Monthly Penetration Testing

annual & even quarterly pentests leave organisations weak and vulnerbale

Pengraph1
Crestbadges
Sec Certs1
Sec Certs2
Sec Certs3
Our Penetration Testing Capabilities
Internal Network Penetration Testing

Internal network penetration testing uncovers vulnerabilities in configurations and encryption, targeting unauthorized access to defend against privilege escalation, eavesdropping, and MITM attacks.

Social Engineering Penetration Testing

Social engineering penetration testing simulate tactics like phishing and pretexting, probing for human vulnerability to safeguard against information leaks, unauthorized access, and fraud.

External Network Penetration Testing

External network penetration testing explores assets for flaws, focusing on threats like phishing and security perimeters to defend against data breaches, unauthorized access, and DDoS attacks.

Wireless and CCTV Penetration Testing

Wireless penetration testing evaluates WiFi network security, focusing on identifying vulnerabilities in network protocols and device configurations to defend against unauthorized access, as well as cctv systems

Web Application Penetration Testing

Web app penetration testing reveals SQL injections, misconfigurations, and data exposure, targeting weaknesses to defend against credential stuffing, phishing, and session hijacking.

Red Teaming & Table Top Exercises

Red teaming simulates an attack, including strategy and tactics. Table Top Exercises simulate an organization’s response to a security incident, ensuring a thorough evaluation of your security. test your incedent response plan.

Vulscan Gartner
FAQ

FAQ & Everything You Need to Know About Staying Secure

Performing a penetration test is the only way to know how effective your security measures in place are at defending against an attacker.

Cybersecurity risks are increasing with unparalleled speed, frequency, and sophistication. As organizations adopt more technology to streamline operations and achieve their goals, the risk of being a victim of a cyber attack grows exponentially.

To overcome these threats, organizations must perform continuous risk management and strive to improve their cybersecurity posture. Thirty years of history have shown that cyber risk is difficult to understand, problematic to hedge, and only likely to increase, and characterized by a continually changing threat environment.

This real-world scenario simulates actions a threat actor would take to compromise your systems for malicious purposes.

Vulnerability scanning identifies known vulnerabilities, lack of security controls, and common misconfigurations within systems on a network.

Penetration testing simulates an attack to exploit weaknesses to prove the effectiveness of your network’s security.

The main difference is that vulnerability scanning is used for both defensive and offensive cybersecurity strategies while penetration testing is offensive in nature.

Many providers will sell their services as a penetration test, but attempt to pass off a vulnerability scan as one. This is also known as a "smoke test."

With CyberWolf, you get a dedicated point of contact and a certified assessor. This approach provides a more thorough assessment of your security defenses.

The different types of penetration tests include:

  • Network: Tests the security of network infrastructure components like servers, workstations, printers, firewalls, and routers. Testers might use port scanning, vulnerability scanning, and attempt to exploit known vulnerabilities in network protocols or services.
  • Web Application: Examines vulnerabilities in web-based applications and their components. This could involve attempting SQL injection, cross-site scripting (XSS), or testing for insecure direct object references.
  • Client-Side: Focuses on identifying weaknesses in client-side applications like email clients, web browsers, and office suites. Testers might craft malicious files or web pages to exploit vulnerabilities in these applications.
  • Wireless: Assesses the security of wireless networks and connected devices. Testing could include attempting to crack WiFi passwords, setting up rogue access points, or intercepting wireless traffic.
  • Social Engineering: Simulates attempts to manipulate or trick users into revealing sensitive information. This might involve sending phishing emails, making vishing (voice phishing) calls, or attempting to gain physical access through impersonation.
  • Physical: Tests the effectiveness of physical security measures to protect infrastructure, buildings, and systems. Testers might attempt to bypass locks, tailgate employees, or access restricted areas without proper authorization.
  • Firewall: Specifically examines firewall configurations and attempts to bypass them. This could involve probing for misconfigured rules, attempting to exploit known vulnerabilities in firewall software, or finding ways to tunnel traffic through allowed ports.

