Logo Loading

External Network Penetration Testing

Your external network is the border to your most sensitive systems and information. If this can be compromised, an attacker could have access to your whole environment. Worse still, they could take over your whole business or delete all your information. A breach of your network would result in considerable reputation damage.

Triskele Labs External Network Penetration Testing simulates an attack against your external network by the trusted Triskele Labs Penetration Testing Team to identify areas of weakness that could be compromised to gain access to your internal environment through exploiting weakness in internet facing systems.

Some of the fantastic clients we work with include:

What sets us apart from the others?

  • Re-testing is include in all of our engagements
  • We assign a dedicated Service Delivery Manager
  • Results are provided in real-time via our unique porta
  • Reports are guaranteed within 10 business days
  • Our team is fully CREST-registered
  • Daily start and end-of-day emails including a list of issues
  • You have access to our whole team throughout testing
  • Everyone in our team is Australia-based

What sets us apart from the others?

  • Re-testing is include in all of our engagements
  • We assign a dedicated Service Delivery Manager
  • Results are provided in real-time via our unique porta
  • Reports are guaranteed within 10 business days
  • Our team is fully CREST-registered
  • Daily start and end-of-day emails including a list of issues
  • You have access to our whole team throughout testing
  • Everyone in our team is Australia-based

Our methodology is second to none

The target systems will be identified, either through discussions with our clients or utilising tools to conduct asset discovery. This will include all subnets and systems. All findings will be confirmed with the client to ensure the full scope is covered.
Once all hosts have been confirmed, port-scanning will be conducted to identify open ports, running services and the Operating System. This will begin to identify potential entry points and the avenues for attack.

The Ethical Hacking Team will observe the application at the functional level and analyse its behaviour, including decrypting it if the application has been obfuscated. Extraction of what kind of frameworks have been used will further create the relevant test cases.

The Ethical Hacking Team will conduct manual inspection of the identified issues to ensure they exist. This will include probing and further scanning of systems. Where issues are discovered, the Ethical Hacking Team will request approval to exploit identified issues.

Once approved, the Ethical Hacking Team will conduct exploitation of issues to reduce false positives. This will confirm weaknesses in systems and potentially provide the Ethical Hacking Team with unauthorised access to systems. Once exploited, the Ethical Hacking team will request authorisation to access data such as usernames, passwords or data.

Utilising the results of testing, Triskele Labs will report on issues identified. False positives are reduced throughout the process. All of our reports are provided to our clients through our secure portal, MyFiles.

OUR TESTING CHECKLIST

  • Footprinting
  • URL filtering
  • Public Information & Information Leakage
  • DNS Analysis & DNS Bruteforcing
  • Port Scanning
  • Web application firewall
  • System Fingerprinting
  • Services Probing
  • Exploit Research
  • Manual Vulnerability Testing and Verification of Identified Vulnerabilities
  • Intrusion Detection/Prevention System Testing
  • Password Service Strength Testing

Request More Information

Leave a Reply

Your email address will not be published. Required fields are marked *