Network Vulnerability Assessment
Network security penetration testing is an essential part of any organizations information security provision. However many security controls you implement for your data, you will never know for sure how effective they are until you actively test them by commissioning security penetration testing (also known as “pen testing”).
In the course of security network penetration testing, our team will probe your organisations computer and network defences, and will then attempt to breach them (with your permission), but without causing the damage that a malicious hacker might cause. The results are explained in a report which also includes recommendations for actions to correct any security loopholes in your systems.
In order to get the best out of the test results, it is important to be aware of the general pattern taken by a penetration test. This also makes it possible to check that your provider is following the correct methodology. The main stages are as follows:
* Foot-printing: Public sources of information are used to gather information about your organisations Internet presence, your servers, web site etc.
* Scanning: Standard tools are used to map your network in a non-intrusive way, determining the number of computers and the network configuration.
* Enumeration: This stage involves attempting active connections to your systems in order to discover information (such as valid account names) that might be exploited by hackers. This stage and the two preceding stages are all legal: the further stages would not be legal without your organisations written permission.
* Gaining access: This is the point where security penetration testing comes into its own, as the test demonstrates whether or not a hacker would be able to gain access to your network.
* Increasing access rights: Having gained access, our team now seeks to increase his/her access rights to the highest level possible, in order to find out whether your network is vulnerable to this kind of “exploit”. A hacker who succeeds in gaining high-level access would be able to wreak considerable damage on the systems.
* Pilfering and theft of data: Moving into an even more active mode, the security penetration testing procedure now covers the attempted theft of information.
* Covering ones tracks: A skilled pen tester will attempt to cover his/her tracks so that the attack remains undetected, in order to demonstrate that this is possible, since a stealth attack is the most dangerous kind.
* Creating a back door: A further refinement is to create a “back door” that will make it easier to access your systems in the future. If the penetration tester finds that this is possible, it will certainly be highlighted in the report as a major weakness of your systems.
It is important to note that the more active phases of testing may disrupt the normal operation of networks, leading to a certain amount of denial of service. For this reason, some organisations prefer the security penetration testing to stop short of those stages. Each pen testing project should be covered by a specific contract setting out exactly what will or will not be attempted. In general, penetration testing should be carried out at regular intervals, and certainly after major changes to the computer network. Used correctly, pen tests can be an indispensable aid to your organisations information security management system.