Penetration
Testing

Increased usage of the cloud, internet of things (IoT) and bring your own devices (BYOD) practices coupled with insider and outsider threats resulted over the years in high profile data breaches and attacks that have put companies under extraordinary pressure to make sure the most important assets are protected at all times

A penetration test or pen-test is an in-depth investigation of the IT security posture of specific components of your organization, safely trying to exploit its vulnerabilities.

Penetration tests are performed using manual and automated technologies resulting in a complete scope coverage. Once vulnerabilities have been successfully exploited on a particular system, testers will attempt to use the compromised system to launch further attacks against other internal resources. By adopting this methodology you will understand how using an attacker’s mindset to uncover security weaknesses helps protect company’s assets that matter most.

Uncover vulnerabilities, protect your organization

TAILORED TO YOUR BUSINESS NEEDS

You can focus the scope of the engagement on specific parts as penetration tests comes in different flavours and our service will be tailored to your business needs, as well as your security priorities. We can offer a full scope of penetration test services ranging from penetration testing of specific networks, web and mobile applications to infrastructure and connected devices.

Our team of veteran cyber security professionals have years of experience and in-depth expertise. We invest significant time into researching projects, developing and refining the skills that allow our consultants to help your organization fix critical vulnerabilities before attackers can get their hands on them.

VULNERABILITY ASSESSMENT VS PENETRATION TEST

Redaxer offers both Vulnerability Assessment and Penetration Testing services. Even though neither test replaces the other, there are some fundamental differences. While a Vulnerability Assessment (VA) is traditionally the process of regularly analysing, classifying and categorizing the vulnerabilities of an organization’s networks and

systems, building a list of known flaws and how to fix them, a penetration test goes deeper. A penetration test explores how deep an attacker can go when taking advantage of these flaws and vulnerabilities. It will reveal how newly discovered threats or emerging vulnerabilities may potentially be exploited by attackers.

In addition to regular vulnerability assessments, penetration tests should also be run whenever:

  • New network infrastructure and/or applications are added
  • Significant functionalities, upgrades, patches or modifications are applied to infrastructure, applications, web applications or operative systems
  • New office locations are established

PENETRATION TESTS CAN INCLUDE:

  • Application Security
    Assessment (Web, Desktop and Mobile)
  • Code Review
  • Cloud Security
    Assessment
  • Embedded Devices and IoT
    Security Assessment
  • Network Security
    Assessment
  • SCADA/ICS Security
    Assessment
  • Vulnerability Assessment
  • Wireless Security Assessment
  • Workstation and Server
    Build Review
01
Planning and reconnaissance Test goals are defined and intelligence is gathered.
02
Scanning Scanning tools are used to understand how a target responds to intrusions.
03
Gaining access Web application attacks are staged to uncover a target’s vulnerabilities.
04
Maintaining access APTs are imitated to see if a vulnerability can be used to maintain access.
05
Analysis and WAF configuration Results are used to configure WAF settings before testing is run again.
Penetration testings stages
Still not sure? Review or services comparison matrix or talk to an expert. Do not worry, we will work with you to fully understand your organisation’s needs, goals and desired outcomes. SCHEDULE A
PENETRATION TEST
engage us