Internal IT Infrastructure Penetration Test

Internal Infrastructure Pentest

Diese Seite ist auch auf Deutsch verfügbar.


What if one of your employees clicks on the wrong email attachment? Will you be able to stop the attack, or will the attackers be able to move laterally from there and take over all your systems? This is why you should conduct an internal infrastructure penetration test. The internal system is just one wrong click away from being “public”.

Experience has shown that the externally facing infrastructure is often quite well secured nowadays. However, if you look at the internal network, the story is often sadly different. No encryption used, security mechanisms turned off (legacy software does not support them), or completely outdated software. In the worst-case scenario, these vulnerabilities could lead to a complete compromise of company data.

Scope

This penetration test can be tailored to focus on specific systems, such as a particular server or the configuration of Windows clients, as determined during the scoping call. Moreover, this test can assess your detection capabilities, although it’s important to note that detection is not the primary focus of a penetration test. These are the main focus points of the test:

  • Penetration test of Active Directory
  • Check whether all recommended countermeasures are in place
  • Identification of vulnerabilities in the network
  • Identification of outdated software in the network
  • Misconfigurations, e.g., Active Directory Certificate Services
  • Test for open file shares with confidential data
  • And overall: can an attacker gain Domain Admin rights in your network?

Why

  • Find and fix vulnerabilities in your internal infrastructure
  • Secure your machines so that the impact of attacks is lower
  • Your infrastructure is a living system; only regular checks can help find misconfigurations.

Why VidraSec 🦦

I have, many times, gained Domain Admin rights, starting just as a normal user. In many different types of companies, I can tell you that being small or big doesn’t make a difference. If I can do it, an attacker can also do it. And I hope that me explaining the vulnerabilities and how to fix them in a report is more pleasant than an attacker explaining where to send the Bitcoins.

+43 720 971425

martin@vidrasec.com

Book appointment

Related Blog Posts