As a once-off, annually, bi-annually or quarterly service, The BAG team can help your internal Security team with the following Pen Testing capability:
1. External Network: External Network Penetration test is a dedicated hack attempt against the externally (internet) facing infrastructure of an organization. It can be VPN servers, Firewalls, RDP, Proxy servers, Email servers, SSH/FTP servers etc. The purpose of the test is to find security and configuration flaws in externally facing assets, the test will simulate an actual hack coming from an external attacker. The tester will first enumerate the services running on provided IP addresses and then perform automated (scan) and manual testing.
2. Internal Network: The purpose of this test is to find security and network configuration flaws, and missing security patches in organization’s internal LAN. Internal network penetration test is equally important as external network, it helps organisations to find vulnerabilities which an attacker can exploit if they have internal network access (e.g. by compromising an account of internal staff). The tester will first scan the network with standard tools and then perform manual testing.
3. Web Application and API: Web Application/API penetration testing is a dedicated hack attempt against Web/API server and data contained on it. The purpose is to find security and logical flaws in the website or API server. The tester will start with fuzzing and perform number of attacks including arbitrary code injection to find flaws in the website/API server.
4. Mobile Applications: The mobile application testing is about finding security vulnerabilities in Android/iOS applications and the back-end API server. The purpose is to test how mobile application stores and handles data locally on mobile device and how it interacts with the API server. The tester will test the application itself and intercept the communication between mobile application and API server and perform number of attacks, in the latter case the target is the API server.
5. Social Engineering:
i. Electronic Social Engineering (Phishing): Phishing is an attempt to obtain sensitive information such as usernames, passwords by disguising oneself as a trustworthy entity in an electronic communication. The purpose of this test is to see how the internal staff and anti-phishing mechanisms (if in-place) responds to the malicious emails.
ii. Physical Social Engineering: The purpose is to test physical security of an organisation. The tester will use different techniques to physically enter the premises and install backdoor tools in the internal network which will remotely communicate with the tester’s server.
6. Wireless Network: The wireless network penetration test is a dedicated attack on the authentication, encryption, and availability of the Wi-Fi network.
7. SCADA/ICS: The purpose is to test the confidentiality, availability, and integrity of SCADA/ICS network. It is to test the security of control network, the encryption of the communication and to test if the network can be hijacked using internal IT network. The tester will explore the network first, scan it for vulnerabilities and finally perform manual testing.
8. Retesting: The retesting is performed after the remediation process; it is to make sure that all the vulnerabilities have been successfully remediated.