Internal Vulnerability Assessment
It is common knowledge that a large number of information security attacks occur from within in the intranet. By allowing CGF Security team to step into your network by any means, we are able to review the network from the inside to determine the security posture of the internal network.This test examines internal IT systems for any weakness that could be used to disrupt the confidentiality, availability or integrity of the network.
Why Should We Perform An Internal Vulnerability Assessment?
Internal Penetration testing allows organizations to test, if an attacker had the equivalent of internal access how they may they may have access to perform unauthorized data disclosure, misuse, alteration or destruction of confidential information, including Non-Public Personal Information
The internal network, (files, servers, workstations, etc.), of the organization is exposed to threats such as external intruders, after breaching perimeter defenses, or malicious insiders attempting to access or damage sensitive information or IT resources. Therefore organizations are encouraged to test the internal network at least as frequently as they do the external perimeter.
Cyber Geek Force’s Internal Penetration Test follows documented security testing methodologies which can include:
Internal Network Scanning
Port Scanning
System Fingerprinting
Services Probing
Exploit Research
Manual Vulnerability Testing and Verification
Manual Configuration Weakness Testing and Verification
Limited Application Layer Testing
Firewall and ACL Testing
Administrator Privileges Escalation Testing
Password Strength Testing
Network Equipment Security Controls Testing
Database Security Controls Testing
Internal Network Scan for Known Trojans
Third-Party/Vendor Security Configuration Testing