting

All information mentioned in the above steps will be documented. You may ask for a sample report to see how information will be presented. Main things that I concentrate on are remediation steps and short/long term actions that would support the business.

7. Consultation session

Here I am happy to answer all the questions that your team may have or provide a short training that would provide a required knowledge base.

Penetration testing is a form of ethical hacking, where you hire a penetration tester or security specialist to attack your system, application or network. With the attempt to gain unauthorized access or obtain secured information.

A pen tester uses penetration testing automated tools and manual processes to find any vulnerabilities and/or misconfigurations that make a security breach risk.

As a technical exercise, it involves an internal & external analysis of your IT infrastructures and applications as well as testing human elements (social engineering) therefore penetration tests should be considered a fundamental component of your risk management programme.

The aim of penetration testing is twofold:

  • Identify and exploit shortcomings in the confidentiality, integrity and availability of information.
  • Should provide remediation advice and offer guidance on how to reduce the impact of the identified shortcomings being exploited.

The report is split into 2 sections: An Executive Summary and Technical Report.

Executive Summary

High-level, non-technical overview of the overall risk assessment and findings Confirmation of the pen testing plan and methodology An overview of the security risks & business impact of the discovered threats

Technical Report

Description of steps taken during the assessment Detailed report & description and evidence of vulnerabilities identified, including their Common Vulnerability Scoring System (CVSS) and priority for remediation.

Evidence and proof-of-concept information for target exploitation. Detailed steps on how to remediate any vulnerabilities and a guide on how to prevent future cyber treats.

Additional details, such as penetration testing tools used during the assessment, experts involved, checklists etc.