Comprehensive Penetration Testing

  • Part: 2708436
$69,000.00

Availability

Service
Service will be provided by Dorks Delivered at an agreed time.

A vulnerability scanning security assessment is a type of security test that uses automated tools  to scan an organisation's IT systems and networks to identify potential security vulnerabilities. This assessment is conducted by us who use specialised software tools to scan an organisation's IT infrastructure and identify potential vulnerabilities, such as unpatched  software, open ports, and weak passwords. The goal is to identify potential security risks that  could be exploited by malicious actors and provide recommendations for addressing those  vulnerabilities. By conducting a vulnerability scanning security assessment, organisations can  proactively identify and address security risks, improve their security posture, and minimise the  risk of a successful attack.

We will undertake a comprehensive penetration test of your digital estate. 

OSINT and Phishing:  The assessment will begin with Open-Source Intelligence (OSINT) gathering  exercises. Information collected during this phase may include potential  assets/targets, credentials and information about technologies used by the  organization. We will supplement the OSINT gathering activities with a  facilitated phishing exercise designed to capture credentials.

External Network Penetration Test: An external penetration test will be undertaken to establish the security posture of your public facing assets. The scope of the external penetration test will be  made up of assets discovered during the OSINT phase, and an exhaustive list of  assets provided by you. We will attempt to identify and exploit  vulnerabilities within the internet facing environment. Credentials collected  during OSINT and Phishing will be used to attempt to authenticate with internet  facing systems. The goal of the external penetration test is to identify and  exploit vulnerabilities which could allow us to compromise an asset and  potentially gain access to your internal network. 

Web Application Penetration testing:  Web application penetration testing will be undertaken against your public facing websites and applications. The penetration test will use a black box methodology to assess the assets in scope. The targets for assessment will be  compromised of assets identified during OSINT and assets provided by you. 

Internal Network and Wireless Penetration Testing: We will perform a time-boxed grey box penetration test against your internal network. During this assessment, we will conduct an authenticated vulnerability scan of assets in scope. This will allow us to  provide you with a comprehensive overview of the internal network’s security  posture, and it will also provide efficiencies, allowing the consultants to save a  significant amount of time enumerating the environment.

The penetration test will be undertaken from two perspectives, black box and  assumed breach. The black box perspective will be used to enumerate the  network and its connected devices, and it will also be used to assess  unauthenticated access to services available on the network. The second phase  will be an assumed breach scenario in which you will provide us with an end user device provisioned with your standard operating environment and a low privilege active directory account. We will assume the role of an  internal threat actor/compromised identity and attack the network from this  perspective. During this phase, Infotrust will also perform a black box  penetration test of wireless networks in a single geographical location. 

Cloud Configuration Audit:  We will perform a cloud configuration audit of your Azure environment.