There are an almost limitless number of variations of security assessment. If your exact needs aren’t listed here we can create a customized test plan for your organization.
Protecting an organization requires understand of not only what you are protecting but also who your adversaries are. Threat modeling involves the discovery of assets, enumeration of threats, and the potential impact of exploitation. Threat modeling should be done prior to any other testing to ensure alignment between the organizations threats and what is being tested.
The Penetration testing scenario combines a Vulnerability Assessment with exploitation of identified vulnerabilities to verify the validity of the vulnerability and also the effectiveness of any countermeasures in place.
The penetration test can be performed using some or all of the following scenarios:
An end-user with typical account privileges
An outsider with limited knowledge of the network to be tested
An insider with higher than average levels of access privileges
A knowledgeable insider working with outsiders to perpetrate a coordinated internal/external attack
The Vulnerability Assessment consists of an active network scan of target systems looking for known vulnerabilities. Interactive systems are also manually analyzed for common flaws; for example, a web server is manually tested for easily guessed login credentials. Vulnerabilities are not exploited.
The Wi-Fi spectrum of the building is mapped against a provided floor plan. This allows analysis of signal leakage and coverage issues. Other technical problems with channel selection and password strength are also addressed. Limited service interruptions are possible for users connected to the system as some testing methods with momentarily disconnect clients.
Wireless Penetration Test
The ability of an external attacker to gain unauthorized access using the Wi-Fi system of the building is tested. Password strength and other countermeasures are tested. Limited service interruption is possible for users connected to the system as some testing methods with momentarily disconnect clients.
The phishing scenario involves harvesting a list of valid email addresses from external sources and attempting to compromise internal systems through the use of emails, phone calls, or malicious web sites. This is designed to test the security awareness of the end users.
The Spear Phishing scenario involves targeting a subset of users either provided specifically or within a specific set of criteria and harvested from external sources and attempting to compromise internal systems through the use of emails, phone calls, or malicious web sites. This is designed to test the security awareness of specific users.
Whaling involves targeting management or decision makers provided specifically or harvested from external sources and attempting to compromise internal systems through the use of emails, phone calls, or malicious web sites. This is designed to test the security awareness of senior positions within the organization.
The Physical scenario involves testing access to the local facility and physical countermeasures. Social Engineering techniques are employed to gain unauthorized access to sensitive areas or to gain unauthorized access to logical systems. This is designed to test the security awareness of individuals in the facility.
Sensitive Data Leakage
The Sensitive Data Leakage scenario is a passive analysis of private and semiprivate data repositories to find potentially leaked company information. The company will provide a list of file names, search terms or other defining characteristics to search for. Secure Network Management will provide a detailed mitigation and removal plan but cannot guarantee third party repositories will remove information.
The only limit on custom tests are imagination and physics.