With your business systems connected to the Internet and the ever-increasing news about companies having their data breached, it’s only a matter of time until your business assets are targeted. To identify existing risks and cyber security-related vulnerabilities, you need to bring in an expert.
Our bespoke approach blends a mixture of technical and social assessments to give businesses a true understanding of their cyber risk.
TeraByte’s penetration testing service utilises a comprehensive standardised, risk-based approach to manually identifying critical vulnerabilities that exist on all in-scope applications. Our approach is made up of the following steps:
- Information Gathering
- Threat Modelling
- Vulnerability Analysis
- Privilege Escalation
Using an industry-standard approach, TeraByte’s comprehensive method of testing involves the use of ‘Open Source Security Testing Methodology Manual‘ (OSSTMM) as well as ‘Passive Reconnaissance, Open Source Intelligence’ (OSINT), Active Reconnaissance (possible use of onsite covert observation etc), vulnerability identification and exploitation and more…
In order to perform a comprehensive real-world penetration test, TeraByte IT utilises a mixture of commercial and open source tools used by malicious hackers. As penetration testers, we assess systems by simulating a real-world attack and leveraging the many tools at our disposal to effectively carry out that task.
We consider the reporting phase to mark the beginning of our relationship. TeraByte IT strives to provide the best possible customer experience and service.
Remediation & Re-testing
Our objective is to help businesses fix vulnerabilities, not just find them. As a result, remediation re-testing is always provided at no additional cost.
Each and every web application penetration test is conducted consistently using industry standard frameworks, in order to ensure a sound and comprehensive penetration test. At a minimum, the underlying framework is based upon OSSTMM but goes beyond the initial framework itself.
The first phase in a physical penetration test is focused upon collecting as much information as possible about the target. Passive reconnaissance, otherwise known as information gathering, is one of the most important steps of a penetration test. This is done through the use of public tools, such as Google and DNS records. As a result, it is usually possible to learn a great deal about the target’s surroundings and environment.
Open Source Intelligence
An important phase in a penetration test focuses upon collecting as much information as possible that is freely available. Open Source Intelligence Gathering can be quite telling about a target. This type of information gathering is done through the use of social networks, job boards, etc. Through thorough analysis, it helps to paint a picture of the target and its primary operations.
Active reconnaissance in a penetration test involves gathering information offline: this type of test starts to interact with the target.
Covert observation is exactly what is sounds like: this includes covert photography of the target up close in an effort to identify physical security controls and monitoring staff as they are coming and going.
Infiltration, Exploitation & Post-Exploitation
During these phases, TeraByte security consultants carry out the plan by exploiting vulnerabilities discovered using information and intelligence captured during the earlier phases of the assessment. Post-exploitation involves penetrating further into the environment and setting up to maintain a persistent backdoor.
Here at TeraByte, we consider the delivery and reporting phase of the test to be the most important piece and we take great care to ensure we’ve communicated the value of our service and findings thoroughly. The deliverables consists of a report that includes several key components including, but not limited to: Executive Summary, Scope, Findings, Evidence, Tools and Methodology.
Findings are communicated via email; however they can be presented in-person or virtually via Skype or Google Hangouts – whichever medium is most conducive for communicating results effectively. During this time, TeraByte consultants will walk through the report, in detail, to ensure all findings and their corresponding description, risk rating, impact, likelihood, evidence and remediation steps are thoroughly understood.
While this typically involves a single meeting, there is no limit to how many may be needed. The key underlying message is that all information is clearly understood and that a roadmap toward remediation / mitigation is crystal clear.
Some of the key components to our physical penetration test deliverable include, but are not limited to:
- Control Framework (ie: OWASP, PCI, PTES, OSSTMM)
- Executive Summary Narrative
- Technical Summary Narrative
- Report Summary Graphs
- Summary of Findings
- Findings (Description, Business Impact, Recommendation, Evidence, References, CVSS, Risk Rating Calculation)
- Methodology and Approach
- Risk Rating Factors
Frequently Asked Questions
Why should should I have penetration tests?
Penetration tests simulate attacks from the perspective of a malicious attacker, such as a hacker. The objective of the penetration test is to simulate a similar cyber security attack and attempt to uncover security vulnerabilities that might otherwise be discovered by hackers. In doing so, you would gain valuable insight into the security posture of the business. This allows you to fix the holes before hackers are able cause serious damage by exploiting them.
How long does it take to conduct a physical penetration test?
The overall time depends on the size and complexity of the scoped testing parameters. That said, the majority of testing takes around one to two weeks from start to finish.
How much does an physical penetration test cost?
This is one of the most asked questions, and it all depends upon the level of scoping has been performed. Our scoping process is quick and painless. But overall, the number of locations and the objective will ultimately determine its cost. For example, when determining the work effort, we take the following into account: number of target locations, goals, travel from locations, timeframe, etc.