Network penetration test

Network penetration test aims to identify and exploit vulnerabilities in network devices, hosts and other systems. The test simulate the activities of a malicious hacker. In other words the purpose of the test is to reveal vulnerabilities allowing an unauthorized user to steal sensitive data or to take-over corporate systems for malicious purposes.
During the test SoCyber is testing the security of routers, switches, firewalls, IPS/IDS devices, VPNs, servers, anti-virus systems and more.
In addition the network penetration tests which SoCyber provides will reveal the vulnerabilities through both hackers’s and network security professional’s perspective.
When important web and mobile applications are present, web application penetration test and mobile application penetration test could also be useful for the company.

Methodology

  • Layer 2 Attacks
  • VLAN Hopping
  • ARP Cache Poisoning
  • Switch Architecture Weaknesses
  • Layer 3 Attacks
  • IP Redirections
  • Session Hijacking
  • Session Replay
  • Network / OS Layer Attacks
  • Network Hash Passing
  • DHCP and DNS Weaknesses
  • Various OS Weaknesses
  • Advanced Attacks
  • Protocol Fuzzing
  • Cryptographic Weaknesses
  • Buffer Overflow
  • Zero-day

Depending on the scope, the network penetration testing could be separated into two main categories:

External network penetration test

During the test experts are trying to discover security issues from the outside of your network, generally over the public Internet.

Internal network penetration test

Test is performed by placing an expert within your corporate environment and providing him with connection to your internal network in order to look for security issues from the inside. Therefore the internal penetration test will examine resources available to anyone inside the security perimeter.

In terms of knowledge about the application the test can be separated on:

  • Black Box Testing – It requires no knowledge of internal paths, structures, or implementation of the software being tested.
  • Gray Box Testing – In Gray Box testing a tester attempts to find defects and bugs with incomplete information of the software product’s inner code structure or programming rationale.
  • White Box Testing – White Box testing provides the tester with knowledge of the application structure and functionality. The purpose of the white box testing is to test the application from developer’s point of view.

Reporting

Penetration testing report covers the activities, performed during the penetration testing. Therefore the report represents the discovered vulnerabilities in two parts:

Management part

It is intended for the management of the structure and contains:

  • A general description of the security of the systems.
  • The impact that the discovered vulnerabilities might have on the information security.
  • Required security measures to address the problems.

Technical part

After that it provides an overview for the technical department of the structure and contains:

  • Definition and classification of risk levels, used to classify the detected vulnerabilities.
  • Description of the information gathering phase for identifying information systems.
  • Results of scanning and exploitation of detected vulnerabilities, description, impact, criticality, affected asset, proof of concept, vulnerability replication method, and remediation steps.

network security