External Network Assessment

Why Assess An External Network?
Your network perimeter is one of your first lines of defense. We conduct a thorough assessment of your public facing systems, identifying and validating vulnerabilities that could be exploited by an external attacker. Our goal is to help harden your perimeter and close the doors to your organization before an adversary finds them.




Hostname And IPs List
First, we gather a list of applicable hostnames and IPs that we then use to map the external attack surface of your network and/or applications. This process helps identify live hosts, open ports, active services, and operating systems and hardware details. We also use publicly available information, open-source intelligence databases, and network mapping techniques to help understand your networks attack surface and potential attack vectors.
Assess And Explore Vulnerabilities
We then use this list of identified network assets to further identify and explore potential security vulnerabilities within the network that may allow our team to elevate privileges or pivot further into the network. In addition to identifying potential network vulnerabilities, we will also identify misconfigurations, weak protocols, insecure or exposed passwords, and technology specific network-level issues across the accessible network.




Confirm Vulnerabilities
After we test every area of your network, we will then validate each vulnerability we find using public and proprietary exploitation techniques. This ensures we have accurately identified and categorized each vulnerability and its risk, so false positives are not reported. We do not perform DDoS or damaging exploitation techniques as part of this validation. Once validated, vulnerabilities, additional findings, affected endpoints, and affected assets are consolidated into a detailed actionable report.
Detailed Actionable Summary
Each report consists of a high level vulnerability summary, vulnerability validation steps, so your team knows how to reproduce each finding, and actionable remediation items so you can resolve the identified vulnerabilities as quickly as possible. Remediations will also include source level mitigations where applicable that can be reviewed and implemented by network administrators and developers.


Ready to Begin?
Contact us