Penetration testing

Strengthen your security with targeted network penetration testing

Enterprises of all sizes and sorts use IT networks as part of their internal and external communication, data storage, operations and more. The network, in fact, is a cyber version of the organization itself, requiring very specialized security measures to address cyber risks.

Cutting edge penetration testing step by step
Cutting edge penetration testing step by step

Penetration testing is an effective way to evaluate IT networks by revealing weaknesses that viruses, hackers and other destructive elements can exploit to harm your company.

Our cybersecurity experts apply the latest security scan and penetration testing methodologies and tools to discover where your network is weakest. In close collaboration with our clients, we provide customized network penetration testing services according to the organization’s goals and the system’s requirements.

Your Benefits

  • An enhanced knowledge of your IT network system and its vulnerabilities
  • An awareness of network security requirements and priorities
  • A more robust and secure IT network

Our Approach

Our experts know that IT networks are as varied as the organizations they serve. That’s why we take a customized approach to penetration testing, allowing our clients to determine the scope and purpose of the tests, guided by what they want to achieve.

With this in mind, network penetration tests do follow a general pattern consisting of 5 basic steps:

  • Planning and information gathering
  • Security scanning and result analysis
  • Gain controlled access to the system and drive controlled attack on the target system through penetration testing (internal and external)
  • Maintained access
  • Reporting including list of vulnerabilities, successful attacks, defense methods, and permanent system fixes

Penetration testing steps
Framework for penetration testing process

In the first step, we define the scope, objectives and methods and collect required test data.

Next, we perform security scans of the system to identify possible attacks. The subsequent penetration tests can be carried out - internally or externally - during operations.

To gain access to critical data, our experts focus on vulnerabilities and then use them to increase access rights, take over user/administrator accounts and gain access to data, intercept it, modify it or explore other ways in which damage can be caused.

Depending on the task at hand, the goal of a targeted, controlled attempt can be to obtain prioritized rights from inside or outside the system and to establish them permanently.

In the final step, we analyze the test results and prepare a report summarizing which vulnerabilities were discovered, which data was accessible, and how long access was possible before the attack was discovered. All known and system-side relevant vulnerabilities are then checked, and a possible threat to the system is identified.

The report also contains recommended steps to bring the system into a stable and secure state with as little effort as possible. We also support you in repeated penetration tests after implementation of the recommended measures in order to test their effectiveness.

Why DEKRA?

  • We are experts in network penetration testing.
  • We have experience in all areas of cybersecurity affecting business and industry.
  • We specialize in cutting edge pentest methods and tools.

Have questions? Contact us

Ingo Legler

Ingo Legler

Product Manager & Expert

separator
+49 30 986 0987-123
separator
Andreas Schlöricke

Andreas Schlöricke

Project Management Cyber Security

separator
+49 30 986 0987-126
separator
Share page