PenTestBrochure Final .pdf
File information
Original filename: PenTestBrochure_Final.pdf
This PDF 1.4 document has been generated by Adobe InDesign CC 2017 (Macintosh) / Adobe PDF Library 15.0, and has been sent on pdf-archive.com on 18/01/2017 at 20:14, from IP address 50.255.x.x.
The current document download page has been viewed 276 times.
File size: 449 KB (2 pages).
Privacy: public file
Share on social networks
Link to this file download page
Document preview
Would you rather have a
trusted party or an attacker
break into your network?
We Listen. We Support. We Deliver.
We perform a penetration
test in the same way a
malicious attacker will exploit
your network.
For chain of vulnerabilities,
we do our homework and
present a best practice set of
solutions.
Sometimes a simple patch
download will suffice, but
more often than not, the
solutions is more complex.
www.velocitytechsolutions.com
2273 County Rd. C West
Roseville, MN 55113
651.633.0095
888.784.2088
External
Network
Penetration
&
Vulnerability
Assessment
Phase 1
Discovery
Our report provides your
network administrators with
detailed recommendations for
how to address specific findings.
To begin this assessement, our
Security Analysts will:
• Gather and analyze information
about the customer
• Thoroughly test and identify all
Internet entry points
• Prepare system target lists for the
Enumeration Phase
Phase 2
Enumeration
System targets identified in the
Discovery Phase are analyzed to
determine:
• Type of host (i.e. router, firewall,
web server, etc.)
• Operating system in use (including
version and patch level)
Phase 3
Automated
Scanning
Automated scanning tools are used
to determine potential vulnerabilities
available to be exploited. Information
gathered in the first two phases will:
• “Tune” the scanner
• Focus its effort
• Improve its feedback
• Eliminate unnecessary scanning
Phase 4
Based on the findings and
recommendations presented to
you in our report, your network
can be secured from the inside.
This will help to protect against
malicious insiders, intruders
who may gain physical access to
network resources, or external
hackers who successfully breach
perimeter defenses.
Intrusion
Analysis
Results from Phase 3 will:
• Ensure “false positives” are
eliminated
• Take care of “false negatives”
• Analyze breaches of your network’s
perimeter defense and formulate
detailed mitigation steps


Link to this page
Permanent link
Use the permanent link to the download page to share your document on Facebook, Twitter, LinkedIn, or directly with a contact by e-Mail, Messenger, Whatsapp, Line..
Short link
Use the short link to share your document on Twitter or by text message (SMS)
HTML Code
Copy the following HTML code to share your document on a Website or Blog