If an attacker succeeds in compromising a perimeter system, he usually also tries to gain access to the systems behind it. This is exactly what we simulate as part of our Perimeter Penetration Test: If we are able to penetrate a perimeter system via a security vulnerability, we will also investigate the possibilities of gaining access to other internal systems. Of particular interest to an attacker in this context are, for example, a domain controller, a file or database server or systems of a possibly used back-up solution.
The analysis of the perimeter systems is carried out via Internet by the testing laboratory of 8com GmbH & Co. KG. If a system is in the network of or is managed by an external provider, you should clarify in advance whether the device is within your area of responsibility and if it can be tested by us.
The goal of the Perimeter Penetration Test, unless otherwise agreed in advance, is to answer the following questions:
The security of systems depends on the number of existing vulnerabilities. For this reason, it is extremely important that as many weak points as possible are detected and promptly fixed.