Why do Penetration Testing?

How are Penetration Tests performed?

1. Scoping

2. Recon and scanning

3. Gaining access

4. Maintaining access and evading detection

5. Reporting and analysis

Common Questions

At Interactive Security, all projects including Penetration Testing, are done in-house by USA based ethical hackers.  We use enterprise grade tools that meet the strictest standards (i.e., PCI compliance).

No. We carefully scope each Penetration Test project with our client well in advance of kick-off.  We customize each project to ensure the client’s needs are met.  Our team fully understands what systems are being tested, how deep the testing should go, and when appropriate testing windows are.  We account for any third-party requirements that are involved such as CMMC compliance, HIPAA compliance, SOC2 compliance, and PCI-DSS compliance.  Unless requested by the client, our Penetration Testing is not designed to disrupt client operations in any way.

Penetration Tests can be performed on many systems such as external & internal networks, wireless networks, applications, web applications, IoT and mobile applications.

Penetration testers typically use vulnerability scanning tools as a part of their pen testing tactics, but the practice of penetration testing is very different than vulnerability scanning. Automated vulnerability scanning creates a laundry list of vulnerabilities and configuration flaws in systems or applications under review. Meanwhile, manual penetration testing examines a target environment as a whole looking into complex or underlying weaknesses that a vulnerability scanner may not find, including business logic flaws, poor separation of duties, ineffective network segmentation, and more.

Ideally, every day.  (Just kidding….sort of).  Penetration testing is an extremely critical component of any cybersecurity program that dramatically helps an organization protect itself.  And since systems are always changing and criminals are always improving, frequent testing is important.  However realistically, best practice is to perform an annual penetration test at a minimum.   And because it’s so critical to maintain a security routine, we include quarterly vulnerability scans as part of our penetration testing projects.