Penetration Testing and Computer Network Security

What is Penetration Testing?

A Penetration Test, or Pen Test, is the process of actively testing your organization’s security measures by attempting to penetrate network security using a variety of measures. It is, in essence, hacking your organization’s network in order to evaluate and harden the security measures already in place.

Why GDF’s Pen Testing is Different

If your network has never been Pen Tested, or if your security measures are haphazard – perhaps your company is smaller and has grown quickly – chances are a typical Pen Test team could breach your system in under an hour, and many companies Pen Test first and then tell you what is wrong after. This is not the way we handle a Penetration Test at GDF. Instead, we follow a cost saving and very effective Pen Test procedure that we’ve developed after evaluating the thousands of tests we’ve performed.

Harden the Network first, THEN Pen Test It

  1. We start by conducting a thorough interview with your security and IT personnel to find out about your system and its current security posture. Before we even begin Penetration Testing our experts will immediately make suggestions regarding ineffective equipment and technologies, such as poor choices in security software, easily breachable firewalls, weak security procedures, etc.
  2. We work with you to develop a Vulnerability Assessment. This is basically a full evaluation of the current state of your security posture and is typically performed using commercial software packages that scan and search your system for both internal (within your local network) and external (from the internet) security issues, problems in your network set-up, etc. In many cases companies can perform their own Vulnerability Assessment using software tools we gladly recommend, which results in a cost savings for you and in no way compromises the viability of the Pen Test.
  3. Pre-Test Preparation. After we review the Vulnerability Assessment, our team makes specific recommendations regarding all aspects of your security – we want your network as secure as possible BEFORE we do the actual penetration test.
  4. We perform a full Penetration Test using whatever types of attacks or breach techniques are needed to defeat your now upgraded security and gain access to your system.

Post Test Deliverables

After the completion of Penetration Testing we provide a detailed analysis of the methods and techniques used during the test, the results of the various attempts at compromise, as well as detailed documentation on remediation of any security flaws found. GDF simply provides the most thorough and cost effect Penetration Test you can get.

What is tested?

Penetration testing involves the systematic analysis of all the security measures in place. A full test should include some or all of the following areas, with the exact requirements usually being agreed in a formal scoping document prior to commencing (this list is provided courtesy of the OSSTMM):

  • Network Security
  • Network Surveying
  • Port Scanning
  • System Identification
  • Services Identification
  • Vulnerability Research & Verification
  • Application Testing & Code Review
  • Router Testing
  • Firewall Testing
  • Intrusion Detection System Testing
  • Trusted Systems Testing
  • Password Cracking
  • Denial of Service Testing
  • Containment Measures Testing
  • Information Security
  • Document Grinding
  • Competitive Intelligence Scouting
  • Privacy Review
  • Social Engineering
  • Request Testing
  • Privacy Review
  • Infrared Systems Testing
  • Communications Security
  • PBX Testing
  • Voicemail Testing
  • FAX review
  • Modem Testing
  • Physical Security
  • Access Controls Testing
  • Perimeter Review
  • Monitoring Review
  • Guided Suggestion Testing
  • Trust Testing
  • Wireless Security
  • Wireless Networks Testing
  • Cordless Communications Testing
  • Alarm Response Testing
  • Location Review
  • Environment Review