
Infrastructure Penetration Testing Services
External Infrastructure Penetration Tests assess the security exposure caused by internet facing devices and servers. Internal Infrastructure Penetration Tests are assessments of systems within an organisation’s perimeter, to determine the level of risk systems have from visitors, guest, contractors, and malicious insider threats.
Whether you're looking to secure an on-prem internal network or your internet facing infrastructure services, such as email and file sharing, we can perform security testing to discover vulnerabilities and help you secure your systems.
Additionally, our security testing reports will give you all of the details required to understand and remediate each issue, ensuring that you can address the discovered risks quickly and efficiently.

We don’t just focus on vulnerability discovery, but we also give significant detail on remediating discovered issues and importantly, hardening systems against exploitation.
During the engagement you can track the findings within our web platform, allowing you to follow how the test is progressing but also to get a head start on remediating discovered issues. Once the assessment is complete, we will deliver a detailed report of findings and remediation guidance, as a record of your assessment.
Penetration Testing Methodology Summary
Mapping and Enumeration
The initial steps of the engagement include determining the attack surface for all in-scope systems, including host discovery, port scanning, service version scanning, and domain enumeration.
Vulnerability Identification and Confirmation
This stage includes the manual work performed by the tester to highlight security vulnerabilities; where authorised it will include the active exploitation of vulnerabilities to ensure that risks are appropriately graded, and false positives are removed. This includes service testing for issues such as known vulnerabilities, common and default misconfigurations, as well as manual testing for insecure services. It will also include testing of authentication systems, such as testing for weak passwords, default credentials, and insufficient account lockout policies.
Finally, network traffic will be assessed for weaknesses in-transit protection such insufficient cryptographic protection and insufficient protection against interception and relay attacks.
Privilege Escalation and Propagation
Privilege Escalation typically includes two main stages: escalation from domain user to local administrator, and escalation from local administrator to domain administrator. Where possible network propagation will be assessed to determine issues, such as reused administrative credentials.
This stage includes assessing local services for weaknesses such as insecure services paths and permissions, as well as testing for credentials in plaintext, token impersonation, and administrative session interception.
Post Exploitation
Once a compromise is achieved additional attack vectors are assessed, credential audits are performed, and risk assessments are performed to determine what level of system access could be achieved and the level of skill required by the attacker to perform the exploitation.
Remediation
We don’t just focus on vulnerability discovery, but we also give significant detail on remediating discovered vulnerabilities and importantly, hardening systems against exploitation.
If you're looking to protect your on-prem systems, then don't forget to check out our Wireless Penetration Testing and Firewall Security Review services, which completement Infrastructure Testing well.
Interested in an Infrastructure Pen Test?
If you'd like to talk to the team about cybersecurity testing, get in touch below: