What is a Penetration Test?
A Penetration Test (sometimes referred to as a Pen Test or Ethical Hacking) is an unbiased security assessment of your applications and infrastructure. To be completely unbiased, the Penetration Test needs to be performed by someone outside the team who developed it. A penetration test is a type of security assessment that simulates a real-world attack against one or more of your targeted assets. Assets that Penetration Tests can assess include networks, web applications, API's, devices, infrastructure or anything else which may create a vulnerability in your infrastructure.
Why Complete a Penetration Test?
Organisations complete Penetration tests for the following reasons -
- Penetration Tests helps organisations meet regulatory requirements and standards - PCI being the main one in Australia
- Meeting their end clients requirements
- Validating a risk or vulnerability management program’s effectiveness
- Ensuring the protection of their valuable data to ensure no reputational loss to their brand through data breaches
- Hardening and building on their overall security posture
- Benchmarking their individual assets against industry standards
- Independent verification of the security of applications and critical infrastructure
- Building a case for the importance of security by demonstrating the consequences of unaddressed vulnerabilities.
The Australian Federal Government has introduced mandatory data breach notification laws into parliament which have passed the senate in a move which will see the policy enforced by February next year. This ensures it gives organisations enough time to ensure the security posture of their critical applications and infrastructure are hardened before the law takes into effect. This significant change will see organisations need to tighten their own security policies around penetration testing and security policies.
Of course, beyond what has been touched on here, there are many additional reasons for performing a penetration test, but whatever the driver, the test should fundamentally provide the answer to the question of whether the security of a system can be breached.
Types of Penetration Tests
There are three broad types of Penetration Tests -
Black Box Testing – This is where Penetration Testers have no knowledge of how an application works or have been given any insights into its structure
White Box Testing – In this instance, the Penetration Tester has full knowledge of the source code and are able to test the application at that level. Knowing the source code allows testers to design test cases based upon this knowledge
Grey box testing – In this case, Penetration Testers have partial knowledge into the internal structure of the application.
The type of Penetration Test your asset needs will depend on the scope of the project. The most popular form of Penetration Test is white box testing as this allows you to specify what area of the application you would like to have the Penetration Testers focus on. When considering the type of Penetration Test you need, think about why you are doing a Penetration Test and clarify your objectives when scoping the project with us and we will provide you with recommendations how to best achieve your objectives.
Stages Of A Penetration Test
There are three distinct stages of a Penetration Test -
Reconnaissance - Penetration Testers take the time to gather information prior to attack. The information gathered at this stage allows for detailed insights into the systems which in many instances assists in planning the approach to the Penetration Test and will determine the potential attack vectors. Unsurprisingly, this is what an attacker would do so it makes sense to start the Penetration Test the same way. The reconnaissance phase in a Penetration test uses different sources of information publicly available to build detailed insights into the target and not through exploiting vulnerabilities. The information gathered in this phase is then used to commence the next stage of the Penetration Test.
Penetration Testers, like real world attackers, take the time to identify possible entry points that were identified during the reconnaissance phase. They do this to gather as much information as possible and at this stage will actually query the systems being targeted by the Penetration Test. The information collected by the Penetration Tester is systematically harvested whilst individual systems are also identified. The Penetration Testers will also examine systems in their entirety which allows them to evaluate security weaknesses that are not necessarily technical in nature. The information collected at this phase of the Penetration Test can be used to be proved or disproved during the attack phase.
Attack - The attack phase of a Penetration Test is the process of taking identified vulnerabilities and attempting to exploit them, If an attack is succesful, the vulnerability is verified and safeguards are identified to assist in remediation. In some instances, exploits Penetration Testers uncover can allow them to escalate their privileges on the system or network to gain access to additional assets. When this occurs, additional analysis and testing is required to understand the real risk to the system regarding the type of information the Penetration Testers can see, change or remove from the system. Automated vulnerability scanners commonly used in Penetration Tests are great in uncovering the existence of a vulnerability, the attack phase takes this knowledge and exploits the vulnerability to confirm its existence and take it as far as they can.
