Penetration Testing
Test your defenses against an attacker’s playbook
Click here to jump to more pricing!
Please Note: All Prices are Inclusive of GST
Overview:
Test your defenses against an attacker’s playbook
Pressure test your organization’s technical controls and network security by safely applying strategic tactics, techniques and procedures that real threat actors use to gain unauthorized access and maintain a foothold in compromised environments.
With our team of experts, you will test your defenses through the lens of a threat actor by leveraging known adversary TTPs. With the resulting knowledge, you will understand exactly how a threat actor could tangibly impact your operations.
Leverage creative tactics, techniques and procedures to subdue inadequate security controls and protective capabilities – uncovering issues to correct.
Apply tactical remediation steps and recommended next steps to address identified vulnerabilities, weaknesses, gaps or deficiencies.
Here’s what we deliver
Executive summaryYou’ll receive an executive summary that provides our high-level findings and recommendations resulting from the Penetration Test, with a focus on business outcomes.
Detailed technical reportUnit 42 will provide an in-depth technical report describing the details of the engagement scope, methodology, testing TTPs and specific findings.
Prioritized recommendationsUnit 42 will provide specific and prioritized recommendations based on the potential security impact and exploitability of vulnerabilities or weaknesses discovered across your environment.
Remediation stepsYou’ll receive tactical, action-oriented remediation steps to address the weaknesses, gaps and vulnerabilities discovered during Penetration Testing exercises.
Test your defenses against an attacker’s playbook
Establish rules of engagementUnit 42® will issue a survey ensuring alignment on scope, timeline, restrictions, limitations and custom objectives.
Conduct reconnaissance and enumerationOur team will engage in reconnaissance to find any public-facing information that may be used during the Exploit phase.
Vulnerability analysisUnit 42 will perform a Vulnerability Analysis to identify risks and inspect and verify any false positives.
Exploit targetsAfter gaining initial access, our experts will attempt to bypass security controls using a variety of tools and techniques.
Report findingsYou will receive a detailed report including security risks with recommendations prioritized to guide your efforts.
Move laterally or escalate privilegesOur consultants will then attempt to replicate likely attacker objectives, such as gathering credentials and accessing sensitive data.
Provide findings and recommendationsWe will deliver a detailed report that describes the impact an attack could have on your business and specific recommendations for next steps.
Documentation:
Download the Penetration Testing Datasheet (PDF).
Pricing Notes:
- All Prices are Inclusive of GST
- Pricing and product availability subject to change without notice.
