PENETRATION TESTING – IF YOU WANT TO BEAT THE ATTACKERS, YOU'VE GOT TO THINK LIKE A HACKER!
KJAER DATA can offer you a network penetration testing performed by experienced hackers. The methods used are called “Ethical Hacking” and is based on the same methods hackers use to gain unauthorized access to corporate network systems. Our purpose is to find and address vulnerabilities in your computer security.
With a penetration test the efficiency of your company’s IT security and control is validated and tested. By doing so, an overview of the company’s vulnerabilities and network security is given.
HOW FAR SHOULD WE GO?
Black box: The test form simulates a real hacker attack, where the consultant conducting the attack have no prior knowledge of your infrastructure. The consultant will independently investigate and collect information about the company being hacked. This is the most extensive and time-consuming test.
Gray box: The consultant to conduct the attack has a limited knowledge of the company being hacked. The available information provided is e.g. website, address and name of the IT manager. The test simulates an attack from an employee with a limited knowledge of the IT installation.
White box: The consultant is provided with complete knowledge about the company and its infrastructure from network type, current security implementations, firewall and IP address. The test form simulates an attack from an employee internally in the company.