WHITEHAT

Penetration Testing Services

SERVICES

What is a penetration test?

A Penetration Test, known as Ethical Hacking, is an authorised attempt to hack an organisation’s IT infrastructure, applications, processes and staff, with the aim of gaining access into its assets. The purpose of this test is to evaluate the security in order to determine vulnerabilities, advising on areas that are susceptible for compromise and recommend solutions to mitigate these areas of risk.

Scope of Services

Web Application Penetration Testing

Identify existing or potential vulnerabilities both at the application layer and infrastructure side in accordance with PTES and OSSTM. All assessments include OWASP source code best practice review, internal review of access privileges, external testing of public facing IPs and servers.
Frequency: 1 per year or at major change

Mobile Application Penetration Testing

Identify existing or potential vulnerabilities for mobile applicable against Android and iOS standards, OWASP source code best practice review, internal review of access privileges, external testing of public facing IPs and servers. Testing of user accounts if applicable for escalation vulnerabilities.
Frequency: 1 per year or at major change

Network Layer Penetration Testing

External perimeter security assessment and audit, subnet analysis, open port scans and attack surface assessment. Firewall configuration review, testing of public facing IP's and infrastructure resiliency ie. servers, cloud storage, AWS configuration, Azure configuration, DDoS prevention, load testing etc.
Frequency: 1 per year or at major change

Physical Security Penetration Testing

Identifying existing or potential access security control vulnerabilities. Attempting to bypass existing security restrictions, including RFID spoofing, lift access manipulation, biometric security and HVAC access security. Infiltration using USB payloads, open workstations or unsecured device docking stations.
Frequency: 1 per year or at major change

Wireless Penetration Testing

Testing configuration of wireless entry points against external attack. Review of internal network controls, segmentation, separation, VPNs, privilege access management, sensitive data etc. WPA2 vulnerabilities, KRACK and others.
Frequency: 1 per year or at major change

Social Engineering Scenario Testing (phishing)

Social engineering testing including simulation calling and emailing of employees to gain access to systems or attempt manipulating financial account information. “Trusted Authority” disguise, employee impersonation (IT Help Desk) testing.
Frequency: 1 per year or at major change

PROCESS

01

Information Gathering

Identify domain names, potential for information theft, firewalls, associated networks, partners and any publicly available information through DNS and search engines.
02

Port Scanning

Identify listening ports on your host to determine what services may be running that could potentially cross-checked for exploits.
03

Enumeration

Extracting information from target systems through listening services, dummy accounts or Wifi, SMTP and NetBios.
04

Vulnerability Scan

Assessing the organisations vulnerability appetite by assessing existing installed software and both the infrastructure and operating system level as well as individual user level for potential for exploits or vulnerabilities.
05

Analysis and Reporting

Data analytics of the results are provided as well as a detailed exploitation report identifying any vulnerabilities, misconfigurations or possible bugs.

WHY CHOOSE WHITEHAT?

COMPREHENSIVE REPORTING

Whitehat offers in-depth executive level reporting which serves as a tool for risk minimisation by management, and a technical document for the internal security team with vulnerabilities listed and prioritised by level of risk. The report also provides access to comprehensive cybersecurity strategies based on Whitehat’s key insights into enterprise security.

Testing Standards

 

  • The Open Web Application Security Project (OWASP)
  • The National Institute of Standards and Technology (NIST)
  • Source Security Testing Methodology Manual (OSSTMM)
  • Penetration Testing and Execution Standard (PTES)
  • Penetration Testing Framework
  • Australian Government Security Policies and Guidelines

Follow-up evaluation

Our post-engagement follow-up is an additional benefit that evaluates the implemented solution or allow clients to engage with us regarding risks and issues specified in our report.

Client-centric

We aim to create a positive experience for our customers. Confidentiality, availability and data integrity are the three essential elements of cyber security.

CONTACT US

TOP