Penetration Testing - NetGains Technologies

Penetration Testing
Process


Discovery

NetGains will perform thorough searches of the various whois databases, scan tools, etc, to obtain as much information as possible about the target organization. These searches often reveal many more Internet connections than the organizations expect. It is also important to leverage Usenet postings and Social Engineering tactics (if in scope) - many organizations are amazed by how willing their employees are to divulge information that is useful to an attacker.

Enumeration

Once specific domain names, networks and systems have been identified through discovery, the penetration tester will gain as much information as possible about each one. The key difference between discovery and enumeration is the level of intrusiveness. Enumeration involves actively trying to obtain user names, network share information and application version information of running services, limited only by agreed-upon rules of engagement and scope.

Vulnerability Mapping

Vulnerability mapping, one of the most important phases of penetration testing, occurs when security practitioners map the profile of the environment to publicly known, or, in some cases, unknown vulnerabilities. NetGains has a dedicated research department, which is constantly combing the ???blackhat??? community for new and emerging vulnerabilities. The tester's most critical work is performed during the discovery and enumeration phase.

Exploitation

The exploitation phase begins once the target system's vulnerabilities are mapped. The penetration tester will attempt to gain privileged access to a target system by exploiting the identified vulnerabilities. The key to this phase is manual testing. No automated tool can duplicate the testing of an experienced penetration tester who is skilled in the art.

Report

NetGains works with you to develop a report that will provide clear findings and a prioritized matrix of actions, work efforts, and findings. NetGains will provide a preliminary draft report to the technical point of contact for the purposes of review and clarification followed by a final report at the conclusion of testing. The report will include:

  • Executive Summary (jargon free, true executive level summary)
  • Methodologies and scope, and summary of evaluations
  • Research: IRC, USENET, Websites, etc
  • Priority Matrix, indicating remediation priorities, and risk
  • Work Matrix, indicating estimates of work efforts required for remediation
  • Findings and recommendations sufficient for risk management and remediation planning

Recommendations Support

NetGains is available for up to one year to provide additional support for findings and recommendations, or any remediation efforts.

pt>