Internal penetration test

Simulation of targeted attacks by malicious actors to identify vulnerabilities in IT infrastructure

Internal penetration test

Simulating employee actions

Gray Box Testing

Complete List of Vulnerabilities with Recommendations for Remediation

Post-Penetration Testing Support

What is an internal pentest?

An internal pentest involves simulating the actions of an attacker who has access to the company’s internal network and is attempting to gain access to protected information. In general, internal penetration testing is conducted using the Gray box model (the pentester has the rights of an ordinary employee).

When is an internal penetration test conducted?

When checking the security of yourITinfrastructure

an internal penetration test will help you check how well your infrastructure is protected from the inside

After making significant changes to the IT infrastructure,

an internal penetration test can identify new vulnerabilities that have arisen after the infrastructure update

If you suspect data leaks or security incidents

if there are suspicions of confidential data leaks, an internal pentest will help identify vulnerabilities and eliminate them before another incident occurs.

Before certification or audit, as well as compliance with regulatory requirements

Performing an internal pentest will help you prepare for a regulatory compliance check.

Internal pentest tools

While working on projects, we often create our own tools: we write scripts, exploits, and automate routine tasks for a specific project.

Detailed review and manual analysis

  • BurpSuite
  • Bloodhound
  • Certipy
  • Linux console utilities
  • Python/Bash/Go

Universal vulnerability scanners

  • Nmap
  • crackmapexec/netexec
  • Metasploit
  • PingCastle
  • Nuclei
  • Responder

Workflow

  1. Search for information available to ordinary employees
  2. Increasing access rights and securing them in the infrastructure
  3. Gathering information about internal resources
  4. Analysis and identification of vulnerabilities in the IT infrastructure
  5. Exploiting vulnerabilities in consultation with the client
  6. Preparation of a detailed report with routes through which an attacker can gain access to protected information and a detailed plan for eliminating them

Main areas of verification

  • Identification of outdated software components
  • Insecure storage and transmission of password information
  • Detection of excessive user rights
  • Verification of antivirus protection
  • Attacks on network infrastructure
  • Attacks on services, including AD and operating systems

What you get

The result of an internal penetration test is a report consisting of:

Summary A general description of the penetration test results without using specialized terminology, but with an assessment of the criticality of the vulnerabilities identified

Technicalreport Detailed information about attack vectors, supported by screenshots, about the vulnerabilities found, their exploitation, and ways to eliminate them

Expert opinion

This section contains information on individual ways to improve information security, taking into account the client’s business processes.

What to do with the report:

Analyze the results. Carefully study the report to understand the identified vulnerabilities, potential consequences, and recommendations for eliminating them.

Develop an action plan Create an action plan to address the identified vulnerabilities. Set deadlines and assign responsibilities to ensure that each issue is addressed appropriately.

Fix vulnerabilities Take steps to address the identified vulnerabilities in accordance with the action plan.

Repeattesting After fixing the vulnerabilities, repeat the penetration test to make sure the issues have been successfully fixed and the system is now secure.

Sample report in PDF

Advantages of ITGLOBAL.COM Security

We have all the necessary certificates.

External penetration testing is performed by specialists who have international certificates: OSCP, OSCE, OSWE, CEH.

We ensure compliance with the requirementsof the followingstandards:

PCI DSS, 719-P, 683-P, 757-P, 742-P, 802-P, and GOST R 57580

Proprietary testing methods

More than 40 proprietary methods for conducting internal penetration testing

Post-service support

We continue to advise you after the penetration test to help eliminate vulnerabilities identified in the process

Proven experience

10 years of practical experience, real case studies from our clients, and all necessary FSB and FSTEC licenses

Our clients

Related solutions