External Network Penetration Testing

CREST Registered External Penetration Testing

Your external network is the border to your most sensitive systems and information. If this can be compromised, an attacker could have access to your whole environment. Worse still, they could take over your whole business or delete all your information. A breach of your network would result in considerable reputation damage.

Triskele Labs External Network Penetration Testing simulates an attack against your external network by the trusted Triskele Labs Penetration Testing Team to identify areas of weakness that could be compromised to gain access to your internal environment through exploiting weakness in Internet facing systems.

Why Triskele Labs?
  • Real-Time Portal To Provide Ongoing Results
  • CREST Registered Penetration Testing Company
  • Daily Start And End Of Day Notices
  • Complimentary Re-Testing For All Engagements

Our methodology is second to none

Fingerprinting

The target systems will be identified, either through discussions with our clients or utilising tools to conduct asset discovery. This will include all subnets and systems. All findings will be confirmed with the client to ensure the full scope is covered.

Enumeration

Once all hosts have been confirmed, port-scanning will be conducted to identify open ports, running services and the Operating System. This will begin to identify potential entry points and the avenues for attack.

Automated Scanning

Vulnerability Scanning utilising automated tools will be conducted to map the network and begin to identify potential vulnerabilities. Upon discovering vulnerabilities, the client IT team will be notified immediately.


Manual Inspection

The Ethical Hacking Team will conduct manual inspection of the identified issues to ensure they exist. This will include probing and further scanning of systems. Where issues are discovered, the Ethical Hacking Team will request approval to exploit identified issues.


Exploitation

Once approved, the Ethical Hacking Team will conduct exploitation of issues to reduce false positives. This will confirm weaknesses in systems and potentially provide the Ethical Hacking Team with unauthorised access to systems. Once exploited, the Ethical Hacking team will request authorisation to access data such as usernames, passwords or data.

Reporting

Utilising the results of testing, Triskele Labs will report on issues identified. False positives are reduced throughout the process. All of our reports are provided to our clients through our secure portal, MyFiles.




We have worked with some of the best companies across the globe

Find out more about some of our amazing work

feature-1

Regional Australia Bank

As one of Australia's leading mutual banks, it is imperative Regional Australia Bank ensures appropriate cybersecurity controls are implemented. When they needed a cybersecurity partner, the team at Regional Australia Bank turned to Triskele Labs to draw on our vast experience and ensure proactive controls are implemented.

Read More

Our Testing Checklist

  • Foorprinting
  • URL filtering
  • Public Information & Information Leakage
  • DNS Analysis & DNS Bruteforcing
  • Port Scanning
  • Web application firewall
  • System Fingerprinting
  • Services Probing
  • Exploit Research
  • Manual Vulnerability Testing and Verification of Identified Vulnerabilities
  • Intrusion Detection/Prevention System Testing
  • Password Service Strength Testing

Reduced Risk

It is critical to identify and resolve the risks to your application and information, before it goes into production and exposes the application to the world.

Protect Data

It is our goal to ensure that your most sensitive systems and data are protected and remain secure. Without Penetration Testing, you may be exposed.

Work With The Best

The Triskele Labs team have worked across Australia, New Zealand, Singapore, China and more. We understand our craft and know what to look for.

Australian Based Team

Unlike others who offshore their teams, all our Penetration Testers are located within our Australian offices and you can chat any time.

Well Scoped Projects

All our engagements are understood and scoped before testing ever commences. This ensures both teams have a mutual understanding.

Dedicated Project Manager

All projects commence with a kick-off to ensure both teams have key contact points and know what is happening at all times.

Keep in Touch

Triskele Labs is built on a partnership approach. We appreciate face to face discussions over a Video Conference and ensure regular touch points with all of our clients. Reach out today to discuss any of your cybersecurity needs.

  • Level 4, 210 Kings Way, South Melbourne VIC 3205 Australia
  • info@triskelelabs.com
  • 130024CYBER
  • www.triskelelabs.com

Customer Review