LMNTRIX
Linkedin LMNTRIX
Crunchbase LMNTRIX
Facebook LMNTRIX

External Penetration Testing

EXTERNAL PENETRATION TESTING

The External Penetration Test aims to assess the security strength of Internet accessible systems, services, and applications as defined in the scope of work. LMNTRIX will enumerate all accessible systems and services, which may include significant, publicly accessible cloud infrastructure like Office 365 or G Suite, within the defined scope parameters. LMNTRIX will then proceed to identify and validate vulnerable or misconfigured systems, services, and applications. LMNTRIX will perform limited testing against exposed applications, which may include hosted web applications, but they will not be comprehensively assessed for all possible vulnerabilities, focusing instead on critical vulnerabilities.

LMNTRIX will then attempt to accomplish the pre-defined objectives by any in-scope means not explicitly stated as off limits or potentially harmful to the environment. These objectives could include, but are not limited to, compromise of a DMZ, compromise of a web application, or proof of access to sensitive data exposed stored in a DMZ. LMNTRIX will also attempt to authenticate to any significant, publicly accessible cloud infrastructure or other publicly accessible authentication portals.

LMNTRIX will make note of any changes made to the environment (such as account creation or modification) and inform Customer. LMNTRIX will use a combination of internally developed tools and scripts in addition to open source and commercial tools.

WE HELP YOU:

  • Know whether your critical assets are at risk
  • Identify and mitigate complex security vulnerabilities before an attacker exploits them
  • Understand how the most sophisticated attackers operate based on intelligence gained from our years performing incident response
  • Attain realistic findings and comprehensive recommendations

 

WHAT YOU GET:

  • High level executive summary report
  • Technical documentation that allows you to recreate our findings
  • Fact-based risk analysis to validate results
  • Tactical recommendations for immediate improvement
  • Strategic recommendations for long-term improvement
Download our datasheet

download now

READY TO GET STARTED ?

Our security experts are standing by to help you with an incident or answer questions about our
consulting and managed detection and response services.

Privacy Statement | Terms of Use