Penetration Tests are an inch wide and miles deep. The primary goal is to establish persistence within the network and compromise as many high-value targets through active exploitation as quickly as possible, while avoiding detection, and meeting other purpose specific goals identified through a co-operative effort between eVAL consultants and your internal leadership.
The engagement begins with passive information gathering, then quickly progresses to active enumeration to provide a road map for an "entirely covert" or "assumed compromise" offensive attack levied at IT infrastructure, internal staff, and decision makers commonly referred to as a "black-box" or "grey-box" approach, respectively. This methodology closely models legitimate attacks by real-world Threat Actors and Advanced Persistent Threats.
Penetration Testing against internal network assets begins with an assumed network breach. Persistence is granted through client supplied low-privilege user credentials for a dedicated workstation and VPN access. If the client does not provide an internal asset to stage operations, an eVAL provided appliance configured with a reverse VPN gateway will be supplied.
The primary goal of an internal network penetration test is to compromise targets and user accounts while moving laterally through the network. Testing network segregation, access controls, endpoint security, and intrusion prevention systems are key deliverables.
Penetration Testing against external network assets begins with discovering, identifying and exploiting vulnerabilities on public facing services. Testing goals are met when initial unauthorized access to any internal network asset is achieved. Lateral movement is not attempted. Additionally, phishing campaigns may be utilized, if within scope, and no viable service vulnerabilities or device misconfigurations are discovered.
Penetration Testing from both external and internal network perspectives begins with the methodology outlined on the External Network Penetration Testing description, then pivots to the goals outlined on the Internal Network Penetration Testing, above.
The primary goal is to penetrate the application infrastructure and compromise as many sensitive services through active exploitation as quickly as possible, while avoiding detection, and meeting other purpose specific goals identified through a co-operative effort between eVAL consultants and your internal leadership.
The engagement is a covert offensive attack levied at internal web server infrastructure, commonly referred to as a “black-box” approach. This methodology closely models legitimate attacks by real-world Threat Actors and Advanced Persistent Threats. Running services, applications, and associated configurations are all tested exhaustively for remote exploitation capabilities.