Penetration Testing
In today’s complex and Internet-dependent environments, the potential risk of a malicious hacker incident or security breach is growing at an alarming rate. The security of systems and applications remains an ongoing challenge for IT and business leadership. Penetration testing, sometimes referred to as ethical hacking, is designed to simulate an attack on network, system or application resources in a controlled and ethical manner, performed by our experts.
PathMaker Group will first work with our clients to clearly identify the goals and objectives to properly scope the test and reporting requirements. After the engagement has been clearly defined our team will begin the intelligence gathering process against the target environment. Using the information gathered from the previous two steps our team will develop a threat model for the target environment. After we believe we have gathered all necessary information we will begin analyzing the systems for potential vulnerabilities. In many cases we will use top-tier industry tools to ensure the environment is fully evaluated against today’s security threats. This process will identify weaknesses in your network, systems and applications. We will then perform next-step exploitation tests to determine and quantify the extent that a malicious hacker would be able to successfully carry out an attack on your systems. Any exploited systems will be evaluated for potential business value which will be integrated with the final deliverable. Lastly, we will provide an executive report and technical detail reports on our findings, and we will include prioritized recommendations for addressing the weaknesses
Did you know that PCI requires an annual external penetration test by an qualified third party? Were that party!
Below are some examples of typical penetration tests we provide:
-
- External Network Perimeter Penetration Test
-
- PCI External/Internal Penetration Test
-
- NERC CIP External/Internal Penetration Test
-
- War Dialing (remote modem/telephony) Penetration Test
-
- Application Penetration Test
-
- Wireless Site Penetration Test
Note: When required by customers, we can incorporate social engineering, physical trespassing, controlled malware release, and phishing into any of our tests.
PathMaker Group is a licensed private investigations firm in the State of Texas and we require advanced written authorization prior to performing a penetration test against your network or systems.