What is Penetration Testing?
Answer: Penetration testing is the act of assessing the security of your network by attempting to penetrate it by simulating the actions of an attacker. Penetration testing is authorised and scheduled, and will probably be detected by an IDS. Penetration testing is done with either manual or automated tools Click to learn Integrated Vulnerability & Penetration. The penetration test can gather evidence of a vulnerability including reading and writing files, executing commands, or taking screen shots.
 
Why perform Penetration Testing?
Answer: Penetration testing is the next step in proactive network security. It can help overcome the challenges mentioned above by assessing the real impact of vulnerabilities on a network and by prioritising remediation. Vulnerability assessment and penetration testing go hand-in-hand. Vulnerability assessment results can be used as a starting point for a penetration test.
 
What are the Benefits of Penetration Testing?
Answer: A successful penetration test provides indisputable evidence of the problem as well as a starting point for prioritising remediation. Penetration testing focuses on high-severity vulnerabilities and there are no false positives.
 
What is Black Box Testing?
Answer: Black box testing assumes no prior knowledge of the infrastructure to be tested. The testers must first determine the location and extent of the systems before commencing their analysis. Black box testing simulates an attack from someone who is unfamiliar with the system.
 
What is White Box Testing?
Answer: White box testing provides the testers with complete knowledge of the infrastructure to be tested, often including network diagrams, source code, and IP addressing information. White box testing simulates what might happen during an “inside job” or after a “leak” of sensitive information, where the attacker has access to source code, network layouts, and possibly even some passwords.
 
Difference between Penetration testing and Vulnerability Assessment?
Answer: A vulnerability assessment simply identifies and reports noted vulnerabilities, whereas a penetration test attempts to exploit the vulnerabilities to determine whether unauthorised access or other malicious activity is possible.
 
Who performs Penetration Testing?
Answer: Stickman is able to provide you with penetration testing however The PCI DSS does not require that a QSA or ASV perform the penetration test-it may be performed by either a qualified internal resource or a qualified third party. If internal resources are being used to perform penetration tests, those resources must be experienced penetration testers.
 
What are the drawbacks of Penetration Testing?
Answer: Penetration testing focuses on vulnerabilities that allow command execution. Most command-execution vulnerabilities are buffer overflows, which inherently run the risk of crashing computers or services. However, automated penetration tests schedule the exploits from least to most dangerous. Another drawback is false negatives because buffer overflow exploits require precision within varying memory states. In addition, penetration testing only detects vulnerabilities which lead to penetration; this excludes cross-site scripting, denial of service, information gathering, etc.
 
What is an Exploit?
Answer: An exploit is a program designed to demonstrate the presence of a specific vulnerability usually by executing commands on the target. Penetration testing works by running a series of exploits that are chosen based on the target’s operating system and running services.
There are three types of exploits:

  • Remote – an initial break-in; exploitable by a remote user through a network service
  • Local – privilege elevation; exploitable by an attacker who is already on the system
  • Client – exploitable when a user is tricked into loading an attacker-supplied file

How do I resolve an Exploit?
Answer: An exploit can prevented or counter measured through Host Based Intrusion Prevention System, Security Guard, Web Application Firewall, or other preventative methods. When performing an exploit, several factors should be taken into consideration. In the event of a preventative technology, a circumvention technique should be considered. In circumstances when this is not possible, alternative exploit methods should be considered.
 
What tools can I use to stop exploits?
Answer: Stickman Consulting is the approved security integrator reseller for all SAINT products and services to customers across Australia and the Asia Pacific region. Stickman Consulting has many years of experience in selling SAINT products with fully qualified SAINT security engineers on staff at all times.
The SAINT product suite from Stickman Consulting offers a complete solution to evaluate the threats and vulnerabilities to your network.

  • SAINTscanner – The SAINT vulnerability scanner identifies threats across your network including devices, operating systems, desktop applications, Web applications, databases, and more.
  • SAINTexploit – The penetration testing component is integrated with the SAINT vulnerability scanner. SAINTexploit automates the penetration testing process, examines vulnerabilities discovered by the scanner, exposes where the attacker could breach the network, and exploits the vulnerability prove its existence without a doubt.
  • SAINTmanager – The remote management console is for organizations that want to centrally manage multiple scanners and help manage the vulnerability life cycle.
  • SAINTwriter – The report writer is built into all of SAINT’s products for reporting on vulnerability assessment, penetration testing, trouble tickets, vulnerability management, and more.

SAINT software is available in the following form factors:

  • Software download (SAINTscanner, SAINTexploit,SAINTmanager)
  • Pre-loaded on an appliance (SAINTbox and SAINTstick)
  • Online service (WebSAINT and WebSAINT PRO)

Companies who made the smart decision to be safe, secure and compliant with Stickman