default
+

Thank you for contacting us.


One of our expert consultants will review your inquiry.

+

Thank You


We hope you find this resource helpful.
If you have any questions, don't hesitate to contact us.

+

Thank you for contacting us.


One of our expert consultants will contact you within 48 hours.

+

Almost There!

Please fill out the form to complete your
whitepaper download

captcha

+

Almost There!

Please fill out the form to complete your
brochure download

captcha

penetration testing services icon

Penetration Testing

Penetration Testing or “ethical hacking” is a service that evaluates the security of your digital assets through a simulated cyber-attack.

Find weaknesses others overlook.

At Packetlabs, we work with the latest tools and technologies, and leverage them to bypass the security of corporate networks protected by even the most sophisticated security controls.

Our Penetration Testing methodology is aligned to industry standards and is compliant with various regulatory requirements including PCI DSS 11.3. The primary objective of this type of testing is to uncover vulnerabilities residing in IT systems, applications or network components and attempting to exploit them to obtain access to sensitive information.

Packetlabs consultants think outside of the box to find weaknesses others overlook, and continuously learn new ways to evade controls in modern networks. We take the time to understand each of the in-scope components and their role in the overall system tested to custom tailor our approach to each environment we assess.

Looking for an assessment of your organization instead of an isolated component? Review our objective-based penetration testing solution for more details.

Background

Within each phase of our methodology, the following issue types will be examined:

network security

NETWORK SECURITY

os third party patching

OS AND THIRD-PARTY PATCHING

cryptography

Cryptography

client side protection

CLIENT-SIDE PROTECTION

authentication and authorization

Authentication

web application security

WEB APPLICATION SECURITY

system configuration

SYSTEM CONFIGURATION

database security

DATABASE SECURITY

email phishing

E-MAIL PHISHING

What We Deliver

A detailed report outlining our findings, coupled with prescriptive recommendations to enhance the security within the environment

Each finding is documented with screenshots, and an attack narrative to illustrate the potential risk

A root-cause analysis to provide both tactical and strategic recommendations

Background

Related Resources

May 10, 2016

PCI COMPLIANCE TESTING METHODOLOGY

Packetlabs’ security testing methodology is based on industry standards and is primarily aligned with NIST SP800-115 to ensure compliance with most regulatory requirements.

DOWNLOAD WHITEPAPER
download_pdf

101000110010101001001110010110010100010100101111001010100000001

Background

Ready for more than a VA scan?®

Contact us for a free, no-obligation quote on our
penetration testing services.