Penetration Test

In a Penetration Test, a series of attacks are conducted, both externally and internally within the network, similar to those that a malicious user would perform, in order to examine the extent to which network’s weaknesses are exploitable.

The Penetration Test consists of the following sections:

  • Reconnaissance checks to map the overall network and system landscape by recording active IPs and open ports.
  • Vulnerability Assessment to examine the ways that detected inputs can be exploited.
  • Penetration Test to explore the damages that can result from exploiting system vulnerabilities. The Network Penetration Test process includes External and Internal penetration attempts:
    • External Pen-Test assesses the security of the perimeter of the network. Internet penetration tests are conducted and systems such as internet router, Firewall, VPN server, Web servers, Mail Server, etc. are examined.

    • Internal Pen-Test verifies and assess the intrusions that a malicious user who has gained access to the corporate network might cause. Illegal entry usually occurs through a terminal that has been compromised by malware or via Phishing email.
  • Categorization of identified vulnerabilities based on:
    • ease of exploitation.
    • resources, equipment and time required for remediation.
    • the impact in case of an attack.
  • Recommendations for security improvement and prioritizing based on the significance of vulnerabilities and the effort required for their remediation.
  • Detailed Report of the checks, findings, and risks arising from them, as well as the methods for addressing them.

for the company