{"id":398,"date":"2020-09-21T22:02:08","date_gmt":"2020-09-22T03:02:08","guid":{"rendered":"http:\/\/3.134.223.139\/?page_id=398"},"modified":"2023-10-03T12:14:45","modified_gmt":"2023-10-03T17:14:45","slug":"penetration-testing-services","status":"publish","type":"page","link":"https:\/\/globetech.biz\/index.php\/professional-services\/penetration-testing-services\/","title":{"rendered":"Network Penetration Testing Services"},"content":{"rendered":"\n<p class=\"has-text-align-center has-ast-global-color-4-color has-ast-global-color-1-background-color has-text-color has-background has-medium-font-size\" id=\"block-c1bb786a-2d32-4dd9-9d80-b848a58f3ab0\"><strong>GlobeTech LLC is certified to conduct Vulnerability Assessments and Penetration Tests., and can provide Small to Mid-Size business with these services on a regular basis.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center has-secondary-color has-ast-global-color-4-background-color has-text-color has-background\">Relevant certifications<\/h3>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.youracclaim.com\/badges\/468c4977-798d-4baf-ad01-9dab715c8bb8\">OSCP &#8211; Offensive Security Certified Professional<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.youracclaim.com\/badges\/91fa4510-50ec-4d13-85e0-f671953d5fac\">GWAPT &#8211; GIAC Web Application Penetration Tester<\/a> <\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.youracclaim.com\/badges\/93fc3648-0b0b-4714-a6b6-73c0ed1ea90b\">GIAC Advisory Board Member<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.youracclaim.com\/badges\/66c1ae61-28af-4a22-9515-55bf0379412e\">OSWP &#8211; Offensive Security Wireless Professional<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-4-background-color has-text-color has-background\" id=\"block-9217e51b-55ca-4560-8c36-f770ddd725e1\">What do these services entail<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Penetration Testing services include two main areas of assessment. Internal and External assessments gauge the overall health of your cyber security maturity. In addition to that, a WiFi security assessment is performed.  <\/p>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns:43% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"426\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/hacker-2300772_640.jpg\" alt=\"\" class=\"wp-image-501 size-full\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/hacker-2300772_640.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/hacker-2300772_640-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading has-text-align-center has-accent-color has-text-color\">External<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Discovery and Reconnaissance of externally facing assets to test for any flaws that will aid an attacker<\/li>\n\n\n\n<li>Reporting on the attack surface and any potential issues<\/li>\n\n\n\n<li>Scraping data from public sources to determine information that might be useful to an attacker, like public assets, potential usernames, or even breached passwords<\/li>\n\n\n\n<li>Mitigation suggestions where necessary<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 42%\"><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading has-text-align-center has-accent-color has-text-color\">Internal<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Internal scans to discover vulnerable assets that an attacker will leverage<\/li>\n\n\n\n<li>Active Directory assessments to discover common vulnerable scenarios<\/li>\n\n\n\n<li>Proof of Concept attacks that show actual paths that will give an attacker more access<\/li>\n\n\n\n<li>Full &#8220;Kill-Chain&#8221; breach simulations to highlight the significance and impact of the assessment<\/li>\n<\/ul>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"426\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/hacking-2964100_640.jpg\" alt=\"\" class=\"wp-image-502 size-full\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/hacking-2964100_640.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/hacking-2964100_640-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-4-background-color has-text-color has-background\">WiFi Assessment<\/h2>\n\n\n\n<p class=\"has-text-align-center\">With Penetration Testing services, GlobeTech LLC will also evaluate the wireless networks available within your business. These networks will be scanned and sniffed to intercept the encrypted communications. GlobeTech LLC will make attempts to break this encryption using industry standard tools. More than that, each assessment is heavily customized and targeted specifically for your company. <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/smart-3871774_640.jpg\" alt=\"\" class=\"wp-image-503\" style=\"width:765px;height:266px\" width=\"765\" height=\"266\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/smart-3871774_640.