default
+

Thank you for contacting us.


One of our expert consultants will review your inquiry.

+

Thank You


We hope you find this resource helpful.
If you have any questions, don't hesitate to contact us.

+

Thank you for contacting us.


One of our expert consultants will contact you within 48 hours.

+

Almost There!

Please fill out the form to complete your
whitepaper download

captcha

+

Almost There!

Please fill out the form to complete your
brochure download

captcha

penetration testing services icon

Penetration Testing

Penetration Testing or “ethical hacking” is a service that evaluates the security of your digital assets through a simulated cyber-attack. We have experience working with the latest tools and technologies, and leverage them to bypass the security of corporate networks protected by even the most sophisticated security controls.

Find weaknesses others overlook.

Our Penetration Testing methodology is aligned to industry standards and is compliant with various regulatory requirements including PCI DSS 11.3. The primary objective of this type of testing is to uncover vulnerabilities residing in IT systems, applications or network components and attempt to exploit them in order to obtain access to sensitive information or functionality.

Packetlabs consultants think outside of the box, find weaknesses others overlook, and continuously learn new ways to evade controls in modern networks. During our engagements, we take the time to understand each of the in-scope components and their role in the overall system tested. Based on this, we custom tailor our approach to each environment we assess.

Looking to assess your organization instead of a particular system component? Review our objective-based penetration testing solution for more details.

Background

Within each phase of our methodology, the following issue types will be examined:

network security

NETWORK SECURITY

os third party patching

OS AND THIRD-PARTY PATCHING

cryptography

Cryptography

client side protection

CLIENT-SIDE PROTECTION

authentication and authorization

Authentication

web application security

WEB APPLICATION SECURITY

system configuration

SYSTEM CONFIGURATION

database security

DATABASE SECURITY

email phishing

E-MAIL PHISHING

What We Deliver

At the conclusion of testing, we assemble a detailed report outlining our findings, coupled with prescriptive recommendations to enhance the security within the environment. Each finding is documented with screenshots, and an attack narrative to illustrate the potential risk. Putting the pieces together, we perform root-cause analysis and provide both tactical and strategic recommendations.

Background

Related Resources

May 10, 2016

PCI COMPLIANCE TESTING METHODOLOGY

Packetlabs’ security testing methodology is based on industry standards and is primarily aligned with NIST SP800-115 to ensure compliance with most regulatory requirements.

DOWNLOAD WHITEPAPER
download_pdf

101000110010101001001110010110010100010100101111001010100000001

Background

Ready for more than a VA scan?®

Contact us for a free, no-obligation quote on our
penetration testing services.