Infrastructure Testing
Identify your Infrastructure vulnerabilities and get them remediated. Malicious agents (Hackers) will attempt to infiltrate your network using these vulnerabilities. TravelEx were compromised using this method with dire consequences.
Your company's Infrastructure are classed into three categories:
- External Infrastructure.
- Internal Infrastructure.
- Wireless Infrastructure.
External Infrastructure
Your services are exposed to the internet, where various malicious actors can compromise your assets and internal networks. A External Infrastructure would focus on identifying the vulnerabilities and attack surfaces this infrastructure opened to an attacker. Are the services provided the only services open to the internet? Are there any vulnerable servers or services exposed to the Internet? We will identify these services and Software so you can patch them and remove this Vulnerability. We will identify any services that are exposed to the internet and you can remove this potential attack surface.
Internal Infrastructure
This is the Infrastructure that is internal facing and not exposed on the Internal. While not exposed to the internet, the attack surface is generally much larger. If an attacker / Malware was to get into the infrastructure the entire network could be compromised. There have been multiple instances of this; Mersk, NHS and TravelEx to name a few. In all cases the Damage and recovery amounts to millions of pounds. An Internal Infrastructure scan could have minimised the damage if not removed the initial attack surface.
Wireless Infrastructure
Is the company's WIFI Infrastructure exposed with weak Security and Encryption Protocols? Are your passwords easily cracked? Are there any weak rouge wireless networks attached to your network?
An attacker can compromise the Wireless network and gain access to you internal Infrastructure. The attacker would have free reign to access and attack your internal resources.
Contact Us to find out what we can do for you to protect your Infrastructure assets.
Duration:
Typically 1-3 days of testing.
Expected Outcome:
Detailed Report with findings of the test. Find vulnerable services and misconfiguration.
- Log in to post comments