Penetration Testing | Red Security Consulting

By: Red Security  09-12-2011
Keywords: Security, Penetration Testing, Penetration Test

Penetration testing simulates an attacker attempting to gain access to a specified target server or application. We provide On-site and Off-site penetration testing services, which may include Black-Box, White-Box or Gray-Box approach to the given task. A penetration test involves the use of automated testing tools as well as manual test methods to review the security from an external or internal perspective.


Each of the following tests can be included or customized to meet specific security goals and requirements:


Full knowledge on company’s IPs, network ranges and architectures is provided before testing begins. This is a cost-efficient option, which minimizes time spent on reconnaissance and allows for more thorough assessment of the target network/application.


No prior knowledge on the company’s IPs and network ranges. This test simulates a real-world attacker who has to study and learn about the target from public and proprietary sources. Social Engineering is optional with this approach.


Full knowledge on company’s assets and application source-code is provided before testing begins. This allows our team to immediately investigate and verify a vulnerability by examining the code, instead of trial-and-error testing.


Red Security will deliver, upon project completion, a detailed abd comprehensive report. All of our reports are customizable according to client’s requirements, and typically include an executive summary, detailed technical findings with screenshots and recommendations.

Keywords: Penetration Test, Penetration Testing, Red Security, Security,

Other products and services from Red Security


Secure Web Development | Red Security Consulting

Course Description This class is intended to teach application developers and architects the principles of secure application development and best practice defensive coding techniques. Common application vulnerabilities and weaknesses are explained along with techniques for avoiding and/or mitigating the issues. Sample Outline The following is a sample outline that includes the examples of the core topics covered in this class.


Training | Red Security Consulting

Red Security offers advanced training courses designed to teach techniques for testing application security and building secure applications. This course will allow internal security staff to gain skills and understanding of the processes used during a web application test. All of our courses include live demonstrations and interactive exercises to reinforce the concepts taught during the class.


Services offered by Red Security

Our team can perform configuration and deployment reviews on a wide range of operating systems and devices, to ensure they are configured and deployed in line with industry best standards. We eliminate the need for your company to keep a full time IT around by leasing you our cutting-edge, high-availability VPN access servers for your road warriors and other company needs.


Applications Security Testing and Hacking

Course Description This training course is focused on teaching students how to both identify and exploit application vulnerabilities using the same techniques as professional application penetration testers and real-life attackers. Sample Outline The following is a sample outline that includes the core topics and example sub-modules taught during the class. Intended Audience Security Officers, Application Testers and Architects.