There are several approaches to penetration testing, each with its own advantages and use cases. The choice between white boxblack box, or gray box testing depends on your organization's specific security needs and goals.

White Box Penetration Testing

White box penetration testing, also known as clear box or transparent box testing, provides the tester with full access and complete knowledge of the target system. This includes source code, credentials, documentation, and multiple account roles.

White box testing is ideal when you want to:

  • Evaluate your application security in-depth.
  • Test from a developer's perspective.
  • Uncover vulnerabilities in the logic flow of an application.
  • Assess critical systems like banking applications.
  • Perform thorough testing at an early stage of development.

Black Box Penetration Testing

Black box penetration testing simulates a real-world attack scenario where the tester has no prior knowledge of the system. The assessor is given only the target URL and mimics the behavior of an external attacker.

Black box testing is suitable when you want to:

  • Evaluate your security posture from an outsider's perspective.
  • Test your application, infrastructure, or network in a scenario closest to a real-life attack.
  • Assess smaller scopes or specific components.
  • Conduct a cost-effective security assessment.

Gray Box Penetration Testing

Gray box penetration testing falls between white box and black box approaches. The tester has partial knowledge of the system, such as basic architectural information or limited access credentials.

Gray box testing is appropriate when you want to:

  • Balance the depth of white box testing with the real-world simulation of black box testing.
  • Evaluate internal and external vulnerabilities.
  • Test complex systems where some knowledge is beneficial but full disclosure isn't necessary.
  • Optimize testing time and resources.

In order to maximize the ROI of your penetration test, CyberWolf recommends a white box, or assumed breach, approach. This means we assume the attacker has already accessed your network or application.

The purpose of an assumed breach scenario is to test your security measures in place to prevent an attacker from moving laterally across your network or applications to steal sensitive data or deploy malware. This approach allows for a more thorough assessment of your internal security controls and provides actionable insights to improve your overall security posture.

This method aligns with the growing sophistication of cyber threats and helps ensure that your organization is prepared to defend against both external and internal attacks.

You should perform a penetration test on your network and web applications monthly .Social engineering testing should also be conducted at least quarterly.

Cyberwolf strongly recommends performing a penetration tests monthly as new vulnerabilities are discovered daily along with innovative attacks and techniques.

The frequency of performing a penetration test also depends on:

  • Compliance requirements.
  • Acceptable risk tolerance.
  • Significant infrastructure changes.
  • Large updates or deployments of code.

For infrastructure changes and large code deployments, it is recommended you perform a test immediately following the project.

The average cost of a penetration test is R3000 per external and R195 per Internal IP per month(min 20).

 Other factors that impact the cost include the type of penetration testing being performed as well as the methodologies used. OT is more expensive as well as

On average a penetration test takes 7 days to perform. The assessment may take 3-4 days while writing the report and presenting findings may take up to 2-3 days.

Engagements can last up to 12 weeks for organizations with larger applications, 200+ endpoints, or a social engineering engagement.

Other factors that may increase the length of the engagement include:

  1. The time spent to onboard.
  2. Getting access for the assessor to perform the work.

A Penetration Testing Authorization Form is a document between your business and a cybersecurity firm, allowing them to test your systems for vulnerabilities.

The form outlines the scope of testing, specifying which systems can be tested and which are off-limits. It defines approved testing times to minimize business disruption and includes contact information for key personnel.

By signing, you give legal authorization for the cybersecurity firm to probe your systems. While controlled, these tests may cause temporary service interruptions.

This document protects both parties by defining the test scope for your business.

Every penetration testing engagement is unique and therefore needs to be scoped. For an assessor to get started they will need background knowledge of the network or application being tested.

Beyond this, you will need to provide internal resources, or resources from your outsourced vendor, to provide access to the network or application being tested.

