Verify your infrastructure security with Fiducia X
The information age we live in today offers remarkable means of storing and communicating data. Companies are relying more and more on IT. Information is the backbone of today’s corporations, with business continuity virtually depending on it.
With these advanced developments comes an abundance and variety of threats. When it comes to IT security, the bottom line is figuring out what is at stake for your company.
Fiducia X believes the only way to protect an organization is by proactively identifying, managing and eliminating security risks that make attacks against networks possible. You cannot manage what you cannot measure, and the only way to identify your potential vulnerabilities is to test for them.
Managed Vulnerability Scanning
Fiducia X offers an automated vulnerability IP-scanning service that utilizes a combination of proprietary and public domain tools to simulate a hacking attack. The service produces a report that suggests solutions for any threats that were discovered during the scan.
The tools and scanners deployed by Fiducia X for these assignments are constantly updated with tests for the most recently discovered vulnerabilities, ensuring the client enjoys the most up-to-date and comprehensive vulnerability scan available.
The SANS Top Cyber Security Risks (list formulated jointly by SANS and the FBI) are included and continuously updated in the vulnerability scanning script database. The Managed Vulnerability Scanning Service essentially uses the same techniques to find exploits and vulnerabilities as hackers do when attempting to penetrate targeted systems. This means you can identify the vulnerabilities in your network and take appropriate preventive measures in time.
Even if you have a high degree of confidence in your current security level, managed vulnerability scanning offers critical reassurance of an acceptable level through an independent source.
More about Managed Vulnerability Scanning...
VULNERABILITY SCANNING PROCESS:
A port-scan establishes if any ports are open. An information-scan then fingerprints what software, hardware and/or operating systems run on the open ports detected. The vulnerability database then runs a large number of tests (currently thousands of scripts with some 10 to 50 added weekly) based on the results of the port- and information-scan. Based on the environment that is to be tested, Fiducia X has the option to customize the service using a tailor-made hacker toolbox consisting of more than 120 settings ranging from brute-forcing, password cracking, denial-of-service attacks to IDS evasion techniques. The scan can take anywhere up to 48 hours to complete.
The results from the automated vulnerability scanners will be carefully analyzed and sanitized by a certified penetration tester. Based on this analysis false positives will be defined and removed from the reports and manual reports will be written with conclusions of the tests. These results can subsequently be used to provide direction for manual penetration testing.
External & Internal Penetration Testing
Infrastructure penetration testing focuses on identifying and validating vulnerabilities associated with your critical infrastructure, both public-facing and internal.
“I ALREADY PERFORM REGULAR VULNERABILITY SCANNING, IS A PENETRATION TEST REALLY NECESSARY?”
Penetration testing is a complementary component to vulnerability scanning in your testing program, not a replacement or competitor. Automated vulnerability scanning is very effective at identifying potential vulnerabilities very quickly. Given the pervasiveness of new vulnerabilities, every organization should be scanning anywhere between daily and quarterly. However, vulnerability scanning only identifies potential vulnerabilities; it does not confirm they actually exist. Only through targeted penetration testing can one validate which vulnerabilities are the biggest risk to your environment and the highest priority to fix. Given the skill set and resources required for a manual penetration test, it is not feasible to perform them as frequently as vulnerability scanning. Nonetheless, this is a critical component of your testing program.
THE PRIMARY GOALS OF A PENETRATION TEST ARE TO:
- Provide management with an understanding of the level of risk from internal or external accessible services.
- Provide recommendations and details to facilitate a cost-effective and targeted mitigation approach.
- Create a basis for future decisions regarding information security strategy, requirements and resource allocation.
WHY PERFORM AN INTERNAL OR EXTERNAL NETWORK SECURITY ASSESSMENT?
- To execute a real-world attack on critical infrastructure and understand the level of risk that exists at a single moment in time.
- To complement the automated vulnerability scan in order to better identify and validate all security vulnerabilities associated with your most critical internal systems and your Internet-facing environment.
