NETWORK PENETRATION TESTING

Black Box, White Box, Grey Box, Stealthy, and other customised testing approaches

OUR METHODOLOGY

OpenWave believes Penetration Testing is an art, a skill, and a beloved passion. Our ethical hackers follow sound principles, processes, and procedures that adapt to clients' environments as we test their network's security posture.

INFORMATION
GATHERING

Meticulous research and analysis of information about organisation and their in-scope targets

PORT
SCANNING

Determining which ports are open and any services being provided through them

ENUMERATION

Extracting useful data from services identified during port scanning. e.g. software versions, usernames

VULNERABILITY
SCANNING & ANALYSIS

Broad scans (automated & manual) to identify weaknesses that are potentially exploitable

EXPLOITATION &
POST-EXPLOITATION

Leveraging successful exploitation to increase or maintain access to sensitive data

REPORTING &
CLEAN-UP

Presenting findings in a concise format and subsequently removing any remnants of testing

SECURITY IS A PROCESS NOT AN EVENT - BE PROACTIVE!

OUR OFFERINGS

Overview

OpenWave Security's Penetration Tests provide an accurate method of evaluating the security posture of your enterprise's IT infrastructure in a cyber-crazed and vulnerable world. Our Penetration Tests involve advanced analysis of data processing target(s) with an objective to identify and exploit vulnerabilities using a risk-based approach. Exploitation of vulnerabilities can simulate real-world compromises such as unauthorised access, code execution, information disclosures, and privilege escalation. Openwave utilises several approaches to Penetration Testing, such as the Black Box White box, Grey Box, and Stealthy.

Why engage us to perform Penetration Testing?

Unethical hackers don't care about the cost of downtime to your business, the reputational damage of a data leak, or the decreased stakeholder confidence from reports of being "hacked" in the news. Conducting a Penetration Test is a great proactive step towards evaluating your security posture and reducing the window of opportunity of nefarious threats. Our team works with you to achieve just that.

Contact Us
White Box/ Directed Penetration Testing

Attacks are launched against targets which are identified by the client at engagement initiation. This is the standard method of attack for penetration tests and enables the attacker to work within well-defined boundaries

Black Box/ Blind Penetration Testing

Our team first identifies targets through non-intrusive research and analysis in a similar manner as an unethical hacker. After which the client would confirm ownership and any highly sensitive systems before any attacks are launched.

Grey Box Penetration Testing

Combines a mixture of both White Box and Black Box approaches. The client provides partial information about targets and our team uses its expertise to light the remainder of the journey.

Stealthy Penetration Testing

Specifically designed to avoid detection. This type of testing is ideal for companies who wish to test their Managed Security Service providers' response time, or perhaps their own Intrusion Detection Systems (IDS) and Incident Response processes. In most cases, stealthy attacks should be detected by properly configured and managed monitoring solutions.

LOOKING FOR OUTSTANDING
INFOSEC SERVICES?

CONTACT US, WE'RE RESPONSIVE!

OpenWave can support your security initiatives, provide consultation, and respond to security incidents. Let's begin a fulfilling journey of insightful value-added collaboration.

CONTACT US

Copyright © 2010 OpenWave Information Security Ltd.