Internal Network Pentesting

INTERNAL NETWORK PENTESTING

An internal penetration test (or pentest) aims at answering the question: “What could an attacker with access to the internal network, be able to do?”.

It is logical to assume that an attacker could gain physical access to the network, or could obtain remote access using malware. During an internal penetration test, we will analyze the network in an exploratory way, focusing on obtaining highly privileged (administrator, root) rights on the network, the assets and the complete Windows domain (if applicable). Internal applications, databases, ERP systems and management systems will also be tested during this phase. In a real world scenario, this is split between an initial exploratory part and a post-exploratory part.

In the initial exploratory part, our team will perform activities such as:
  • Running exploits on vulnerabilities to gain access to systems;
  • Sniffing network traffic;
  • Accessing servers and assets with sensitive information;
  • Information on shared folders and confidential information;
  • Gaining access to email boxes (of specific employees).

In the post-exploitation part, our team will perform activities such as:
  • Obtaining domain administrator credentials;
  • Cracking passwords of domain users;
  • Elevating privileges on servers, databases and applications;
  • Cleaning up any access, we gave ourselves.

I'd like to know more about Internal Network Testing.

USP

Related Services

CLOUD Pentesting

Pentest services

A Cloud penetration test (or pentest) assesses the strong and weak points in cloud-based systems to improve the overall cloud security level.

Mobile Apps Pentesting

Pentest services

Every mobile application is different. So we start by identifying context-specific threats. That will allow us to maximally tailor the assessment to the application in question.

Web Applications / API's Pentesting

Pentest services

The application(s) will be studied thoroughly and tested for all kinds of design, configuration and programming errors, of course with maximum attention for security weaknesses from the OWASP Top 10.

Wi-Fi Pentesting

Pentest services

Wireless technology remains a weak spot in many infrastructures. A Wi-Fi penetration test, or pentest, will reveal wireless weak points, exploit the vulnerabilities and provide clear advice on how to mitigate the risks to an acceptable level.

Hardware / IoT Pentesting

Pentest services

Hardware, firmware and (cloud dwelling) backends are all targets for attackers and often not very well understood. Secura can test all these aspects, and also apply reverse engineering and firmware hacking techniques to find out which weaknesses exist.

Infrastructure Pentesting

Pentest services

External, internet visible IT systems are attacked daily. It is therefore often required to test these systems periodically or when significant changes are applied.

Industrial Vulnerability Assessment / Pentest

Pentest services

Within industrial environments, cybersecurity testing requires a specialized approach. This is mainly due to the different risks and threat models within Operational Technology (OT).

Why choose Secura | Bureau Veritas

At Secura/Bureau Veritas, we are dedicated to being your trusted partner in cybersecurity. We go beyond quick fixes and isolated services. Our integrated approach makes sure that every aspect of your company or organization is cyber resilient, from your technology to your processes and your people.

Secura is the cybersecurity division of Bureau Veritas, specialized in testing, inspection and certification. Bureau Veritas was founded in 1828, has over 80.000 employees and is active in 140 countries.