Because this type of test provides a simulation of real-world attacks, it can help you understand the impact of misconfigured services or unpatched vulnerabilities on Internet-facing hosts.
Identify security weaknesses and vulnerabilities in your external network infrastructure and systems—the results and our recommendations would help you prioritize the appropriate security improvements to reduce the risk of external attacks.
The nature of this test can raise awareness among employees about the importance of security and the need to implement proper security measures.
Conducting regular penetration tests can demonstrate to customers, partners, and other stakeholders, that you take security seriously and are taking consistent steps to protect data.
Specific facets of our external penetration process include:
We’ll scan your network to identify open ports and services that are exposed to the Internet. We’ll test all discovered TCP ports and the most common UDP ports on in-scope hosts.
An unauthenticated scan is always our first step—the scanner will not be given any authentication when it searches for vulnerabilities. We may also perform subsequent scans that include the credentials discovered.
Manual attacks are those that the penetration tester performs while looking for a specific weakness, or which require continual modifications to get the expected results. Unlike a vulnerability scan, which may run for hours before yielding results, manual attacks typically provide the penetration tester instant feedback on the success or failure of an attack.
Additionally, some test cases cannot be tested adequately by automated scanning.
Schellman does perform external network penetration testing—our Penetration Testing Team continues to grow and is currently comprised of individuals from different backgrounds including former developers, system administrators, and life-long security professionals. Our team is incredibly experienced, and collectively holds the following professional certifications, among others:
External network pen tests may take as little time as 1 week for small environments, but they can also take 4 or more weeks for large environments. Your estimated timeline will directly correlate to the total number of hosts in scope.
You can expect to pay no less than $14,500 for an external network penetration test with us, though the scope of your assessment always determines the final price.
To adequately assess your network’s security, we ask that these be disabled. All penetration tests are timeboxed assessments. This means that the time spent bypassing these controls, weren’t spend looking for vulnerabilities within your application or hosts themselves. Additionally, for organizations seeking FedRAMP accreditation, it is a requirement. We will provide you with our public IP addresses so that we can be allowed inbound.
While we do perform reconnaissance to identify hosts Internet-facing, we (or any third-party assessor) cannot guarantee all will be found. Discovery performed by a third-party will never be as good as the “true list” from your network administrators. Consider working with them to identify all known external IP addresses and DNS records of hosts within your local network or cloud provider.
Your external network assets are most likely under attack 24/7 from unauthorized threat actors. However, if host availability would be particularly sensitive during the test, we can accommodate non-business hours testing for automated scanning activities.