www.Info-Sec-Pro.com

Address: IDPS,LLC DBA
Suite A 4401 Quebe Ave North, New Hope, MN 55428
Phone 888-847-4783, 763-533-0475 fax 763-445-2177
Email: idps2012@gmail.com

About Pen Testing

Why conduct a Penetration Test?
Penetration Test vs. Vulnerability Assessment
Testing Approaches
Types of Penetration Tests
What should be tested?
What do you get?
What ensures success?
Choosing a PenTester

Standard compliance

OSSTMM
OWASP
ISO-17799

Type of Test:


White-Box

The testing team has complete carte blanche access to the testing network and has been supplied with network diagrams, hardware, operating system and application details etc, prior to a test being carried out. This does not equate to a truly blind test but can speed up the process a great deal and leads to a more accurate results being obtained. The amount of prior knowledge leads to a test targeting specific operating systems, applications and network devices that reside on the network rather than spending time enumerating what could possibly be on the network. This type of test equates to a situation whereby an attacker may have complete knowledge of the internal network.

Black-Box

No prior knowledge of a company network is known. In essence an example of this is when an external web based test is to be carried out and only the details of a website URL or IP address is supplied to the testing team. It would be their role to attempt to break into the company website/ network. This would equate to an external attack carried out by a malicious hacker.

Grey-Box

The testing team would simulate an attack that could be carried out by a disgruntled, disaffected staff member. The testing team would be supplied with appropriate user level privileges and a user account and access permitted to the internal network by relaxation of specific security policies present on the network i.e. port level security.

 

For a penetration test, please submit:




Business Name:
Contact Information:
Email Address:
URL or IP address:
  
Network Penetration Test for

Other members of our business group:
Cloud-Security.us | USRenewableConsultant.com | Strategic-Business.info | US-scada.com

COPYRIGHT (C) 2000 - 2011 Info-Sec-Pro.com ALL RIGHTS RESERVED