The Network Penetration Process begins with a comprehensive survey of your network including architecture mapping and a complete network scan.
Once fingerprinting is concluded, a vulnerability scan is completed using automated scanning with access to a vulnerability database, where any vulnerabilities and exploits are verified.
The testing process continues with port scanning and war dialing that includes scanning open ports, closed ports, and filtered ports.
Using manual verification and password cracking, available exploits are checked and retested if necessary to validate results before reports are produced.
After scans are complete, OS fingerprinting is conducted evaluating OS type, patch level, and system type followed by protocol identification.
On conclusion of a network penetration test, comprehensive reports are created to provide findings, suggest solutions, and make recommendations.