Black Box External Pen Test What is?

A Black Box External Penetration Testing mimics the actions of an actual hacker by attempting to exploit weaknesses in network security without the dangers of a real threat. This test examines external IT systems for any weakness that could be used by an external attacker to disrupt the confidentiality, availability or integrity. The objective of an black-box external penetration test is to harden the perimeter of your environment (firewall, VPN, etc.) as well as any external services that may be exposed to the internet.

The ICT Academy Approach:

Below description is more generic overview of some of the areas that will be assessed:
For Black Box External penetration testing ICT Academy starts with methodologies based on the Penetration Testing Execution Standard (PTES) which can be summarized into the following steps:

Intelligence gathering
Vulnerability Analysis
Exploitation
Post-exploitation
Reporting

All testing by ICT Academy team is performed by a human using a blend of automated and manual procedures.

Penetration Testing Reports – Following any testing, a full detailed report shall be made available. The report will outline items such as the testing methods used, the findings, any proof-of-concept code for successful exploits.

Exploit Proof of Concept – In the event of a successful exploit, breach or compromise, ICT Academy shall document the testing methodology used, record all gathered evidence.

sqShqip