L O A D I N G

Penetration Testing

Penetration Testing

Are you aware of what is happening in your Enterprise Network?

Penetration Testing (Pen-Test) is a practice to test your security by using the same techniques a hacker would you to compromise your network or devices.  One of the best ways to measure the vulnerability to your systems either for malicious attack of perpetrating a fraud is to have an independent systems security professionals try and compromise your system.

We arrive with all the required equipment at your site and can be up and running as soon as the change control has been approved.  Commercial, open-source, and internally developed tools are used to perform the controlled attack while logging and monitoring responses.  These responses are analysed and recommendations are done to ensure that all critical points and data-paths are secured.  Our experts use automated as well as manual techniques which include social engineering to locate weaknesses in the technical and business functional environment.

Test your own security by ‘hacking yourself’.– Adapted from CobIT

Improve Your Security Stance:

Comprehensive Assessment
Why SACS Penetration Testing?

As part of the process, we evaluate your Forensic Readiness in the event of an Incident.  This includes ensuring that all security assessment and penetration testing evidence is logged and collated to a central repository.

We perform numerous phases during the Penetration Test

  • Reconnaissance
  • Scan and Enumerate
  • Exploit for local access
  • Escalate Privileges
  • Analyse and Report

We do not JUST use Vulnerability Assessment tools but rather use extensive human hacking skills to circumvent security controls.  There are different levels of Penetration Testing and we understand that if your organization is under a targeted attack, you need to be able to defend yourself.

Contact SACS to obtain additional information of our framework and the post review process we have in place.