NETWORK SECURITY TESTING
A network penetration test provides your organization with a unique birds-eye view of your security system’s effectiveness. Newer companies may not yet have a handle on their network security. Conversely, more mature companies often have large, multi-faceted networks that easily overlooked elements—particularly as more organizations move to cloud-based systems. Both of these scenarios leave the potential for catastrophic breaches.
In either case, you will be made aware of security flaws before attackers can exploit them. With this powerful foresight, business leaders will feel prepared to make informed decisions about their enterprise’s security. In demonstrating your newly hardened security posture, your clients, partners, and investors will feel confident in your ability to protect their assets, as well.
HOW IT WORKS
Performing a network security test detects vulnerabilities, points of entry, poor network configuration, and internal security breaches that can permit unauthorized access to information that belongs to you. By performing this test, we ensure, monitor, and protect your systems under the objective to keep the integrity of both your company’s and client’s data intact.
External Network Assessment
Your perimeter network is attacked every day and even small external vulnerabilities can be damaging. External network penetration testing identifies vulnerabilities on infrastructure devices and servers accessible from the internet. External penetration testing assesses the security posture of the routers, firewalls, Intrusion Detection Systems (IDS) and other security appliances which filter malicious traffic from the internet.
Internal Network Assessment
Rhino’s security engineers approach the local area network as an attacker on the inside. We look for privileged company information and other sensitive asset s. This involves incorporating a variety of tools, uncovering user credentials, and attempting to compromise both virtual and physical machines present in the network environment. The benefit of this engagement is in ensuring a breach of your external network will not result in a breach of your assets.
Wireless Network Pentesting
Wireless (WiFi) networks may be susceptible to a myriad of attacks, depending on the wireless clients, access points, and wireless configurations. New exploitation against WiFi networks are being developed every day, such as the recent KRACK vulnerability which allowed malicious actors to break the encryption protocol between most routers and connected devices. Wifi is a hotly pursued target, as a compromise of the wireless network is generally the fastest means to the internal network. Poor configuration and weak protections could leave your internal information exposed to anyone in range with a laptop or smartphone. As such, Amandata tests the range of the network in addition to the range of potential vulnerabilities. This includes testing for ‘Wireless Bleeding,’ where we identify the distance at which a potential attacker can pick up your wireless signal.
OUR DELIVERABLE
Upon completion of the security test, a detailed report is sent to the client, including the following:
- Executive Summary: Summary of the purpose of this test, as well as as brief explanation of the threats facing the organization from a business perspective.
- Findings: A detailed, technical explanation of the findings of the tests, with steps and proofs of the findings.
- Conclusion & Recommendations: This section provides final recommendations and summary of the issues found in the security test.