Network Penetration Testing

Service Summary

Internal Network Penetration Testing

SeKurd performs internal infrastructure penetration testing from an 'unauthenticated internal' perspective to identify vulnerabilities and misconfigurations that could compromise the entire internal network.  Our approach targets achieving the highest access levels, such as domain or enterprise administrator, using no prior knowledge or credentials. We simulate real-world attacks by exploiting vulnerabilities and chaining attack vectors to gain elevated privileges. 

External Network Penetration Testing 

SeKurd conducts external infrastructure penetration testing from an 'anonymous' user perspective via the Internet. Our methodology follows industry security standards, encompassing over 30,000 security test cases.  We combine vulnerability scanning with manual penetration testing to thoroughly exploit network-layer vulnerabilities. By employing a range of tools and techniques, we ensure comprehensive coverage and accuracy. We collaborate closely with you to schedule testing, minimizing any impact on your environment’s availability. 

Our Services
Network Penetration Testing Methodology
Reconnaissance

Initial reconnaissance involves identifying active hosts and services across each public IP range, which helps in creating a comprehensive target list. 

Target Planning

This step involves searching for sensitive information that should not be publicly accessible, such as internal communications or potentially harmful data.

Vulnerability Enumeration

Vulnerabilities are enumerated to identify potential exploits for each targeted host, with the goal of confirming the validity of these vulnerabilities. 

Attack Planning

Utilizing the information gathered, the methods, tools, and approaches are selected to pursue services likely to present opportunity to gain access.

Exploit Execution

Tests are conducted to establish command and control, aiming for persistence, across vulnerable hosts, applications, networks, and services.

Reporting 

Includes an executive summary that clearly outlines the test's purpose, along with the tactics and techniques used to gain access to the system. 

© 2024 Sekurd All Rights Reserved