Understanding an environment is the most crucial part of a penetration test. It is the piece of the testing puzzle in which all other pieces hinge. Without a proper understanding of WHAT systems compose a networking system and WHY each system is a crucial part of that environment, a complete understanding of what tests to use is not achieved. This is why we choose to examine all 65,536 (including port 0) TCP and UDP ports of any system on a network rather than just the top 1,024 well-known ports. If even a single port is missed on any system, then the picture of the network's appearance can be radically skewed. Our objective is to understand what assets you have and to see logically why those assets were chosen and how they are used in your environment before a single test is performed.
There are many automated testing tools in both the commercial and open-source markets, and we employ many of these during our testing processes to create a “best-of-breed” testing methodology. However, just because a tool discovers a finding doesn’t always mean that such finding is accurate or is a genuine threat to your network. Every vulnerability found represents a potential exploit of your environment. Either through automated or manual testing procedures, it is researched thoroughly and manually exploited (except exploits that could cause harm or render your network non-responsive) to obtain proof that the exploit should be remediated.
We offer network and web application testing and external or internal vulnerability assessments. Many audit regulations require a penetration test, evidence that vulnerability scanning techniques are being used, what vulnerabilities currently exist on a network, and what remediation strategies are in place. Caesium55 specializes in all of these services. We can also work with you on developing a yearly, quarterly, or monthly testing strategy for your network.
Copyright © 2018 Caesium 55, LLC - All Rights Reserved.
Powered by GoDaddy