A penetration test determines how well your organization's security policies protect your assets by trying to gain access to your network and information assets in the same way a hacker would. Tests can range from an overview of the security environment to attempted "hacking" with the intent of obtaining investigative information. The Dell SecureWorks penetration test will reveal:
A penetration test subjects a system to real-world attacks selected and conducted by our security staff. The benefit of a penetration test is to identify the extent to which a system can be compromised before an actual determined attack. Our test results will either show you where you to need enhance your security, or let you know that you should sleep better at night. Only a real penetration test can simulate what would happen if a determined hacker were to attack your organization.
Since Dell SecureWorks monitors and protects thousands of networks including many in financial services, healthcare and utilities, we have deep expertise in attacks and exploits used against mission critical assets. In fact, the Dell SecureWorks attack database contains just over one billion attacks that we have prevented. This means that when we conduct a penetration test on your network, we know what attacks are out there, and which are the most commonly used against institutions like yours. Our tests are finely tuned using this unique expertise and this translates into a more focused, cost effect penetration test.
Dell SecureWorks will perform thorough searches of the various whois databases, scan tools, etc, to obtain as much information as possible about the target organization. These searches often reveal many more Internet connections than the organizations expect. It is also important to leverage Usenet postings and Social Engineering tactics (if in scope) - many organizations are amazed by how willing their employees are to divulge information that is useful to an attacker.
Once specific domain names, networks and systems have been identified through discovery, the penetration tester will gain as much information as possible about each one. The key difference between discovery and enumeration is the level of intrusiveness. Enumeration involves actively trying to obtain user names, network share information and application version information of running services, limited only by agreed-upon rules of engagement and scope.
Vulnerability mapping, one of the most important phases of penetration testing, occurs when security practitioners map the profile of the environment to publicly known, or, in some cases, unknown vulnerabilities. Dell SecureWorks has a dedicated research department, which is constantly combing the “blackhat” community for new and emerging vulnerabilities. The tester's most critical work is performed during the discovery and enumeration phase.
The exploitation phase begins once the target system's vulnerabilities are mapped. The penetration tester will attempt to gain privileged access to a target system by exploiting the identified vulnerabilities. The key to this phase is manual testing. No automated tool can duplicate the testing of an experienced penetration tester who is skilled in the art.
Dell SecureWorks works with you to develop a report that will provide clear findings and a prioritized matrix of actions, work efforts, and findings. Dell SecureWorks will provide a preliminary draft report to the technical point of contact for the purposes of review and clarification followed by a final report at the conclusion of testing. The report will include:
Dell SecureWorks is available for up to one year to provide additional support for findings and recommendations, or any remediation efforts.
Information security is an integrated process that reduces information risk to acceptable levels based on an assessment of risks. Because penetration tests only measure the security posture at a point in time, increased testing frequency provides increased assurances that certain control processes that are in place are still functioning.
Social Engineering Testing
Social engineering tests your “human firewall”. This is a method of gaining access to an organization and its assets by tricking key personnel over communications medium such as telephone, email, chat, bulletin boards, etc. from a fraudulent "privileged" position. If your staff has received the training to defend itself, this test will enhance their effectiveness.
Modem Testing (WAR Dialing)
This is a method of enumerating modems and gaining access privileges to the modem-enabled systems of a target organization.