Testing Services

Network Penetration Test

A network penetration test is used to appraise a network system’s security posture by mimicking an attack against an organisation’s network internally or externally by a malicious agent attempting to infiltrate the system without authorisation. A network penetration test assesses whether unauthorised access to a system is possible.

The goal of a network penetration test is to establish where the vulnerabilities exist, if any, document them, using exploitative methods to confirm them, apply risk ratings and generate a report with the relevant findings as well as recommendations for remediation.

APPLICATION PENETRATION TEST

An application penetration test is used to appraise an application’s security posture by mimicking an attack that attempts to access the system without authorised access. Identified application vulnerabilities such as Cross-Site Scripting (XSS), SQL Injection, Cross Site Request Forgery (CSRF) and Server Side Includes (SSI) are documented and exploited to assess whether unauthorised access to a system is possible.

The goal of an application penetration test is to establish where the vulnerabilities exist, if any, document them, using exploitative methods to confirm them, apply risk ratings and generate a report with the relevant findings as well as recommendations for remediation.

VULNERABILITY ASSESSMENT

A vulnerability assessment is used to identify weaknesses within a system, which could potentially have adverse impacts on an organisation. This differs from a penetration test due to the fact that any vulnerabilities found are not exploited.

The goal of a vulnerability assessment is to establish where the vulnerabilities exist, if any, document them, apply risk ratings and generate a report with the relevant findings as well as recommendations for remediation.

SOCIAL ENGINEERING

Social engineering specifically deals with employees and their ability to follow company policies and procedures set in place to prevent unauthorised individuals access to information, both physical and digital. A social engineering test uses social engineering techniques to ascertain whether unauthorised access is possible.

The goal of a social engineering test is to establish where the vulnerabilities exist, if any, document them, using social engineering attack methods to confirm them, apply risk ratings and generate a report with the relevant findings as well as recommendations for remediation.

WIRELESS SECURITY TEST

A wireless security test is used to appraise a wireless network’s security posture by mimicking a malicious attack attempting to access the system without authorised access. Hackers, corporate spies and spammers place a high value in wireless networks. A vulnerable wireless network can offer a back door to your core IT infrastructure.

The goal of a wireless network penetration test is to establish where the WiFi implementation vulnerabilities exist, if any, document them, using exploitative methods to confirm them, apply risk ratings and generate a report with the relevant findings as well as recommendations for remediation.

Back to Top