Penetration Testing, IT Security and Support

PenTesting

Penetration Testing Services

What is Automated Penetration Testing?

vPenTest is DuqTech’s automated network penetration testing platform that combines the knowledge, methodology, processes, and toolsets of a team of security consultants into a single, deployable platform for organizations of all sizes. We help organizations to perform a penetration test within their environment at any given time, satisfying both compliance requirements as well as meeting security best practices. This platform is automated by vPenTest and is based on a framework that continuously improves over time.

Old School vs. New School

Traditionally, organizations have to face several challenges when seeking a penetration test, including availability, experience, and background, as well as low-quality deliverables that fail to effectively communicate the critical issues and remediation strategies that organizations need to adhere to to reduce their overall cyber risk. Through several years of experience, certifications, and industry contributions, including numerous tools, vPenTest solves a critical need for organizations in an ever-changing threat landscape.

Our Penetration Testing Methodology

vPenTest combines multiple methodologies that were once manually conducted into an automated fashion to consistently provide maximum value to organizations.

EGRESS FILTERING TESTING

Automatically perform egress filtering to ensure that your organization is effectively restricting unnecessary outbound traffic. Unrestricted outbound access can allow a malicious actor to exfiltrate data from your organization’s environment using traditional methods and unmonitored ports.

AUTHENTICATION ATTACKS

Upon the discovery of user account credentials, vPenTest will automatically attempt to validate those credentials and determine where they are most useful. This is a common process executed by both malicious attackers and penetration testers and is performed during privilege escalation.

PRIVILEGE ESCALATION & LATERAL MOVEMENT

Using a valid set of credentials, vPenTest will attempt to identify valuable areas within your organization. This is conducted through a variety of methods, including the use of vPenTest’s Leprechaun tool which assists in identifying where sensitive targets are.

DATA EXFILTRATION

Critical data leaving your organization is an extremely serious concern. If access to confidential and/or sensitive data can be attained, vPenTest will simulate and log this activity to help your organization tighten areas that should restrict data exfiltration.

SIMULATED MALWARE

With elevated access, vPenTest will attempt to upload malicious code into remote systems in an attempt to test the organization’s end-point anti-malware controls.

REPORTS AVAILABLE WITHIN 48 HOURS

Our detailed deliverables will allow your network staff to cross reference our activities with monitoring and alerting controls.

Internal & External Testing

We offer two different network penetration testing services to guide your organization to a better security posture and program.

INTERNAL NETWORK PENETRATION TESTING

Using a device or ISO image connected to your internal environment, our consultants will discover security vulnerabilities present within the internal network environment. These activities simulate those of a malicious attacker.

EXTERNAL NETWORK PENETRATION TESTING

Assuming the role of a malicious attacker from the public Internet, our consultants will identify security flaws within your external network environment. These flaws can include patching, configuration, and authentication issues.