1. How does each level of testing work together?

    Reconnaissance involves gathering publicly available information about your organization that an attacker could use in any of the successive testing methods. Your external network can be easily seen by those around your building, so our external penetration test shows what an attacker could access should they breach it. Remote social engineering can be used as a way to inject malicious software into your systems via phishing or compromise network information over the phone that could be used to help facilitate the other penetration tests being performed. Onsite social engineering tests your employee adherence to visitor and escort policies, which if not followed can lead to compromised systems or sensitive information and facilitate the internal penetration test. If an attacker found a way to access your internal network via social engineering or other methods, our internal penetration test will demonstrate how far they could go and what data or systems could be infiltrated.

  2. What is done during reconnaissance?

    Our Information Security Analyst will search publicly available information about your organization that an attacker could use in various forms of cyberattacks.

  3. What is the difference between the external penetration test and the internal penetration test?

    While both involve manual exploitation of vulnerabilities found on your networks, external penetration testing focuses on your external networks and internal penetration testing focuses on your internal networks. Internal penetration testing is inherently more complicated since organizations typically have many more internally facing IP addresses.

  4. How is the phishing portion of this assessment completed? Do you phish my employees at the same time or in intervals?

    The details of the phishing engagement can be determined during the scoping call with our analyst team. The goal for the assessment is to provide a real-life simulation of what attackers typically do when targeting an organization, and we want to ensure we are providing you with the best possible test scenario.

  5. What is the script you use for vishing phone calls?

    We do not have just one script that we use. We are open to hearing your ideas, but we can also suggest some that we regularly use and have success with.

  6. What kinds of cover stories do you use during onsite social engineering?

    Our analyst will typically pose as an exterminator, inspector, or other trusted agent that would typically be let into more sensitive areas of your organization without question.