Having your entire internal network and all nodes screened
Read here all the networking tech stuff we bring with us when we go testing
With this pentest-plus approach we screen your network like a hacker. We always use two approaches: the black-box approach and the white-box approach.
Black box approach
In this approach, we emulate the behaviour of a cybercriminal and try to get into your system like a (sl)real hacker. Therefore, our ethical hackers use the same tactics and the same kill chain that a hacker uses to, for example, place ransomware on your systems or steal data. We:
- create a plan of attack to try to “break in”
- investigate whether we can increase our rights
- test whether we get noticed by detection systems along the way
- approach it from a cybercriminal’s perspective & from a threat from within
White box approach
With this approach, we do know the internal workings of the network and our testers go deep into the network looking for threats. We:
– subject the active network components, all endpoints (workstations, laptops, tablets, printers, smartphones, and so on) and core components (servers, firewalls, routers, switches and other IP-related applications) to a comprehensive analysis
– test the internal network and connected devices
– search for vulnerabilities, patch status and configuration errors
It is also possible to use a grey box approach where the hacker has a login account with minimal privileges. With this, the ethical hacker tries to increase his rights and to capture data that are not meant for this account.
How do our ethical hackers test?
Based on internationally used standards such as thePenetration Testing Execution Standard (PTES), the ISO 18028, the NIST Cybersecurity framework and the CIS Controls, our ethical hackers test the network infrastructure on at least the following components:
- vulnerabilities and configuration errors at system and application level
- network security
- security management
- network security architecture
- securing communication between networks using security gateways
- securing end points
- security of remote access
The analyses are carried out in 5 phases:
-
Prepare for battle
In this phase, the tester prepares his/her tools for the assessment and we define the framework of the scan to be performed: we determine the out-of-scope assets, the network quality and the time available.
-
Reconaissance
During this most important phase, we (passively) explore, mapping the environment (footprinting) through passive and active enumeration techniques. In this phase, we try to capture the organisation's digital footprint and attack surface, among other things.
-
Validatie en verkenning
Based on the findings from phase 2, we draw up an attack hypothesis and start actively (but constructively) scanning the assets; these include port scans and vulnerability scans along with manual actions. These are our 'soft' attack techniques.
-
Vulnerability scanning en exploit testing
Deep dive! We dig deeper and deeper to actively reveal vulnerabilities, configuration errors and exploits. This is done during both the internal and external black box (without login) scan. During the internal assessment, this is followed by the white box scan. Exploits are of course executed OpSec-safe here.
-
Validatie en rapportage
We resurface and analyse and verify all scan results, found data, vulnerabilities and other data. We also classify and validate the vulnerabilities found and filter out the false positives. All test results are clearly detailed in our report with technical appendix.
Understanding guarantee
There is nothing more dangerous than a report that is misinterpreted or half-implemented. That is why we guarantee that every IT or security officer in your organisation understands the report 100%. So that you are able to take exactly the right actions quickly and adequately.
I want every expensive threat mapped out