Infrastructure penetration testing

With your business systems connected to the Internet and the ever-increasing news about companies having their data breached, it’s only a matter of time until your business assets are targeted. To identify existing risks and cyber security-related vulnerabilities, you need to bring in an expert.

Our bespoke approach blends a mixture of technical and social assessments to give businesses a true understanding of their cyber risk.

Approach

TeraByte’s penetration testing service utilises a comprehensive standardised, risk-based approach to manually identifying critical vulnerabilities that exist on all in-scope applications.  Our approach is made up of the following steps:

  • Information Gathering
  • Threat Modelling
  • Vulnerability Analysis
  • Exploitation
  • Privilege Escalation
  • Reporting

Using an industry-standard approach, TeraByte’s comprehensive method of testing involves the use of ‘Open Source Security Testing Methodology Manual‘ (OSSTMM) as well as ‘Passive Reconnaissance, Open Source Intelligence’ (OSINT), Active Reconnaissance (possible use of onsite covert observation etc), vulnerability identification and exploitation and more…

Tools

In order to perform a comprehensive real-world penetration test, TeraByte IT utilises a mixture of commercial and open source tools used by malicious hackers. As penetration testers, we assess systems by simulating a real-world attack and leveraging the many tools at our disposal to effectively carry out that task.

Reporting

We consider the reporting phase to mark the beginning of our relationship. TeraByte IT strives to provide the best possible customer experience and service.

Remediation & Re-testing

Our objective is to help businesses fix vulnerabilities, not just find them. As a result, remediation re-testing is always provided at no additional cost.

Menu