Skip to main content

Network VAPT

A Penetration Test (Pentest) is an organized, targeted, and authorized attack attempt to test IT infrastructure and its defenders to determine their susceptibility to IT security vulnerabilities.

📄️ Scenario and Kickoff

Our client, Keym4ker Inc., has contracted our company, Clo4k & D4gger Security, Ltd., to perform a full-scope External Penetration Test to assess their perimeter security. The customer has asked us to identify as many vulnerabilities as possible; therefore, evasive testing is not required. They would like to see what sort of access can be achieved by an anonymous user on the Internet. Per the Rules of Engagement (RoE), if we can breach the DMZ and gain a foothold into the internal network, they would like us to see how far we can take that access, up to and including Active Directory domain compromise. The client has not provided web application, VPN, or Active Directory user credentials. The following domain and network ranges are in scope for testing:

📄️ Information Gathering

Information gathering is the phase where we systematically collect as much relevant data as possible about the target environment using a mix of passive and active techniques. This includes researching the target organization, identifying the technologies, software, and hardware they rely on, and mapping out the external and internal attack surfaces. The goal is to uncover potential security gaps or misconfigurations that could serve as an entry point, laying the groundwork for the next phases of the penetration test.