Penetration Testing

At Intrinium, we believe a first step to review your network vulnerabilities is a Penetration Test. We offer both internal and external penetration tests which are simulated cyber attacks against your entire network/website/domains to check for exploitable vulnerabilities and potential security risks. For the convenience of our clients, we execute tests either remotely from our headquarters or on-site at your company with one of our trusted consultants. These tests are performed with the intention of being the first phase within a holistic process of vulnerability analysis, prioritization, remediation, and maintenance that is our core commitment to securing your environment.

External Penetration Testing

This test reviews the network environment and the strength of the perimeter defenses against an external vulnerability, as well as the security of websites and external applications. Our threat model utilizes thousands of attacks that are used by opportunistic hackers used to compromise organizations every day.

These attacks include:

  • Searching for publicly available domain registration for useful information
  • Port scanning of network resources
  • Identification of systems and services accessible over the Internet
  • Brute force attempts with weak or default passwords
  • Comprehensive Vulnerability Scanning identifying over 100,000 of the top vulnerabilities
  • Manual exploitation of identified vulnerabilities in external applications
  • Elimination and confirmation of false positives

Internal Penetration Testing

This test will emulate the action of a malicious actor on the internal network. Our penetration testing goes beyond a simple vulnerability assessment by performing manual attacks such as man-in-the-middle attacks. Our threat model utilizes thousands of attacks that are used by opportunistic hackers used to compromise organizations every day.

These attacks include:

  • Port scanning of network resources
  • Identification of systems and services accessible over the Internet or through VPNs
  • Brute force attempts with weak or default passwords
  • Man-in-the-Middle Attacks
  • Comprehensive Vulnerability Scanning identifying over 100,000 of the top vulnerabilities
  • Manual exploitation of identified vulnerabilities in applications
  • Establishing persistence and enumerating the reach of a potential attacker

At the conclusion of any Intrinium Penetration Test, our success will be reflected against project deliverables and validation that meets the following success criteria:

  • Completion of external vulnerability and network penetration testing module
  • Documentation of detailed test findings and remediation recommendations
  • Completion of executive summary testing report
  • Completion of firewall assessment
  • Documentation of firewall assessment findings and remediation recommendations

We are here to help, contact us today.

Side-Channel: Page Cache Attacks

A side-channel attack is an attack vector through which a threat could glean information from your computer or information system. This could be as simple as reading emissions (see Emissions Security or EMSEC) from your computer to using sophisticated methods of monitoring data being written onto your hard disk and making determinations that way.

California Consumer Policy Act of 2018

Chiara Morrison - Manager, Marketing  2018 has been the year of regulation in the Information Security community from General Data Protection Regulation (GDPR) to the California Consumer Policy Act (CCPA), privacy and security is more important than ever.  2019 is...

Top 18 of 2018

Chiara Morrison - Manager, Marketing  As we wrap up the year, we wanted to share some of our favorite and most trafficked blog posts from our staff writers. We hope you enjoy! https://intrinium.com/smb-relay-attack-tutorial/ https://intrinium.com/events-2/...

FortiGate: The Best Firewall Value

By Sahan Fernando –Director, Managed Security– Intrinium   To maximize the value of your IT spend, Intrinium recommends the simple and effective architectural design of the Fortinet FortiGate. The FortiGate is a next generation firewall (NGFW) that provides high...

Convention Life 2018

By Sahan Fernando –Director, Managed Security– Intrinium   Intrinium believes in employee engagement, enrichment and education. One of my favorite parts of my job is having the ability to attend conferences. It is one of the best ways to stay up to date on relevant...

Events to Look for in a Firewall

By Augusto Melo – Information Security Analyst– Intrinium Regardless of your company size,  Information Security is indispensable, and firewalls are one of the first lines of defense against cyber threats. Fortunately, there are many firewall offerings available in...

NIST and Monitoring

By Sahan Fernando –Director, Managed Security– Intrinium   In a recent blog, Tracy Martin prepared an overview and introduction to the NIST Cybersecurity Framework. This framework is utilized by countless organizations to define their policy and procedures, and for...

Introduction to Vulnerability Management

By James Lee –Information Security Analyst: Team Lead– Intrinium   Introduction to Vulnerability Management  The number of attackers looking for weaknesses in your network environment is growing. These attackers are looking for vulnerabilities, such as outdated...

Pin It on Pinterest