Network Pentesting
Network vulnerabilities can lead to full system compromise. Identifying open ports and weak services is essential.
Methodology
What We Test
- External Perimeter (Public IP space)
- Internal Network (Workstations, Servers, Printers)
- Active Directory (AD) and Domain Controllers
- Network Devices (Firewalls, Routers, Switches)
- VPN and Remote Access endpoints
- Wireless Networks (Wi-Fi)
How We Test
External: We simulate an outsider trying to breach the perimeter. Internal: We simulate a malicious insider or compromised host. We perform port scanning, service enumeration, exploit unpatched services, and attempt lateral movement and privilege escalation (e.g., Kerberoasting, LLMNR poisoning).
What You Receive
- Comprehensive list of open ports and services
- Verified vulnerabilities with evidence
- Attack path visualization (from entry to Domain Admin)
- Prioritized patch and configuration management plan
Toolkit
- Nmap
- Metasploit
- Wireshark
- Nessus
- Responder
FAQs
External targets your internet-facing assets, while internal simulates an attacker inside your network.
We take care to avoid disruption, but some tests can be intensive. We coordinate with you.
