Network Penetration Testing

Centurion identifies and examines vulnerabilities in your organisations external, Internet facing systems, and internal network to determine whether they can be exploited to compromise targeted systems, or used to gain access to confidential information.

A typical network penetration test is approached from the viewpoint of either an external threat or an internal threat to the organisation. An external network penetration test targets your organisations perimeter to assess its ability to defend against real world attacks from the Internet. An internal network penetration test discovers vulnerabilities and weaknesses within your organisations network to evaluate the impact of an internal attacker, or someone curious enough to connect to your organisations wireless network, or an unfortunate business partner who has recently been hacked.

Centurion performs assessments using its own network penetration testing methodology, based on Centurions independent security research, prior experience from evaluating networks, and industry best practices including:

  • Open Source Security Testing Methodology Manual (OSSTMM)
  • Penetration Testing Framework
  • The National Institute of Standards and Technology (NIST) Special Publication 800-115 - Technical Guide to Information Security Testing and Assessment
  • The Penetration Testing Execution Standard (PTES)

At Centurion we go beyond obtaining domain administrator access to your organisations IT infrastructure, to find the business critical systems and information needed demonstrate to senior management the risk to the organisation.

Our approach involves gaining access through various means including exploiting weak passwords, network design and configuration, missing patches and generating customised attack payloads that bypass antivirus and network based security solutions.

We perform techniques that allow for successful man in the middle attacks to capture credentials being sent over the network and to provide fake software updates for third party software which do not properly validate the source of updates. This enables us to gain control of users systems and all of the organisations information accessible by that user.

After gaining access to one of your organisations systems within the domain, we search for stored credentials in email accounts, shared folders, and documents. We then explore ways to escalate our privileges through a series of post exploitation techniques such as exploiting unquoted paths and weak Windows service permissions, retrieving stored passwords in application and operating system configuration files, and search paths used by applications when loading DLL files.

Achieving local administrator or SYSTEM privilege enables us to dump stored password hashes which can be recovered and reused along with pass the hash techniques to gain access on other machines within the domain or find other accounts using the same password.

Our persistent and determined approach enables us to gain higher privileges and control over your organisations information and IT infrastructure, than any user within the IT department or senior management.

Part of our approach towards evaluating the security of your organisations network involves testing the controls in place to contain a compromise and prevent the exfiltration of information to an external system.

How We Can Help

We provide you with the ability to prioritise meaningful changes and improvements to your organisations IT infrastructure without recommending the purchase of additional security solutions and services. This enables your organisation to discover cost effective solutions to address the identified security vulnerabilities without relying solely on management approval for additional spending.