The SecureState Profiling Team is well known and highly regarded as experts in Penetration Testing. Our approach follows industry accepted testing methodologies such as PTES and NIST 800-115. By following these methodologies, our clients can accurately replicate the testing SecureState has performed in their own environment to accurately mitigate identified vulnerabilities. The Profiling Team also helps identify strategic “root cause” issues through our Penetration Tests. Our Risk Management Team is uniquely positioned to work closely with the Profiling Team in order to assist clients with mitigating these strategic “root cause” issues.
Phase I – Pre-engagement:
In this phase, SecureState works with the client to establish the rules of engagement as well as the scope and exchange contact information with both parties. SecureState provides a detailed Project Charter which contains information on scope and everything that will be required to conduct the testing. The Project Charter is discussed during the kickoff call prior to the beginning of the engagement.
Phase II – Discovery Analysis / Footprint Creation:
The next step is to create an Internet profile or “footprint” of computer addresses and other information regarding the client’s Internet connected systems, while taking an “unknown presence” and reducing it to a specific range of domain names, IP network ranges and host systems.
Phase III – Service Enumeration:
Specialty tools are used to programmatically “ping”, or map a client’s existing Internet presence. Next, a “service scan” is initiated to identify listening service ports, in order to determine the type of operating systems and applications in use. Detailed configuration and user information is obtained for each system, and the computer addresses acquired during Phases I and II are programmatically scanned.
Phase IV – Application Layer Testing:
A limited manual testing of any web applications encountered is conducted to look for common web application vulnerabilities, such as SQL injection.
Phase V – Exploitation:
All identified vulnerabilities will be assessed as to the likelihood of exploitation, and we actually do exploit the vulnerabilities.
Phase VI – Post Exploitation:
The Post Exploitation Phase includes pillaging, penetrating further into the network, documenting and erasing any remains we might have left behind.
Phase VII – Reporting:
As part of the deliverable, SecureState provides a report which contains a short, graphical summary aimed at senior management, a narrative body which details major findings and a detailed findings section aimed at the technical staff. Additionally, we provide a closing call and high-level executive presentation to summarize the penetration test as well as provide an opportunity to ask questions about the engagement.