Reporting - The reporting phase of a Penetration Test is completed simultaneously throughout the first two phases. A log of all the key steps completed by the Penetration Testers leading to the successful attack needs to be documented to allow others to replicate the attack. These findings form the basis of the final report you receive once the fieldwork on your Penetration Test is complete.
A Penetration Test report starts with an Executive Summary which provides clients with an overview of the key findings of the Pentest. The best Penetration Testing summaries are written with non technical clients in mind, thereby allowing all team members, regardless of their technical knowledge, to be able to ascertain the level of risk posed by the systems being tested.
The second part is a comprehensive technical report with a detailed description of the vulnerabilities that were discovered during the Penetration Test. This makes the pentest transparent and relevant for technical team members. For every security flaw, extensive documentation is provided that precisely describes the technical background of the security vulnerability and how it may be exploited. Additionally, a risk analysis based on the findings from the Penetration Test shows the potential risks of the flaw in the overall context of the tested systems. Finally, remediation suggestions are provided for the vulnerabilities detected through the Pentest based on industry best-practices.
In summary, on conclusion of the Penetration Test, the report generated describes the vulnerabilities uncovered, a risk rating on these findings and guidance on how to mitigate these risks.
Why Choose Dragonfly For your Penetration testing Needs?
Dragonfly Technologies is the trusted security partner for hundreds of clients. Since 2005, our expert IT team has been conducting Penetration Tests for some of the largest security-conscious government, local and global ASX 100 listed businesses across multiple sectors. We have helped identify thousands of vulnerabilities across all our clients, provided remediation advice and helped clients develop and implement sound secure practices across their organisation.
Our team of security experts have relevant industry experience and all the necessary security clearances to the Highly Protected level under the Australian Government Attorney-General's Department security classifications – which gives your team peace of mind regarding the utmost trust and confidence when dealing with your sensitive security information.
The dragonfly Difference
Penetration Testing Methodology
Over the years, with a proven track record in Penetration Testing, our methodology has helped our customers reduce risk and remediate security vulnerabilities. Our Penetration Testing methodology drives the desired outcomes while in the process our customers save time and money.
Our Penetration Testing methodology adopts industry best practices that include the NIST Special Publication 800-53 Security Controls and Assessment Procedures for Federal Information Systems and Organizations and the OWASP Testing Guide, OSSTMM (Open Source Security Testing Methodology Manual) and the PTES (Penetration Testing Execution Standard).
Our Penetration Testing methodology is built on the importance around clearly defined scope and clear communication throughout the assessment life cycle. Each assessment will have an account manager to work with you to ensure your Penetration Testing needs are met.
Our Penetration Tests are designed and performed to provide you with the best outcome and help you secure your organisations most valuable assets.
Penetration Testing Reports
Dragonfly Technologies’ IT experts listen to your IT security network issues and work on the best solution. Our Penetration Testing reports outline in detail the vulnerabilities detected along with actionable recommendations to assist, remediate and secure your business environment based on the latest industry best practices.
The detailed Penetration Testing reports we produce are on-message and in a format that is easily understood by various levels of your teams within the company, from tech staff to the boardroom. Our staff are agile and efficient. We pride ourselves on being transparent and proactive. We ensure we stay ahead of the market – and our customers appreciate it.
A lead consultant is accessible throughout the Penetration Testing engagement. Before, during and after delivery, our team of experts are readily available to answer any questions you may have so that your business receives utmost value out of your Penetration test and assessment.
We understand the constant battle against our competitors, and we may not always be the least expensive, but we are definitely one of the best security companies in Australia offering value for budget.
Our understanding and application of these Security and Penetration Testing fundamentals is why we are the trusted security partners of some of Australia's most security conscious companies.
Built on capabilities, expertise and our partnership with IBM, government and industry representative bodies, Dragonfly Technologies continually strives to deliver new innovative defences to assist our partners and customers fight cyber-crime.
We are committed to exceeding your expectations on every engagement.
Dragonfly Technologies – the power and agility for superior Penetration Testing