Network services penetration testing or infrastructure testing is one of the most common types of penetration testing performed. The primary purpose of this penetration testing type is to identify the most exposed vulnerabilities and security weaknesses in the network infrastructure, including servers, firewalls, switches, routers, printers, workstations, and more of an organization before they can be exploited. The network penetration tests should be performed to protect the business from common network-based attacks, including:
- Firewall misconfiguration and firewall bypass
- Router attacks
- Database attacks
- SSH attacks
- IPS or IDS invasion attacks
- DNS level attacks such a zone transfer attacks or switching or Routing based attacks
- Proxy server attacks
- Unnecessary open ports attacks
- Man-in-the-middle attacks
- FTP or SMTP-based attacks
Types of Network Penetration Tests
Internal Penetration Testing
Our internal penetration tests allow you to determine the impact of an attack spreading to your internal networks and to simulate a malicious attacker located inside your perimeter.
Methodologies
Insider threats are on the rise, representing 34% of all cyberattacks. Organizations generally focus most of their efforts on securing their external networks, leaving their internal cybersecurity vulnerable to various threats.
- Local Servers
- Social Engineering
- Wireless Networks
- Access Points
- Firewalls
- Workstations
External penetration Testing
External penetration testing is a type of assessment designed to identify and fix vulnerabilities within publicly accessible network infrastructures by replicating the same techniques used by hackers. Our services allow you to determine the impact of an attack targeting your publicly accessible networks and help prevent the most common type of cyberattacks.
Methodologies
- Authentication bypass
- Weak cryptography
- Vulnerable configurations
- Weak firewall rules
- Authorization bypass
- Improper input validation
Each and every network penetration test is conducted consistently using globally accepted and industry standard frameworks. At a minimum, the underlying framework is based on the Penetration Testing Execution Standard (PTES) but CDL goes beyond the initial framework itself.
Identifies the most easily exposed vulnerabilities and security weaknesses in your organization’s network infrastructure, and attempts to exploit them. This includes servers, firewalls, switches, routers, printers, workstations, and so on.
Network penetration testing can protect an organization from common network-based attacks such as firewall configuration errors, router/switching attacks, evasion of IPS or IDS systems, DNS attacks, SSH attacks, proxy attacks, database attacks, man-in-the-middle attacks and FTP/SMTP attacks.