Herjavec Group’s Technical Security Assessment Services test key aspects of a customer’s environment for flaws that could be taken advantage of. The objective is to build strategies that help secure and protect the environment.

Herjavec Group first performs a Vulnerability Assessment against the identified infrastructure to highlight vulnerabilities that an attacker might use to compromise the integrity of the systems in play. Herjavec Group then performs various Penetration Tests in order to better understand and improve upon the organization’s present security posture.

Network Penetration Testing is usually conducted in one of two possible scenarios:

Penetration Testing - External

Externally from the Internet
facing the customer network

Penetration Testing - Internal

Internally within
the customer network

Whether internal or external, Network Penetration Testing is executed in the following phases, with the goal of exploiting discovered vulnerabilities:

1. intelligence gathering

In this phase we gain an understanding of the organization and its Internet footprint as well as any digital asset information.

  • Social Media (Twitter, Facebook, blogs)
  • Search Engine results (Google hacking, username/email harvesting, employee info)
  • Domains owned and registered by the company (mail, web, ftp and other server identification)
  • Company website (services/skills used by the company, partnerships, services provided)

2. network and application Reconnaissance

Reconnaissance is conducted next to discover all live hosts and services running within the organization’s network range.

  • Port scanning (standard and non-standard ports are probed)
  • IP scanning (discovering hosts and verifying host status)
  • DNS Lookup
  • Service fingerprinting (banner grabs, response analysis, known port lookup)
  • Service enumeration (pull relevant information from open services)
  • Operating System identification

3. Vulnerability Discovery and Analysis

The Vulnerability Discovery phase is an interactive procedure with the customer network to discover any vulnerabilities that exist on the hosts found in the previous phases.

  • Service Scanning
  • Vulnerability Scanning (typically conducted with third party tools)
  • Manual Checks
    • Based on discovered hosts and services information as well as manually researched vulnerabilities

4. Vulnerability Exploit and Privilege Escalation

In this phase we attempt to exploit the vulnerabilities discovered in the previous phases in order to gain unauthorized access to the host.

  • Vulnerability exploitation (typically remote but not limited to):
    • Use of known exploitation tools
    • Use of custom created scripts or modified third-party scripts
  • Escalation from low level accounts (horizontal or vertical)
  • Account hash dumping (password cracking attempts can be made, hashes can be passed)
  • Shell code injection (in vulnerable applications)

To facilitate the successful transfer of knowledge following a Network Penetration Testing engagement, Herjavec Group will document and present our findings. The output to your team will include:

  • An executive summary
  • A detailed technical report with recommended action plan
  • An onsite final presentation

Download the Service Brief

I subscribe to Herjavec Group News which includes Threat Advisories, Thought Leadership and information about products, services and events that may be of interest.