Internal Network Assessment

Why Assess Your Internal Network?
What could a malicious insider or an attacker who has breached your perimeter accomplish? We assess your internal network from the perspective of an attacker, identifying privilege escalation paths, weak segmentation, and lateral movement opportunities to help you contain threats and protect your critical assets.




Network Evaluations
First, we evaluate your network infrastructure through a process of reconnaissance, network discovery, and your network diagrams or documentation. This process helps identify live hosts, open ports, active services, and operating systems and hardware details. We also use publicly available information and network mapping techniques to help understand your network's attack surface and potential attack vectors from inside your network. We typically achieve this by setting up a virtual machine that is connected to your internal network.
Security Vulnerabilities
We then use this list of identified network assets to further identify and explore potential security vulnerabilities within the network that may allow our team to elevate privileges or pivot further into the network. In addition to identifying potential network vulnerabilities, we will also identify misconfigurations, weak protocols, insecure or exposed passwords, and technology-specific network-level issues across the accessible network.




Verify And Test
After we test every area of your network, we will then validate each vulnerability we find using public and proprietary exploitation techniques. This ensures we have accurately identified and categorized each vulnerability and its risk, so false positives are not reported. We do not perform DDoS or damaging exploitation techniques as part of this validation. Once validated, vulnerabilities, additional findings, affected endpoints, and affected assets are consolidated into a detailed, actionable report.
Actionable Summary
Each report consists of a high-level vulnerability summary, vulnerability validation steps, so your team knows how to reproduce each finding, and actionable remediation items so you can resolve the identified vulnerabilities as quickly as possible. Remediations will also include source-level mitigations, where applicable, that can be reviewed and implemented by network administrators and developers.


Ready to Begin?
Contact us