The internal IT-infrastructure is the foundation of every company and requires adequate protection.
Scope of the pentest
During this assessment, our ethical hackers are evaluating your internal IT-infrastructure regarding vulnerabilities and misconfigurations.
The test can be conducted on premises or remotely. Our testers require only a VPN connection (remote) or a functioning Ethernet plug (on-premises).
Exemplary test objects:
On average only about 5 percent of company folders are secured sufficiently. ¹
On average, every employee has access to 11 million files. ²
More than a third of all data leaks were a result of insider threats. ³
Penetration test of the internal IT-infrastructure
The pentest approach presented herein includes a security analysis of your internal IT infrastructure from the perspective of an internal attacker. We simulate an attacker with access to the internal network and identify vulnerabilities like oudated software versions, weak access controls or misconfigurations. .
Our tests include an automated vulnerability scan, as well as a manual analysis of all active network services. With your approval found vulnerabilities are actively exploited to demonstrate the real attack potential.
Internal networks are interesting and rewarding targets for attackers, as they are usually less protected than publicly available systems. The test can be conducted on premises or remotely.