Ethical hacking is a real-life security test revealing system security deficiencies by imitating an attack.
Before planning the test, we determine the amount of information made available to potential hackers (in this case the ethical hacker) as well as the duration and costs of the test as our objective is not to prove that a system is unbreakable but that it can withstand attacks carried out by using a fixed amount of resources.
Accordingly, we offer three types of ethical hacking tests:
- Black box testing simulates a typical hacking attack, requiring only minimal information about the system (e.g. IP address). The objective of the test is to evade the system’s security controls.
- Gray box testing means that we are given user login rights to analyse the system. This test is recommended if you want to know how valid and authorized users can threaten your systems.
- White box testing means that all information is available for testers about the system or application (source codes, administrator rights to the operating system, configurational settings of the systems, password files, firewall rules, IT security policies, manuals etc.). The investigation will give us a comprehensive picture of the system.
The advantages of kancellar.hu’s solution
Kancellar.hu’s audit and penetration testing methodology is based on many years of professional experience. This methodology is a refinement of the widely accessible recommendations and standard initiatives (OWASP, OSSTMM). With the help of this methodology our specialists produce high quality project deliverables for our clients.
Based on our experience of over 300 accomplished tests, having sufficient knowledge of the operation of the specific application system and its business infrastructure is essential to identify high level risks. In practice it means that testers must have specialized knowledge about the particular system, including:
- its specific services,
- its specific functions,
- types of attacks that can be carried out using its functions, and
- widely used technologies and infrastructure relevant to the system.
Based on our penetration testing experience we believe that using automated penetration testing tools without highly qualified testers will not produce the desired result.
Tests that are carried out within a few days and are based exclusively on the results of automated tools will generally identify only few of the real vulnerabilities, and the false alarm rate is usually high. Therefore, these results can rarely be used to enhance security in practice. In our audit projects we provide our clients with a team of qualified specialists whose experience is a guarantee for thorough testing.
We would like to call your attention to the fact that in case of penetration tests and vulnerability assessments the depth of an analysis will usually be directly proportional to the amount of time devoted for the test—test results will indicate what vulnerabilities can be detected or what access rights can be accessed by using specific resources. For this reason, the depth of the analysis should always be defined according to the (estimated) value of sensitive information or processes and we will take this information into account when defining deadlines in our proposals.
Our services include the following:
- selecting testing methods and information to be shared beforehand (together with clients);
- gathering information and planning penetration tests;
- performing tests. Testing covers predetermined IT components. Risky testing phases are agreed with clients beforehand;
- documenting our findings and describing revealed vulnerabilities, defining possible preventive countermeasures and proposing solutions.