Internal Penetration Testing


Internal Network Penetration Testing

An internal network penetration test is performed to determine what an attacker could accomplish with initial access to a network. An internal network penetration test may reflect insider threats, such as employees performing malicious actions intentionally or unintentionally.

Our Methodology

The Shift Security Consulting Internal Penetration Testing Standard, which consists of 9 guidelines, provides the foundation for all testing.

Planning.

Customer goals are gathered and rules of engagement are obtained.

Recon.

Perform enumeration and scanning to identify access points.

Footprinting.

Collecting information about network services, DNS records, route paths…

Mapping.

Identifying weak points and entry points from information gathered.
.

Attack.

Planning attack scenario. Writing exploits. Exploiting identified assets.

Recon.

Perform additional enumeration and scanning to identify access points.

Post-Exploit.

Collection of vulnerabilities information of vulnerable assets. Data exfiltration.

Report.

Document found vulnerabilities and exploits, remediation.
.

Contact Us

See How We Can Secure Your Assets

Let’s discuss how Shift Security can solve your cybersecurity needs.  Give us a call, send us an electronic mail, or fill out the contact form below.

Electronic Mail: [email protected]