- To understand the level of risk for your organization associated with your current infrastructure.
More about Penetration Testing...
FIDUCIA X TESTS INTERNAL & EXTERNAL NETWORK SYSTEMS AND SERVICES FOR VULNERABILITIES ATTRIBUTABLE TO:
- Software flaws
- System configuration settings
- Network-layer weaknesses.
FOR EXTERNAL TESTING, THE DEVICES TESTED INCLUDE THOSE THAT ARE ACCESSIBLE VIA PUBLIC IP ADDRESSES, SUCH AS:
- Firewalls
- Routers
- DNS and other external services including servers on your DMZ
- Remote access services such as dial-up modems and IPSec endpoints
- Other internet-facing services and servers
All externally-reachable services will be identified and documented. Disruption of external services or operations will be minimized.
FOR INTERNAL TESTING, THE DEVICES TESTED INCLUDE THOSE ASSOCIATED WITH THE TARGET ENVIRONMENT, SUCH AS:
- Firewalls and other defensive mechanisms
- Routers and Switches
- Email and DNS services
- (Reverse) Proxy servers
- Other servers
All internal IP addresses and services defined in the scope of the assessment will be identified and documented. Disruption of the internal infrastructure will be minimized.
INFRASTRUCTURE AUDIT PROCESS
This assessment begins with a process of data collection and network reconnaissance to learn as much as possible about the network topology and its hosts. Next is the enumeration phase, in which each component of the network is analyzed to extract details about its operating system, service types, protocols supported, and configuration parameters.
From this point, several paths exist to system or data compromise. Exploiting known or suspected software vulnerabilities, manually discovering a configuration flaw in the service, or identifying a weak password will result in a successful penetration. As the assessment process discovers more weaknesses the risk level for issues identified also escalates.
Wireless Infrastructure Security Assessment
Fiducia X’s Wireless Infrastructure Security Assessment utilizes a risk-based approach to manually identify critical infrastructure vulnerabilities that exist on all wireless infrastructure within scope.
WHY PERFORM A WIRELESS NETWORK SECURITY ASSESSMENT?
- To execute a real-world attack on your wireless infrastructure and understand the level of risk that exists at a single moment in time.
- To gain assurance that a malicious attacker could not gain unauthorized access to wireless or connected wired resources.
- To understand the level of risk for your organization when providing wireless access.
THE WIRELESS INFRASTRUCTURE WILL BE EVALUATED FOR NUMEROUS COMMON VULNERABILITIES, INCLUDING:
- Weaknesses in the physical security of wireless access points
- Detection and analysis of rogue access points
- Flaws in wireless signal strength and dispersion
- Errors in policy enforcement, keys, certificates, rotation, …
- Weaknesses in encryption algorithms such as WEP, WPA, LEAP, PEAP, …
- Design flaws in the network architecture and security zones
- De-authentication vulnerabilities
- “Evil Twin” attacks
- Traffic overload via flooding
- Traffic replay / injection
- Wireless card vulnerabilities
WIFI AUDIT PROCESS
Wireless testing begins with limited knowledge and no credentials provided and is designed to simulate a real-world attack on your wireless infrastructure. While this practical exercise is not designed to test the effectiveness of each implemented control individually, you will learn what vulnerabilities exist and the overall information security risk the wireless infrastructure introduces to your IT environment. If desired, testing can also be performed with provided user credentials to associate to the wireless network and determine if access controls to connected networks are sufficient and systems located on the wireless network are hardened. Similar to Fiducia X’s other infrastructure penetration services, the process will start with reconnaissance, moving to enumeration, vulnerability identification, and lastly validation to eliminate false positives.
Cost, Compliance & Duration
Fiducia X will customize the scope of each assessment based on specific client requirements. Performing these assessments on a regular basis will also help address specific regulatory and compliance requirements, such as PCI DSS. Please contact Fiducia X for a tailor-made quote based on your specific needs and requirements.