Because this type of test provides a simulation of real-world attacks, it can help you identify and prepare for the potential threats lurking out there.
An internal pen test provides the sum of vulnerabilities existing on your internal network, alongside remediation recommendations that will help increase your security posture.
Depending on your industry and the relevant regulations, an internal network pen test may be required for compliance purposes.
By performing regular penetration tests, you can establish confidence in your security posture and demonstrate this to customers, partners, and stakeholders.
We use two different attack scenarios during an internal network penetration test:
1. Rogue Device Plugged Into Your Corporate Network: We will provide you with a Schellman-controlled device for you to plug into your network. After the initial setup, we’ll test to reveal what could an attacker do from this perspective.
2. Low-Privileged Employee: You’ll onboard our team with this access, and we’ll attempt to escalate privileges, pivot through your network, and compromise the entire domain.
In executing these two scenarios for internal network penetration testing, we use techniques like network mapping, unauthenticated internal vulnerability scanning, password cracking, open network share enumeration, Active Directory attacks, and exploitation of identified vulnerabilities. All are frequently mapped back to the MITRE ATT&CK Enterprise framework.
Schellman does perform internal network penetration testing—our Penetration Testing Team continues to grow and is currently comprised of individuals from different backgrounds including former developers, system administrators, and lifelong security professionals. Our team is incredibly experienced, and collectively holds the following professional certifications, among others:
Internal network pen tests may take as little time as 1 week for small environments, but they can also take 4 or more weeks for large environments.
You can expect to pay no less than $14,500 for an internal network penetration test with us, though the number of physical locations and hosts always determines the final price.
Yes, we ask that you inform your security team. A penetration test is a collaborative effort. Additionally, we ask that you inform them to not impede or block any ongoing attack scenarios. After all, we’re here to help you by identifying vulnerabilities and exploiting them to show real-world impact. This will also provide you with the maximum value from this assessment.
Generally speaking, “Denial of Service” (DoS) testing is not in-scope for any network assessment. It is possible for a service or application to react negatively if specific vulnerabilities are exploited. This could cause a loss of availability depending on various factors. If this does happen, please notify our team and we’ll coordinate with you to determine the root cause.
While it’s a great added benefit to know that your logging and monitoring is working as intended, uniformity it does not result in a “passing” grade. There really is no pass or fail, the goal of a penetration test is to help strengthen weaknesses within your network. If there were no findings identified, you may want to expand the scope of your engagement.
For most compliance focused assessments, testing against production is a strict requirement. In general, we recommend testing against production; however, if there is no compliance framework involved, the choice is yours.