Internal Network Pentesting

INTERNAL NETWORK PENTESTING

An internal penetration test (or pentest) aims at answering the question: “What could an attacker with access to the internal network, be able to do?”.

It is logical to assume that an attacker could gain physical access to the network, or could obtain remote access using malware. During an internal penetration test, we will analyze the network in an exploratory way, focusing on obtaining highly privileged (administrator, root) rights on the network, the assets and the complete Windows domain (if applicable). Internal applications, databases, ERP systems and management systems will also be tested during this phase. In a real world scenario, this is split between an initial exploratory part and a post-exploratory part.

In the initial exploratory part, our team will perform activities such as:
  • Running exploits on vulnerabilities to gain access to systems;
  • Sniffing network traffic;
  • Accessing servers and assets with sensitive information;
  • Information on shared folders and confidential information;
  • Gaining access to email boxes (of specific employees).

In the post-exploitation part, our team will perform activities such as:
  • Obtaining domain administrator credentials;
  • Cracking passwords of domain users;
  • Elevating privileges on servers, databases and applications;
  • Cleaning up any access, we gave ourselves.

I'd like to know more about Internal Network Testing.

USP

ABOUT SECURA

Secura is a leading cybersecurity expert. Our customers range from government and healthcare to finance and industry worldwide. Secura offers technical services, such as vulnerability assessments, penetration testing and red teaming. We also provide certification for IoT and industrial environments, as well as audits, forensic services and awareness training. Our goal is to raise your cyber resilience.

Secura is a Bureau Veritas company. Bureau Veritas (BV) is a publicly listed company specialized in testing, inspection and certification. BV was founded in 1828, has over 80.000 employees and is active in 140 countries. Secura is the cornerstone of the cybersecurity strategy of Bureau Veritas.

Related Services

CLOUD Pentesting

Article image

A Cloud penetration test (or pentest) assesses the strong and weak points in cloud-based systems to improve the overall cloud security level.

Mobile Apps Pentesting

Article image

Every mobile application is different. So we start by identifying context-specific threats. That will allow us to maximally tailor the assessment to the application in question.

Web Applications / API's Pentesting

Article image

The application(s) will be studied thoroughly and tested for all kinds of design, configuration and programming errors, of course with maximum attention for security weaknesses from the OWASP Top 10.

Wi-Fi Pentesting

Article image

Wireless technology remains a weak spot in many infrastructures. A Wi-Fi penetration test, or pentest, will reveal wireless weak points, exploit the vulnerabilities and provide clear advice on how to mitigate the risks to an acceptable level.

Hardware / IoT Pentesting

Article image

Hardware, firmware and (cloud dwelling) backends are all targets for attackers and often not very well understood. Secura can test all these aspects, and also apply reverse engineering and firmware hacking techniques to find out which weaknesses exist.

Infrastructure Pentesting

Article image

External, internet visible IT systems are attacked daily. It is therefore often required to test these systems periodically or when significant changes are applied.

Industrial Vulnerability Assessment / Pentest

Article image

Within industrial environments, cybersecurity testing requires a specialized approach. This is mainly due to the different risks and threat models within Operational Technology (OT).