Network Penetration Testing

We will perform an attack simulation carried out by our highly trained security consultant in an effort to:

  • Identify security flaws present in the environment
  • Understand the level of risk for your organization
  • Address and suggest mitigation towards identified network security flaws

Upon approval of a project, the MainNerve team will schedule a kick off call to discuss key areas in the rules of engagement such as: methodology and testing techniques, compliance requirements, testing times, and points of contact. The phases listed below discuss key actions that are taken throughout the network penetration testing process.

PLANNING

The planning stage of penetration testing will include regular communication with key points of contact. The following items will be developed during this phase:

  1.  contact information and procedures for all phases;
  2.  types of systems to be tested (e.g. servers, workstations, mobile devices);
  3.  rules of engagement.

DISCOVERY

RMCyberEthic will perform extensive network host discovery, service discovery, and enumeration. This involves information gathering and analysis of information available via the Internet. RMCyberEthic gathers data from organization’s websites, public databases, and social networks with the explicit goal of identifying technical data about the external and/or internal network infrastructure for targeting.

ATTACK

The attack phase is where exploitation of any vulnerability and/or misconfiguration occurs. RMCyberEthic will use ethical hacking techniques to penetrate vulnerable systems. 

REPORTING

At RMCyberEthic, we consider the final phase of the network penetration testing process, reporting, to be the most crucial and instrumental step. During this phase, we take great care to ensure we effectively communicate the value of our service and findings as thoroughly as possible. Our main goal is to ensure that all information from the network pen test is clearly understood and that a roadmap toward remediation/mitigation is well defined. A comprehensive final report detailing all testing information along with an executive summary is securely delivered during this step.

Vulnerability Scanning

Network vulnerability scanning provides companies with the opportunity to identify active IP addresses and scan them using industry-leading tools with the ultimate goal of discovering vulnerabilities in both internal and external networks—affordably. Throughout the vulnerability scanning process comprehensive automated testing will be used to identify as many network related vulnerabilities as possible.