At Teceze, we rely on our cyber security expertise to perform and manage all aspects of external penetration testing for our clients. We use a process that is clear and simple to identify and manage the risk or all external attacks. We are the experts in External Penetration Testing.
Using one of Teceze Group’s servers, we carry out a full external infrastructure penetration testing that includes a full Port Scan of TCP and UDP ports of Public IP addresses. We seek out services that are running on open ports by carrying out a vulnerability scan.
This is completed using specialist scanners, to begin with, but if specific services are not identified, we call on other tools and scripts that are applied that are closely linked to those services. We can identify common vulnerabilities including version number displaying in services, insecure protocols, and default passwords using our specialist scanners.
Reducing the risk of non-compliance.
Boosts reliability and brand image.
Detects known security flaws and identifying unexploited security vulnerabilities to access privileged data.
Evite any financial damage.
Identify known and unknown vulnerabilities.
Reduce danger to continuity of business.
Get autonomous security checks.
Our CREST certified penetration testers follow a proven methodology mainly based on the OSSTMM (Open Source Security Testing Methodology Manual). This method emulates the tactics used by the attackers using many of the same readily available tools.
Scoping - Before a test our account management team will address the network/infrastructure evaluation criteria to determine the test scope.
Reconnaissance - Teceze will list your network assets and find any vulnerabilities in your networks that might break in by malicious actors.
Evaluation - Using the information found during the reconnaissance process, we search for possible vulnerabilities for the found hosts.
Reporting - The findings will be evaluated thoroughly by a tester accredited to Teceze. A comprehensive report will be prepared which describes the scope of the test and the methodology used along with the defined risks. This will give the company the opportunity to generate a detailed threat and risk assessment.
Re-test - To help and expedite the remediation, we will provide access to our testers and the raw test data. We can also re-test the systems so you can be confident that all the issues have been resolved successfully.