A Penetration Test, often called “red teaming” or a “red team exercise” is the practice of simulating as closely as possible the effect that cyberthreats could have on your business. It is a simulation of a real-world attack on targeted assets using the same tools and techniques that modern criminals use. This is done by understanding who your threats are, their capabilities, motivations and targets and “hacking” your systems the way they can.
Red Teaming
Types of Testing
Internal / External Test
An Internal and External Network Penetration Test seeks to identify vulnerabilities in resources accessible on the Client’s internal and external networks
Application Test
Application Penetration Testing is a type of ethical hacking engagement designed to assess the architecture, design and configuration of web applications
Perimeter Test
A Perimeter Penetration Test seeks to identify technical vulnerabilities in host systems in a perimeter, hosted environment, or DMZ
Scenario Based Test
Simulation of a specific threat or threat sources
Advanced Persistent Test
An Extension of a Scenario-Based Test over a prolonged period
Internal Network Penetration Test
An internal network penetration test seeks to identify vulnerabilities in resources accessible on the Client’s private internal networks by mimicking the methods used by real-world attackers. Penetration tests use both automated tools as well as manual investigation to identify exploitable vulnerabilities and leverage privileges to access and move between sensitive and critical Internal resources
- Identify internal vulnerabilities and threats
- Test your controls against those vulnerabilities and threats
- Define cybercriminals motivation, capabilities and targets
- Identify current security breaches on your network
- Satisfy regulatory, insurance and vendor compliance requirements
External Network Penetration Test
An external network penetration test seeks to gain access to sensitive data and systems in publicly accessible Internet resources by mimicking the methods used by real-world attackers. Penetration tests use both automated tools as well as manual investigation to identify any exploitable vulnerabilities and leverage privileges to access sensitive and critical Internal resources.
- Identify external vulnerabilities and threats
- Test your controls against those vulnerabilities and threats
- Define cybercriminals motivation, capabilities and targets
- Identify current exploits and target paths
- Satisfy regulatory, insurance and vendor compliance requirements
Application Penetration Test
Application Penetration Testing is a type of ethical hacking engagement designed to assess the architecture, design and configuration of web applications. Testing is conducted to identify cybersecurity risks that could lead to unauthorized access, misconfigurations, and/or data exposure.
Application Penetration Testing specifically targets Web Applications in a client’s environment. HarborShield Security offers this testing in two different ways:
- One Time test performed annually
– or –
- Proactive continuous testing throughout a specific time period
During these tests we will uncover deficiencies, misconfigurations and vulnerabilities in the web application environment. This process includes a remediation path and technology road mapping.
Scenario Based Penetration Test
A scenario-based penetration test is a customized red team, real world attack that tests against specific processes, tools, policy or regulatory commitment. During the test, our analyst will utilize current threat actor tactics against specified internal and external corporate defenses. The outcome of this test will allow your organization to remediate and document against real-time threats.
- Scenario-based testing is a specialized form of red-teaming or offensive security
- Designed to benchmark the performance of cyber security controls against specific adversarial tactics and behaviors
- Helps with identifying specific gaps for your internal and external environment(s)
- Tailored remediation based on specific and pointed objectives/results
- Allows documented real-time perspective of current tactics that cybercriminals are using
Results Document Details:
Advanced Persistent Penetration Test
An Advanced Persistent Penetration Test is a key element to an organizations proactive managed security program. This testing allows documentation of continuous progress against current and active security threats in your environment. This form of proactive security allows your organization to not only document threats but mitigate them.
- Develops a cadence for documented security findings
- Allows holistic visibility into all technical components of your environment
- Helps with identifying persistent internal and external threats
- Interactive activities allow your internal IT team to understand offensive tactics
Perimeter Penetration Test
A Perimeter Penetration Test seeks to identify technical vulnerabilities in host systems in a perimeter, hosted environment, or DMZ. An iterative methodology is utilized to identify vulnerabilities beyond automated vulnerability scanners.
HarborShield Security will perform the following:
- Receive target IP address and VHost information
- Perform port scanning and service enumeration
- External Vulnerability Scan (unauthenticated) of Internet accessible systems
- Identify web applications and web assets accessible via the Internet
- Enumerate web specific vulnerabilities and configuration errors
Exploit selected (and approved by client) vulnerabilities to determine additional information useful to an attacker