Penetration Testing

Home » Services » Security Consulting » Penetration Testing

At Intrinium, we believe a first step to review your network vulnerabilities is a Penetration Test. We offer both internal and external penetration tests which are simulated cyber attacks against your entire network/website/domains to check for exploitable vulnerabilities and potential security risks. For the convenience of our clients, we execute tests either remotely from our headquarters or on-site at your company with one of our trusted consultants. These tests are performed with the intention of being the first phase within a holistic process of vulnerability analysis, prioritization, remediation, and maintenance that is our core commitment to securing your environment.

External Penetration Testing

This test reviews the network environment and the strength of the perimeter defenses against an external vulnerability, as well as the security of websites and external applications. Our threat model utilizes thousands of attacks that are used by opportunistic hackers used to compromise organizations every day.

These attacks include:

  • Searching for publicly available domain registration for useful information
  • Port scanning of network resources
  • Identification of systems and services accessible over the Internet
  • Brute force attempts with weak or default passwords
  • Comprehensive Vulnerability Scanning identifying over 100,000 of the top vulnerabilities
  • Manual exploitation of identified vulnerabilities in external applications
  • Elimination and confirmation of false positives

Internal Penetration Testing

This test will emulate the action of a malicious actor on the internal network. Our penetration testing goes beyond a simple vulnerability assessment by performing manual attacks such as man-in-the-middle attacks. Our threat model utilizes thousands of attacks that are used by opportunistic hackers used to compromise organizations every day.

These attacks include:

  • Port scanning of network resources
  • Identification of systems and services accessible over the Internet or through VPNs
  • Brute force attempts with weak or default passwords
  • Man-in-the-Middle Attacks
  • Comprehensive Vulnerability Scanning identifying over 100,000 of the top vulnerabilities
  • Manual exploitation of identified vulnerabilities in applications
  • Establishing persistence and enumerating the reach of a potential attacker

At the conclusion of any Intrinium Penetration Test, our success will be reflected against project deliverables and validation that meets the following success criteria:

  • Completion of external vulnerability and network penetration testing module
  • Documentation of detailed test findings and remediation recommendations
  • Completion of executive summary testing report
  • Completion of firewall assessment
  • Documentation of firewall assessment findings and remediation recommendations

Tribe of Hackers Summit

Last Thursday, students, professionals, and hobbyists in the InfoSec world gathered for the first-ever Tribe of Hackers Summit in Austin, Texas, at the Capital Factory. Kylie M. headed down to the Lonestar state to represent Intrinium on the floor of the Summit.   The...

The Power of Partnership

IT Security and Compliance Assessments are not cut and dry; the data can often be overwhelming, leaving organizations questioning what the next steps are. This is where security consultants come in: our certified experts can guide you through your report findings,...

The Suite Life of Data Loss Prevention Services

By Samantha Agather, Information Security Analyst - Intrinium The Suite Life of Data Loss Prevention Services One of the worst outcomes of a security incident that materializes risk to a business is data loss, whether it’s an internal resource accidentally sending an...

Hardware as a Service (HaaS): The Pros on the Pros

By Samantha Agather, Information Security Analyst - Intrinium HaaS, is the water cooler in the office, or the vending machine at school.  For a monthly fee, you get to have the benefit of the device without having to purchase it.  You pay a monthly fee to a company,...

Incident Response Solutions

By Samantha Agather, Information Security Analyst– Intrinium Have an incident? We can help. When things go wrong regarding your company’s data, it can be terrifying.  It will leave you wondering, what’s the full extent of the damage done, how did it happen and what’s...

Pin It on Pinterest