The background information needed may include:

Network Penetration Test:

  • The primary goal of the assessment.
  • Location of sensitive or critical data.
  • Authorized IPs and subnets to be tested.
  • Number of internal/external IPs.
  • Off-limit list (hosts/subnets not to be tested).
  • Approved and restricted testing windows.
  • Points of contact.
  • Network environment details (e.g., servers, workstations, printers, firewalls).
  • Number of internal and external IPs in scope
  • If you're working with an MSP or have internal IT.
  • If you're already working with a security provider or have a SOC.
  • Ownership status of equipment being tested.
  • Desired actions upon system penetration (e.g., local vulnerability assessment, privilege escalation attempts, password attacks).
  • Timeline for when the engagement should begin and when a report is needed.

Application Penetration Test:

  • Domain names in scope.
  • Number of web applications to be assessed.
  • Number of login systems to be assessed.
  • Number of dynamic pages to be assessed.
  • Number of user roles in scope.
  • Availability of source code.
  • Additional documentation on the application.
  • Whether static analysis will be performed.
  • If fuzzing, role-based testing, or credentialed scans will be conducted.
  • Timeline for when the engagement should begin and when a report is needed.

Every provider's report varies, however, there are 5 main elements you should look for in a penetration test report:

  1. Executive Summary.
  2. Organization Risk Rating.
  3. Test Scope & Methodology.
  4. Remediation Planning.
  5. Security Attack Vectors.

At CyberWolf, our reporting provides both a technical and non-technical analysis of the assessment. This allows key stakeholders the ability to follow along with the impact of the assessment while providing actionable insights for IT and development teams.

Our reporting provides an attack narrative along with detailed screenshots of the test. In addition to our remediation guidance, this level of detail enables teams to quickly identify where the issue is and remediate the vulnerability.

Remediation of network vulnerabilities is typically performed by internal IT staff or by your managed services provider. For web applications, this is typically handled by internal or third-party developers of the application.

PurpleSec does not perform remediation of any vulnerabilities.

A retest is done Monthly. When a penetration tester reassesses the discovered vulnerabilities.

Free Consultations

Free Pentest Evaluation
Protecting you from the dangers of cyberspace.
Services

We have you covered

Penetration Testing

1. Planning

The first stage involves defining the scope and goals of a test, including the systems to be addressed and the testing methods to be used. Our testing team works in conjunction with engineering teams, system owners, and the client’s security team to establish the scope of our test.
4Fa5D892 1Acf 4393 9736 B8D453879B0B
Penetration Testing

2. Reconnaissance

A Vulnerability Scanner Man Running Around In A Network Looking For Issues With A Matrix Theme
The next step is the gathering of intelligence (e.g., network and domain names, mail server) to better understand how a target works and its potential vulnerabilities. While we hope asset inventory is 100% accurate, we know that this is rarely the case. This will involve NMAP scans and OSINT to recon and locate assets not supplied in the discovery call request.
Penetration Testing

3. Scanning

The next step is to understand how the target will respond to various intrusion attempts. This step can involve automated, manual, and security functionality testing depending on the scope of the assessment. In general, automated scans will be performed first as results from these can help expose areas that need more manual testing. 
52Bf5848 71Fb 4De1 8A91 Fdef768B9A54
Penetration Testing

4. Gaining Access

PurpleSec will review the identified vulnerabilities and misconfigurations. This validation is performed through targeted penetration testing that focuses on high-risk findings. Exploitation of these findings often yields access to critical systems and sensitive information vital to operations.
137723B5 E8F1 41Fc 924E 5E782C70D150
Penetration Testing

5. Maintaining Access

E81C0989 7A3E 4E04 Ae97 Acb015F8888D
The goal of this stage is to see if the vulnerability can be used to achieve a persistent presence in the exploited system— long enough for a bad actor to gain in-depth access. The idea is to imitate advanced persistent threats, which often remain in a system for months to steal an organization’s most sensitive data.
Penetration Testing

6. Analysis & Reporting

The analysis phase is where all findings will be analyzed for validity and will be assigned a risk rating. The risk rating will be assigned based on a few factors such as the ease of the exploit, what kind of asset it is attributed too, and the potential outcome if exploited... Then we write the REPORT!
89C687Bd 628C 48F6 949F F476940Df604

Free Consultations, Pentest Evaluation

We will never give out your information