How Our Internal Network Pentest Works
A pentest mirrors probable attacks against your organization that a threat actor would employ to compromise your systems and exploit weaknesses.
They may use vulnerable points to gain further access and control of your system through the use of lateral movement inside your network. Vulnerable points that could compromise your internal systems and may be tested during an internal network pentest include:
- Unpatched software.
- Weak credentials.
- Poorly segmented network.
- Wrongly configured Active Directory.
- Internal security malpractices.
For an internal pentest, the Global Ghost Team led by Kevin Mitnick will scope the engagement parameters during the planning phase. Kevin and his team will then decide which team members will work best for the engagement. These selected members of the Global Ghost Team will prepare for testing during the pre-attack phase and then launch their attempts to find and exploit vulnerabilities within your systems during the attack phase.
This process can be done in person, but the Global Ghost Team has adapted to working remotely while still effectively carrying out all phases of the internal network pentest.
Request More Information About an Internal Pentest