Call a Specialist Today! (02) 9388 1741

Penetration Testing
Test your defenses against an attacker’s playbook

Software Product Image

Palo Alto Networks Products
Penetration Testing
Penetration Testing
#PENETRATION-TESTING
Our Price: Request a Quote

Click here to jump to more pricing!

Please Note: All Prices are Inclusive of GST

Overview:

Test your defenses against an attacker’s playbook

Pressure test your organization’s technical controls and network security by safely applying strategic tactics, techniques and procedures that real threat actors use to gain unauthorized access and maintain a foothold in compromised environments.

Conceptualize threat actor impact

With our team of experts, you will test your defenses through the lens of a threat actor by leveraging known adversary TTPs. With the resulting knowledge, you will understand exactly how a threat actor could tangibly impact your operations.

Pressure test security controls and capabilities

Leverage creative tactics, techniques and procedures to subdue inadequate security controls and protective capabilities – uncovering issues to correct.

Enhance technical security posture

Apply tactical remediation steps and recommended next steps to address identified vulnerabilities, weaknesses, gaps or deficiencies.

Here’s what we deliver

Executive summary

You’ll receive an executive summary that provides our high-level findings and recommendations resulting from the Penetration Test, with a focus on business outcomes.

Detailed technical report

Unit 42 will provide an in-depth technical report describing the details of the engagement scope, methodology, testing TTPs and specific findings.

Prioritized recommendations

Unit 42 will provide specific and prioritized recommendations based on the potential security impact and exploitability of vulnerabilities or weaknesses discovered across your environment.

Remediation steps

You’ll receive tactical, action-oriented remediation steps to address the weaknesses, gaps and vulnerabilities discovered during Penetration Testing exercises.

Test your defenses against an attacker’s playbook

Establish rules of engagement

Unit 42® will issue a survey ensuring alignment on scope, timeline, restrictions, limitations and custom objectives.

Conduct reconnaissance and enumeration

Our team will engage in reconnaissance to find any public-facing information that may be used during the Exploit phase.

Vulnerability analysis

Unit 42 will perform a Vulnerability Analysis to identify risks and inspect and verify any false positives.

Exploit targets

After gaining initial access, our experts will attempt to bypass security controls using a variety of tools and techniques.

Report findings

You will receive a detailed report including security risks with recommendations prioritized to guide your efforts.

Move laterally or escalate privileges

Our consultants will then attempt to replicate likely attacker objectives, such as gathering credentials and accessing sensitive data.

Provide findings and recommendations

We will deliver a detailed report that describes the impact an attack could have on your business and specific recommendations for next steps.

Documentation:

Download the Penetration Testing Datasheet (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.

Pricing Notes:

Palo Alto Networks Products
Penetration Testing
Penetration Testing
#PENETRATION-TESTING
Our Price: Request a Quote