Pentest

A penetration test is the ideal starting point for upgrading your cyber security. Through a penetration test, DeepBlue investigates whether, and if so how (malicious) externals can enter your network. We try to penetrate your network to determine where the vulnerabilities are.

Actually breaking in

Practically, we exploit the potential weaknesses in the security of your network to access the underlying systems or information. DeepBlue's specialists use proprietary and highly intelligent tools. The results of our burglary attempts initiate new detection possibilities and are taken into account in the analysis phase. Through a penetration test, we can also investigate the likelihood of abuse by unauthorized persons, such as ex-employees or other third parties that do not act in your interest.

Phasing and strategies

A penetration test runs according to a number of phases: application testing, network pentesting and internal auditing. There are several strategies for carrying out a penetration test. In consultation with you, DeepBlue conducts penetration tests with 0% prior knowledge (black box), 50% prior knowledge (grey box) or 100% prior knowledge of the assignment (white box). We clearly determine in advance the scope, approach and objectives of the penetration test for optimal results.

assisting-deepblue-1

Tradecraft

There are plenty of companies offering penetration tests. But often they don't get beyond automated scans. These scans reveal error messages they process in a report. However, the power of a good test lies precisely in the manual work. Our certified specialists - ethical hackers - manually check the findings of scans and try to exploit any weaknesses by hand. Just like a real hacker would. In other words, DeepBlue sees penetration testing not only as a scan but as a manual test and delivers just the extra service needed to deliver quality and to get a tight grip on your data security.

Schedule a meeting

Purple Teaming

Purple teaming is the description for the combination of an offensive (Red Team) and defensive (Blue Team) cybersecurity experts.

During a Purple teaming mission, the Red Team attacks your network, while the Blue Team assists your IT department in detecting the attack and defending your network. According to this method, we test your network for weaknesses and at the same time your staff is trained in recognizing and repelling an attack.

purple-teaming-deepblue

Phases

The duration of the assignment depends on the scope and difficulty, but in the basics we always follow the phases below.

Scope. In the first phase, we will determine the scope in consultation with management. Where are your crucial assets located, and where will a possible hack cause the most damage to your organization.

Reconnaissance. Based on the input from the first phase, the Red Team, the attackers, determine their attack strategy, this is not fixed and the Red Team can change tactics or strategy during the attack. The choice of a strategy is closely related to the maturity level of your organization.

Teamwork. In the meantime, the Blue Team, together with employees of your IT department, will recognize irregularities and we as Blue Team work together with the employees of the organization to identify and repel the attack. In this way, the team of the organization learns how to act in the event of an attack and learns to better recognize and understand the weaknesses of the organization's network.

Results. At the end of the attack and defense cycle, we'll discuss the findings, share recommendations, and go through the results together. We do this at both a technical and management level. All findings are summarized in a clear report for both management and IT specialists.

This website uses cookies

We use cookies to improve your experience. Read more

Close