{"id":481,"date":"2020-11-08T17:19:30","date_gmt":"2020-11-08T22:19:30","guid":{"rendered":"https:\/\/globetech.biz\/?page_id=481"},"modified":"2023-10-02T13:54:06","modified_gmt":"2023-10-02T18:54:06","slug":"internal-vulnerability-scanning","status":"publish","type":"page","link":"https:\/\/globetech.biz\/index.php\/professional-services\/internal-vulnerability-scanning\/","title":{"rendered":"Internal Vulnerability Scanning"},"content":{"rendered":"\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 35%\"><div class=\"wp-block-media-text__content\">\n<p class=\"has-text-align-center has-medium-font-size\">Internal Vulnerability Scanning skips the unwanted elements of things like social engineering. An &#8220;Assumed Breach&#8221; scenario is created by planting our scanning PC on the network. Vulnerability scanning and exploitation is performed from there. GlobeTech LLC can audit the attack surface of an organization\u2019s internal assets to review the risks and vulnerabilities that an attacker would take advantage of.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"465\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/cyber-security-1805632_640.png\" alt=\"\" class=\"wp-image-529 size-full\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/cyber-security-1805632_640.png 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/cyber-security-1805632_640-300x218.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-4-background-color has-text-color has-background\">The Internal Attack Paths<\/h2>\n\n\n\n<p class=\"has-text-align-center\">Internal network assessments usually uncover simple flaws that can be chained together. Often, this full &#8220;Kill Chain&#8221; of attacks shows a significantly higher impact than the vulnerability itself might show. <\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/hacker-1952027_640.jpg\" alt=\"\" class=\"wp-image-531\" style=\"width:415px;height:243px\" width=\"415\" height=\"243\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/hacker-1952027_640.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/hacker-1952027_640-300x175.jpg 300w\" sizes=\"auto, (max-width: 415px) 100vw, 415px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Discovered assets will be scanned for vulnerabilities and assessed for risk or impact. The Vulnerability assessment and scan report becomes one of the report deliverables at the end of an internal engagement.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Each potential attack vector is reviewed and pen tested to attempt to gain access to the systems. By combining various sources of information along with vulnerability reports, exploitation of internal systems can be more fully assessed.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-4-background-color has-text-color has-background\">Internal Vulnerability Assessment Reporting<\/h2>\n\n\n\n<p class=\"has-text-align-center\">The reporting is the most important part of the assessment. This is what provides value to your business. Each independently reported vulnerable system or scenario is highlighted with a severity score, general attack narrative or description, Proof of Concept code or commands, and mitigation recommendations.<\/p>\n\n\n\n<p class=\"has-text-align-center\">The Internal Assessment comes with Vulnerability Scan Reports as well as supporting discovery data and manual Penetration Testing of exposed assets. While GlobeTech LLC will make recommendations, the business ultimately decides what the right option is for them, so together we\u2019ll spend time determining the actions that are right for you.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized is-style-rounded\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/security-3728124_640.jpg\" alt=\"\" class=\"wp-image-532\" style=\"width:320px;height:192px\" width=\"320\" height=\"192\" srcset=\"https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/security-3728124_640.jpg 640w, https:\/\/globetech.biz\/wp-content\/uploads\/2020\/11\/security-3728124_640-300x180.jpg 300w\" sizes=\"auto, (max-width: 320px) 100vw, 320px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-accent-color has-ast-global-color-6-background-color has-text-color has-background\">Contact<\/h2>\n\n\n\n<p class=\"has-text-align-center\">For more information, feel free to fill out the<strong>\u00a0<a href=\"https:\/\/globetech.biz\/index.php\/contact\/\">contact form<\/a><\/strong>\u00a0where GlobeTech LLC can respond and schedule a discovery call.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internal Vulnerability Scanning skips the unwanted elements of things like social engineering. An &#8220;Assumed Breach&#8221; scenario is created by planting our scanning PC on the network. Vulnerability scanning and exploitation is performed from there. GlobeTech LLC can audit the attack surface of an organization\u2019s internal assets to review the risks and vulnerabilities that an attacker [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":389,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-481","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/comments?post=481"}],"version-history":[{"count":6,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/481\/revisions"}],"predecessor-version":[{"id":1042,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/481\/revisions\/1042"}],"up":[{"embeddable":true,"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/pages\/389"}],"wp:attachment":[{"href":"https:\/\/globetech.biz\/index.php\/wp-json\/wp\/v2\/media?parent=481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}