Are Your Servers Sufficiently Protected Against Attacks?

If an attacker succeeds in compromising a perimeter system, he usually also tries to gain access to the systems behind it. This is exactly what we simulate as part of our Perimeter Penetration Test: If we are able to penetrate a perimeter system via a security vulnerability, we will also investigate the possibilities of gaining access to other internal systems. Of particular interest to an attacker in this context are, for example, a domain controller, a file or database server or systems of a possibly used back-up solution.

The analysis of the perimeter systems is carried out via Internet by the testing laboratory of 8com GmbH & Co. KG. If a system is in the network of or is managed by an external provider, you should clarify in advance whether the device is within your area of responsibility and if it can be tested by us.

The goal of the Perimeter Penetration Test, unless otherwise agreed in advance, is to answer the following questions:

  • Are there any weak points in the systems that can be exploited?
  • How can an attacker exploit detected vulnerabilities?
  • What damage can an attacker do by exploiting detected vulnerabilities?
  • How can detected weak points be reasonably fixed from a business point of view?
  • Can other customer systems be attacked by infected or manipulated systems? For example, is it possible to enter the internal corporate network?
  • Do security systems detect our attacks and offer protection?
  • What general measures exist to improve the overall security of perimeter systems?

The security of systems depends on the number of existing vulnerabilities. For this reason, it is extremely important that as many weak points as possible are detected and promptly fixed.