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/smart-3871774_640-300x105.jpg 300w\" sizes=\"auto, (max-width: 765px) 100vw, 765px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-4-background-color has-text-color has-background\" id=\"block-d1c764e7-a3f1-4041-908d-61cdb260dd08\">Reporting and Vulnerabilities Discussion<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Up to 40% of a penetration test project is reserved for the reporting and presentation of any issues that are found. The reporting and follow up discussion are the most important part of the assessment. This is what provides value to your business. Each reported vulnerable system or scenario is highlighted with a severity score, general attack narrative or description, Proof of Concept code or commands, and mitigation recommendations.<\/p>\n\n\n\n<p class=\"has-text-align-center\">This report becomes the focal point for a discussion after the engagement is completed. Each item is discussed and reviewed until the exploitation process is understood and mitigation options have been discussed. GlobeTech LLC will make recommendations, the business ultimately decides what the right option is for them, so together we&#8217;ll spend time determining the actions that are right for you.  <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized is-style-default\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/luke-chesser-JKUTrJ4vK00-unsplash.jpg\" alt=\"\" class=\"wp-image-504\" style=\"width:752px;height:501px\" width=\"752\" height=\"501\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/luke-chesser-JKUTrJ4vK00-unsplash.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/luke-chesser-JKUTrJ4vK00-unsplash-300x200.jpg 300w\" sizes=\"auto, (max-width: 752px) 100vw, 752px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-4-background-color has-text-color has-background\" id=\"block-579304b6-f59c-422c-bef7-0cfe06e6de9c\">How is the test performed<\/h2>\n\n\n\n<p class=\"has-text-align-center\" id=\"block-ccff1bfd-eda7-47ac-83ac-c783c4208afe\">External scans are reviewed from any standard public IP address, the same way an attacker would connect to and review your public facing assets.<\/p>\n\n\n\n<p class=\"has-text-align-center\" id=\"block-4fd20ca7-0958-4fc0-b930-b5cd683a36d0\">Internally, we plant an attacking machine (laptop, desktop) onto the network. This assumes some form of physical compromise of your network. For example, a user clicked the link and gave out their passwords, or executed the malware, plugged in the USB drive, or somebody connected to your network in a public conference room, or attacked your WiFi, etc.<\/p>\n\n\n\n<p class=\"has-text-align-center\" id=\"block-d4ed56d7-5791-4fba-bf6e-e872ff337446\">By &#8220;assuming&#8221; compromise, we can immediately begin to ID flaws within the network. Scans are performed, and as systems are identified we can begin the exploitation process. The MITRE framework is referenced throughout the report to help identify different areas within the attacking Kill Chain. <\/p>\n\n\n\n<p class=\"has-text-align-center\">The goal of a penetration tester is often to elevate privileges within your network, attempt to gain complete control, often by achieving a Domain Admin level of access. The goal within your business might be more tightly defined to specific customer records, intellectual property, or even specific systems. <\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-6-background-color has-text-color has-background\" id=\"block-e40e7443-ab56-462d-a93a-67cf48a44644\">Contact<\/h2>\n\n\n\n<p class=\"has-text-align-center\" id=\"block-44699952-ddf8-426b-966d-17b98e728674\">For more information, feel free to fill out the <a href=\"https:\/\/globetech.biz\/index.php\/contact\/\"><strong>contact form<\/strong><\/a> where GlobeTech LLC can respond and schedule a discovery call.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>GlobeTech LLC is certified to conduct Vulnerability Assessments and Penetration Tests., and can provide Small to Mid-Size business with these services on a regular basis. Relevant certifications OSCP &#8211; Offensive Security Certified Professional GWAPT &#8211; GIAC Web Application Penetration Tester GIAC Advisory Board Member OSWP &#8211; Offensive Security Wireless Professional What do these services entail [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":389,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-398","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/comments?post=398"}],"version-history":[{"count":19,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/398\/revisions"}],"predecessor-version":[{"id":1037,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/398\/revisions\/1037"}],"up":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/389"}],"wp:attachment":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/media?parent=398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}