We say it often, “Security is a Journey. Not a Destination”. You are never done when it comes to protecting your enterprise environment. Ongoing security assessments are imperative to help identify new/existing vulnerabilities and develop a plan for remediation.

Herjavec Group’s Penetration Testing services help you find the weaknesses in your defense systems before a hacker does through a combination of security expertise and best-of-breed technology. We identify exploitable flaws in your security architecture, detective controls, and preventative controls to help you build strategies that effectively secure and protect your environment from malicious actors.

Network Penetration Testing is usually conducted in one of two possible scenarios:

Penetration Testing - External

Externally from the Internet
facing the customer network

Penetration Testing - Internal

Internally within
the customer network

hg tech design

Why Perform Regular Penetration Testing?

  • Identify unknown flaws or vulnerabilities that can result in a breach or disclosure
  • Discover vulnerabilities that traditional control-based testing methodologies can potentially miss
  • Validate, understand, and prepare for known risks to your organization
  • Update and maintain regulatory or compliance controls
  • Avoid costly downtime as a result of a security breach
  • Develop a roadmap to remediate vulnerabilities and address risk
  • Manage risk on an ongoing basis, as you make changes to your business or network

Whether internal or external, Network Penetration Testing is executed in four phases, with the goal of exploiting discovered vulnerabilities. Performing regular penetration tests will reveal emerging vulnerabilities against newly discovered threats.

pen testing 4 phases

1. intelligence gathering

We gain an understanding of your organization and its Internet footprint as well as any digital asset information.

  • Social Media (Twitter, Facebook, blogs)
  • Search Engine results (Google hacking, username/email harvesting, employee info)
  • Domains owned and registered by the company (mail, web, FTP, and other server identification)
  • Company website (services/skills used by the company, partnerships, services provided)




2. Network and Application Reconnaissance

Reconnaissance is conducted to discover all live hosts and services running within your organization’s network range.

  • Port scanning (standard and non-standard ports are probed)
  • IP scanning (discovering hosts and verifying host status)
  • DNS Lookup
  • Service fingerprinting (banner grabs, response analysis, known port lookup)
  • Service enumeration (pull relevant information from open services)
  • Operating System identification

3. Vulnerability Discovery and Analysis

This phase is an interactive procedure with your network to discover any vulnerabilities that exist on the hosts found in the previous phases.

  • Service Scanning
  • Vulnerability Scanning (typically conducted with third-party tools)
  • Manual Checks
    • Based on discovered hosts and services information as well as manually researched vulnerabilities


4. Vulnerability Exploit and Privilege Escalation

We attempt to exploit vulnerabilities discovered in order to gain unauthorized access to the host.

  • Vulnerability exploitation (typically remote, but not limited to):
    • Use of known exploitation tools
    • Use of custom created scripts or modified third-party scripts
  • Escalation from low-level accounts (horizontal or vertical)
  • Account hash dumping (password cracking attempts can be made, hashes can be passed)
  • Shellcode injection (in vulnerable applications)

To facilitate the successful transfer of knowledge following a Network Penetration Testing engagement, Herjavec Group will document and present our findings. The output to your team will include:

  • An executive summary and on-site briefing
  • A detailed technical report with recommended actions and a roadmap for remediation

Download the Service Brief