Knowledge Bank

Back to overview
pen test

Penetration testing | Part 1

Control of your business assets is key and making sure you are protected against the latest threats nonetheless. Ethical hackers of RedSocks Security will help find the weak spots in your IT environment that supports vital components of your company by conducting penetration testing.

 

What is penetration testing?

A penetration test results in an overview of your company’s vulnerabilities and risks in the IT environment. In this day and age, the type of data you have does not matter anymore. Everything you own digitally is worth money to hackers. For instance, when your data becomes encrypted it can be held ransom, a compromised server can be used as botnet or as a landing page for exploits.

 

Why is it so important?

Companies are moving their organizational culture towards data-driven culture. Limitations on data storage and data processing has reached far beyond previous boundaries. Therefore, data is becoming increasingly important in the next generation of decision making in companies. This means that organizations are trusting, and relying on, their data as the importance of it increases.

Traditionally the security of companies consists of building a large wall around the perimeter and use additional measures to check whether there is malicious software installed on the end-systems. As these traditional security measures are still important, they wont offer the protection and visibility that is required for modern threats.

Recently developments in legislation (Dutch law Wbp and the European GDPR) which pushes companies to take control over their infrastructure with a high focus on protecting Personal Identifiable Information (PII). Severe penalties can be handed out in cases of breaches where insufficient security measures have been taken.

A penetration test is often best executed when changes are made to the production environment. This can be changes to infrastructure, application changes or releases.

 

Types of penetration testing

A penetration test comes in different flavors. If you want to test your infrastructure or application from a hacker’s perspective you can select the zero-knowledge test, also called a Black Box test. In this case, the penetration test is conducted without prior knowledge. Information is limited to just the companys name, domain or IP-address. The ethical hackers at RedSocks Security will map begin by mapping all possible entry points to find vulnerabilities to exploit.

On some occasions, you don’twant to spend valuable time conducting a blind test. In this caseinsideraccess is given. This type of penetration test is called a Gray Box test. Instead the focus is set to when they are inside already, this can range from leaked credentials, executing malicious content (un)intently to a disgruntled employee.

A White Box test can best be explained as an open card game. Before the penetration test starts, all information is shared with the ethical hackers – this includes network diagrams, source code, system configuration, etc. Companies that select White Box penetration tests often have strict requirements and need to be as close too 100% certain that no security vulnerabilities have been missed. This often requires multiple meetings with each responsible person to gain in-depth knowledge about the objectives.

A typical penetration test has a duration of 4 to 5 days including a detailed report about the findings, for instance; it could take less than three days to become an Administrator on the network. The duration of engagement always depends on the type of penetration test and scope.

 

Penetration testing or Red Teaming?

Red Teaming is a new type of engagement. It is closely related to penetration testing. However, Red Teaming will go further where penetration testing ends. Penetration testing mainly focusses on the technical aspects and assets of a company, but with Red Teaming company assets are viewed from a technical and non-technical point-of-view. Companies who choose Red Teaming often have experience with penetration testing and have implemented some form of detection and response measures. With Red Teaming, sophisticated threats can be simulated and are used to aid the Blue Team (the defending team) in detecting and responding to attacks.

 

 Penetration services

Penetration testing can be offered in all types and levels of the OSI-layer. The following list is a selection of what RedSocks Security can offer as penetration testing services:

  • External network penetration testing:
  • Internal network penetration testing;
  • Host penetration testing;
  • Wireless network penetration testing;
  • Web application testing;
  • Vulnerability scanning;
  • Social engineering: phishing, mystery guest;
  • Code reviewing / Firewall reviewing.

 

Do you have questions for our pen testers?

Contact info@redsocks.nl 

 

 

Back to overview