[vc_row][vc_column width=”1/3″ offset=”vc_hidden-xs”][vc_widget_sidebar sidebar_id=”hb-custom-sidebar-servicessidebar”][/vc_column][vc_column width=”2/3″][vc_custom_heading text=”Black Box Penetration Testing Services” font_container=”tag:h2|font_size:40px|text_align:left|color:%2302548a|line_height:48px” google_fonts=”font_family:Roboto%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C500%2C500italic%2C700%2C700italic%2C900%2C900italic|font_style:300%20light%20regular%3A300%3Anormal” el_class=”capitalizeTitle”][vc_column_text el_class=”ft18″]As ethical hackers, we emulate an attacker by utilizing similar techniques to perform reconnaissance, identify vulnerabilities, and break into your systems. Unlike an attacker, however, we stop our test before exposing sensitive data or doing harm to your environment. With a Black Box Penetration Test we have unauthenticated access and have little prior knowledge, except the IP Address, domain name, or URL, about the systems in scope.
A Black Box Penetration Test is commonly used as an external penetration test against an organization’s Internet-facing systems, such as the following:[/vc_column_text][vc_column_text el_class=”ft18″ css=”.vc_custom_1574284524381{padding-left: 30px !important;}”]
- Web Servers
- VPN Concentrators
- Firewalls
- Routers
- Proxy Servers
- DNS Servers
- Mail (SMTP Servers)
- Custom Application Servers
- Cloud Services
[/vc_column_text][vc_column_text el_class=”ft18″]We have performed many external Black Box Penetration Tests against the above systems.[/vc_column_text][vc_column_text el_class=”ft18″]We’ve also performed Black Box Penetration Tests against embedded systems and LRUs (Line Replaceable Units) that integrate into larger systems, such as commercial aircraft, weapon systems, or SCADA/ICS systems. A few examples of what we’ve tested:[/vc_column_text][vc_column_text el_class=”ft18″ css=”.vc_custom_1574284574177{padding-left: 30px !important;}”]
- Medical devices
- Commercial aircraft
- Vehicles
- Offshore Drilling Platforms
[/vc_column_text][vc_column_text el_class=”blueText”]
METHODOLOGY[/vc_column_text][vc_column_text el_class=”ft18″]We follow a seven phase methodology designed to maximize our efficiency, minimize risk, and provide complete and accurate results. The overarching seven phases of the methodology are:[/vc_column_text][vc_column_text el_class=”ft18″ css=”.vc_custom_1574284633993{padding-left: 30px !important;}”]
- Planning and Preparation
- Reconnaissance / Discovery
- Vulnerability Enumeration / Analysis
- Initial Exploitation
- Expanding Foothold / Deeper Penetration
- Cleanup
- Report Generation
[/vc_column_text][vc_column_text el_class=”blueText”]
BENEFITS / RETURN ON INVESTMENT (ROI)[/vc_column_text][vc_column_text el_class=”ft18″]We think it is better to have an ethical hacker find the holes into your enterprise than an adversary. Our Black Box Penetration Testing provides details on exploitable vulnerabilities in a prioritized, tangible manner. Our report allows you to better understand what your environment looks like from an attacker perspective. This helps you prioritize efforts to mitigate risk to reduce breach likelihood or damage.
Not only do our Black Box Penetration Testing Services show you what your attack surface looks like to an adversary attacker, but they can be used as a safe way to test your organization’s Incident Response (IR) and digital forensics capabilities. Our Penetration Testing services can be used to tune and test your security controls, such as your IDS, Firewall, Endpoint Security, Router ACLs, etc.
Our Penetration Testing services also help you meet compliance audit requirements such as HIPAA, PCI DSS, and FISMA[/vc_column_text][vc_column_text el_class=”blueText”]DELIVERABLE[/vc_column_text][vc_column_text el_class=”ft18″]The Penetration Test Report includes IP addresses tested, vulnerabilities discovered, steps taken during the assessment, exploitable areas discovered, and prioritized recommendations. For any systems we are able to exploit, an “Attack Narrative” section is used to discuss step-by-step the process we used to gain access, escalate privileges, etc.
The report sample below is used as a quick reference to focus remediation and mitigation efforts on. The findings are ranked by risk rating and include recommendations (rec), reference links for mitigation steps, and tester notes.[/vc_column_text][vc_single_image image=”301″ img_size=”full” alignment=”center”][vc_column_text el_class=”blueText”]INTERESTED IN TESTING YOUR SYSTEMS TO SEE HOW EFFECTIVE YOUR CYBERSECURITY CONTROLS ARE AGAINST AN ATTACKER?[/vc_column_text][vc_column_text el_class=”ft18″]Contact Us or use the form below for more information about our Black Box Penetration Testing Services or to schedule a penetration test.[/vc_column_text][/vc_column][/vc_row]