External Penetration Testing
External Network Penetration Test
An external penetration test emulates the role of an attacker attempting to gain access to an internal network without internal resources or inside knowledge. A Shift Security engineer attempts to gather sensitive information through open-source intelligence (OSINT), including employee information, historically breached passwords, and more that can be leveraged against external systems to gain internal network access. The engineer also performs scanning and enumeration to identify potential vulnerabilities in hopes of exploitation.
Our Methodology
The Shift Security Consulting External Network Penetration Testing Standard, which consists of 8 guidelines, provides the foundation for all testing.
Planning.
Customer goals are gathered and rules of engagement are obtained.
Recon.
Perform enumeration and scanning to identify access points.
Footprinting.
Collecting information about network services, DNS records, route paths…
Mapping.
Identifying weak points and entry points from information gathered.
Attack.
Planning attack scenario. Writing exploits. Exploiting identified assets.
Recon.
Perform additional enumeration and scanning to identify access points.
Post-Exploit.
Collection of vulnerabilities information of vulnerable assets. Data exfiltration.
Report.
Document found vulnerabilities and exploits, remediation.
Contact Us
See How We Can Secure Your Assets
Let’s discuss how Shift Security can solve your cybersecurity needs. Give us a call, send us an electronic mail, or fill out the contact form below.
Electronic Mail: [email protected]