Methodology

What We Test

  • External Perimeter (Public IP space)
  • Internal Network (Workstations, Servers, Printers)
  • Active Directory (AD) and Domain Controllers
  • Network Devices (Firewalls, Routers, Switches)
  • VPN and Remote Access endpoints
  • Wireless Networks (Wi-Fi)

How We Test

External: We simulate an outsider trying to breach the perimeter. Internal: We simulate a malicious insider or compromised host. We perform port scanning, service enumeration, exploit unpatched services, and attempt lateral movement and privilege escalation (e.g., Kerberoasting, LLMNR poisoning).

What You Receive

  • Comprehensive list of open ports and services
  • Verified vulnerabilities with evidence
  • Attack path visualization (from entry to Domain Admin)
  • Prioritized patch and configuration management plan

Toolkit

  • Nmap
  • Metasploit
  • Wireshark
  • Nessus
  • Responder

FAQs

External targets your internet-facing assets, while internal simulates an attacker inside your network.
We take care to avoid disruption, but some tests can be intensive. We coordinate with you.
Contact Us