Penetration Testing

Penetration Testing
Penetration Testing evaluates the effectiveness of the information security program and identifies weaknesses. Penetration testing is a sanctioned service where we simulate an attacker attempting to circumvent security controls and gain unauthorized access to systems. We will penetrate an organization and attempt to identify weaknesses and attempt to gain access to sensitive systems, intellectual property, and/or key business systems.

Penetration testing is designed to impact the organization in a way to identify systemic weaknesses within the overall information security program. A penetration test’s main purpose is to simulate an attacker and the ability to impact the business’ ability to generate revenue. Penetration tests are great leverage points for the security group to get management exposure and emphasizes the importance towards critical security programs.

We use the Penetration Testing Execution Standard (PTES), a standard that has gained wide adoption in the security community for a methodical way to approach penetration testing. PTES defines a penetration test as the ability to attack an organization as an adversary in order to affect the company’s ability to generate revenue. In addition to using the PTES, we also utilize the NIST SP800-115 framework for security testing.

PTES allows a repeatable and methodical approach when it comes to penetration testing and red teaming exercises. The PTES process flow breaks each phase of a penetration test down in a methodical way of attacking a company but still allow creativity and flexibility as an attacker. We believe that utilizing a methodical approach to penetration testing, the assessments can ensure the highest level of quality with the most skilled attackers.

The pre-engagement interaction phase allows everyone to understand the scope of the engagement, expectations, and understand the reasons for the assessment. The intelligence gathering phase allows us to identify the presence of the organization and perform analysis to understand what the target is. Threat modeling allows us to understand the best method into the organization and what type of threats we will be emulating during our attacks (competitor, state sponsored, targeted attack, monetary gain, etc.).

The Vulnerability Analysis phase allows us to start to identify exposures and what possible avenues there are for attack. The exploitation phase allows us access into an environment and to circumvent security controls.

The post exploitation phase allows us to understand the business and where sensitive data may reside (intellectual property, regulated data, confidential information, etc). Finally, the last phase, reporting, is the most important aspect around a penetration test and allows us to communicate our efforts and findings to the customer.

Our Goal

Our goal is to simulate an attacker and emulate what a real hacker would do; however, the main purpose of an assessment is to make the organization stronger and more resilient to attack. We like to understand the challenges you have as an organization, and work on trying to help assist you in building proactive defensive measures. Our assessments aren’t just focused on what technical flaws your organization has, but more so on what the root cause issues of the flaws identified are and the best way to resolve them.

We work with your team to understand how we performed the assessment including presentations (remote) to walk through all of the findings. Our purpose is for you to get better at handling attacks each year and to defensively become a much stronger company because of our assessments. The services we provide are above and beyond what is considered “industry acceptable” in that we aren’t a company that performs vulnerability scans marketed as a penetration test. Our consultants are skilled with an extensive amount of experience regardless of where you are in your current security program.

Remote Testing

We have the ability to deploy remote devices that can be plugged into any portion of the network and establishes a secure tunnel back to our headquarters. This device allows us to perform penetration testing on the inside without actually sending individuals onsite. This helps on travel expenses as well as burden on the consultants for travel. This is an optional service and can lead to discounted penetration testing services and does not require an actual consultant on site.

Rest assured that continual communication will occur during the entire lifecycle of the assessment and we will have appropriate personnel on the engagement during the assessment. A separate infrastructure is dedicated for your device with reverse SSH connections allowing us to perform the assessment in a secure environment. This system was developed internally by us and we have worked extensively on improving it over the years. This option is highly recommended for remote locations, travel cost reductions, long-term contracts, and more. This device can perform internal penetration testing services, incident response, wireless assessments and much more!


  • External Penetration Testing – Simulating an attacker originating for the external perimeter (Internet).
  • Internal Penetration Testing – Simulating an attacker that has established access to the internal network. This could be from an already compromised system, or malicious insider.
  • Wireless Penetration Testing – An attacker that is attempting to compromise the environment through traditional wireless technologies.
  • Physical Penetration Testing – Simulating a physical break in. We will hop fences, lock pick, social-engineer our way in, and attempt to gain unauthorized physical access.
  • Mobile Penetration Testing – Identify what exposures exist on mobile devices and applications.
  • PCI Penetration Testing – Perform penetration tests that comply with PCI DSS 2.x and PCI 3.x.
  • Application Penetration Testing – Perform attacks against web applications or other applications in order to identify what exposures exist.
  • Customized Red Team Exercises – Perform advanced red team attacks against an organization simulating adversarial type roles.