Penetration Testing

service

Penetration Testing

During a penetration test, Comm Zed Cyber will verify cybersecurity vulnerabilities, avoid false positives, and determine true risks to our clients. This service may include, DNS and ARP poisoning, MitM network sniffing, SNMP modification, VLAN hopping, enumeration of unsecure services, vulnerability scanning and exploitation. During this cybersecurity exercise, we work closely with clients’ IT team to help them identify our activities with any detection software that might be in place. The results and success rates are then published in a final cybersecurity report to client for review and next-steps planning.

Network Penetration Testing (Internal and External)

An internal network penetration test starts with the client providing internal access at the lowest privilege level. With this access, Comm Zed Cyber tests cybersecurity scenarios such as an auditor attempting to gain access to the corporate network, a basic employee attempting to gain access to the HR, financial, timekeeping, and/or business critical applications, or an attacker traversing the network from an area requiring lower trust to an area requiring higher trust. An external network penetration test focuses on all systems or assets that are publicly facing and simulates what a real cyber attacker would see if they do not have physical or internal access. This would include all domains, subdomains, IP addresses, web sites, web applications, and VPN access points. This thoroughly tests frameworks and ensures best practices are in place and cyber security procedures are being followed. .

Application Penetration Testing (Internal and External)

If an application requires login credentials, Comm Zed Cyber begins the testing by scanning for vulnerabilities, uncovers sensitive information, and attempts to gain access to the in-scope applications without receiving credentials. This may include user enumeration, bruteforce attempts, a client specific password-cracking list, review of publicly available source code, services/plugins/addons fingerprinting, metadata extraction, and vulnerability scanning and exploitation. After this testing (without credentials) is concluded, Comm Zed Cyber then receives user credentials for each role defined in the in-scope application and a matrix of the functionalities and menus each role should be able to access. Comm Zed Cyber then attempts to gain access to the functionalities and menus for the roles that shouldn’t have access. This may include dynamic code analysis, session hijacking, cross site scripting, URL and SQL injection, Man in the Middle (MitM) network traffic sniffing, and directory traversal. .

Physical Penetration Testing

Comm Zed Cyber tests the protective and detective controls in place to reduce the cybersecurity risk of an unauthorized individual gaining physical entry to any offsite locations. During the testing, we evaluate the effectiveness of any RFID card readers, common locks, security cameras, alarm systems, or on-premise security guards. The goal of this testing is to gain physical access into a building or room that might grant an attacker additional access to the network that would otherwise be inaccessible to the public.

Wireless Penetration Testing

Comm Zed Cyber attempts to gain access to the client’s wireless network via wireless sniffing, password cracking, rogue access points, login page spoofing, and using cybersecurity attacks that exploit wireless encryption weaknesses. During the engagement, we request access to the guest network and perform testing to verify that network traffic cannot traverse from the guest network to the corporate internal network. Coverage of the wireless network availability outside of the premises is mapped and included in the report. When performing the Wireless Network Penetration Test, we use the resulting access to pivot to other areas of the client’s network and report on all vulnerabilities and provide more secure planning and procedures to mitigate threats.

service

Scroll Top

Contact Us

32/7, George Street, England, BA1 2FJ.

Follow Us