Most companies are not aware of the danger in their network. For most people the Internet connection is enough. But what if someone is watching? how will you discover the attacker and wat to do – when the hacker is in the network. There’s several solutions, but knowing WHAT to do – is actually the most important skill you can protect yourself with.
I can perform security checks of both Wireless and cabled network, testing both performance and securty on clients and servers, webpages, databases etc. It’ll end up in a report with recommendations for how to secure your network.
For getting som knowledge regarding a Penetrations test – more information is available at www.hac5.org, Wikipedia Link and Describing Pentest
During a penetrationtest – there can be the following options are available:
- External Testing
- Internal Testing
- Blind Testing
- Double blind Testing,
- Targeted Testing
Describing the different test procedures:
External penetration tests target the assets of a company that are visible on the internet, e.g., the web application itself, the company website, and email and domain name servers (DNS). The goal is to gain access and extract valuable data.
In an internal test, a tester with access to an application behind its firewall simulates an attack by a malicious insider. This isn’t necessarily simulating a rogue employee. A common starting scenario can be an employee whose credentials were stolen due to a phishing attack.
In a blind test, a tester is only given the name of the enterprise that’s being targeted. This gives security personnel a real-time look into how an actual application assault would take place.
Double Blind Testing:
In a double blind test, security personnel have no prior knowledge of the simulated attack. As in the real world, they won’t have any time to shore up their defenses before an attempted breach.
In this scenario, both the tester and security personnel work together and keep each other appraised of their movements. This is a valuable training exercise that provides a security team with real-time feedback from a hacker’s point of view.
Penetration testing and web application firewalls
Penetration testing and WAFs are exclusive, yet mutually beneficial security measures.*
For many kinds of pen testing (with the exception of blind and double blind tests), the tester is likely to use WAF data, such as logs, to locate and exploit an application’s weak spots.
In turn, WAF administrators can benefit from pen testing data. After a test is completed, WAF configurations can be updated to secure against the weak spots discovered in the test. Finally, pen testing satisfies some of the compliance requirements for security auditing procedures, including PCI DSS and SOC 2. Certain standards, such as PCI-DSS 6.6, can be satisfied only through the use of a certified WAF. Doing so, however, doesn’t make pen testing any less useful due to its aforementioned benefits and ability to improve on WAF configurations
After the tests:
What will happend after the test ?
there will be provided a report with all findings from the Penetration test. Describing the actual danger – and how to resolve these issues as secure as possible, and I can allso implement the different solutions for securing the network, bringing the network up to date.