Our Solution Covers Different Penetration Tests

1. Physical Penetration Tests

Physical penetration tests reveal real-world opportunities for malicious insiders to compromise physical barriers i.e., locks, sensors, and cameras, allowing for unauthorized physical access, data breaches, and system compromise.

ISEC’s comprehensive method involves the OSSTMM and a proprietary approach developed through the years that include, but not limited to Passive Reconnaissance, Open Source Intelligence (OSINT), Active Reconnaissance (drones, onsite covert observation), Vulnerability Identification, Exploitation, Post Exploitation, and more.

2. Network Penetration Tests

Network penetration tests reveal exploitable vulnerabilities in networks, systems, hosts, and network devices i.e., routers and switches, allowing for unauthorized network access to sensitive data.

ISEC’s comprehensive method covers the classes of vulnerabilities in the Penetration Testing Execution Standard (PTES) and the Information Systems Security Assessment Framework (ISSAF) icluding, but not limited to CPD attacks, MIME testing, DNS enum/AXFR, SMTP relay, SNMP recon, Port security, brute force, encryption testing, and more.

3. Application Penetration Tests

Application penetration tests reveal real-world opportunities for hackers to compromise applications, allowing for unauthorized access to sensitive data, or system take-overs for malicious/non-business purposes.

ISEC’s comprehensive method covers the classes of vulnerabilities in the Open Web Application Security Project (OWASP) Top 10 2013, including, but not limited to injection, cross-site scripting, cross-site forgery, unvalidated redirects or forwards, broken authentication, session management, security misconfiguration, insecure direct object access, and more.

Manual vs. Automated Penetration Tests

Our approach consists of approximately 80% manual testing and 20% automated testing – actual results may differ slightly. While automated testing enables efficiency, however, it is efficient only during the initial phases of a penetration test. At ISEC, we believe that an effective and thorough penetration test can only be realized through meticulous manual testing techniques.

Our Tools

IDENTIFY SECURITY FLAWS IN THE ENVIRONMENT.

To perform a comprehensive real-world assessment, ISEC utilizes commercial tools, internally developed tools, and the same tools that hackers use on every assessment. Once again, we intend to assess systems by simulating a real-world attack and leverage the many tools at our disposal to effectively carry out that task.

Our Reporting

UNDERSTAND RISK LEVEL FOR YOUR ORGANIZATION.

We consider the reporting phase to mark the beginning of our relationship. ISEC strives to provide the best possible customer experience and service. As a result, our report makes up only a small part of our deliverables. We provide clients with an online remediation knowledge base, dedicated remediation staff, and ticketing system to close the ever-important gap in the remediation process following the reporting phase.

TOP