During manual assessment, our pentesters focus on specific identified resources associated with your external network.
In most cases, we focus on visibly open services related to:
- Web
- FTP
- Email (incoming and outgoing)
- Firewalls
- Routers
- DNS servers
- Other services that are in place on the external IP address range
While pentesters perform checks based on the specifics of a given situation, we share the following “typical” scenario:
Domain Name System (DNS)
Network users need the ability to query DNS servers. If you have your own DNS server, a failure could affect your internet connection.
If an attacker gets access to your DNS server, they could find out how:
- The domain sends and receives email
- Servers that support your website
One serious DNS configuration error would allow unknown internet users to perform a DNS zone transfer, which could allow attackers to access
more valuable information about your network.
Routers
All connections between networks and the Internet typically go through a border router managed by the Internet Service Provider (ISP).
We locate all visible routers, establish the manufacturer and operating system (OS), then check for potential vulnerabilities. Our tests include:
- Checking software, to make sure your routers are patched and up to date
- Default user accounts such as
admin
- Attempts to access the router using various databases of well-known default passwords and settings
Firewalls
A firewall is designed to be the main gateway to an organization, with rules to protect internal resources. They are not an
“out-of-the-box” solution. Our pentesters look for:
- Firewalls that are configured for the specific needs of your business
- Firewall software that’s up to date with patches and maintenance
- Configuration errors that could leave a path into the corporate LAN
Our pentesters test your firewall rules based on attacks, such as:
- Buffer overflows
- IP spoofing
- Corrupted IP packets
- Attacks against open services
Web Servers
Web servers are vulnerable to defacement attacks, or could be used as a launching pad for further attacks against internal networks.
Our pentesters scan all web servers (client side) for potential exploits and vulnerabilities that could leave the door open for a potential
attacker, such as:
- Poor patching policy
- Default installation
Email Servers
Our pentesters check SMTP, POP3, and IMAP on the mail gateway for open relay vulnerabilities. Your mail servers should:
- Accept mail only for the organization’s domains
- Not relay mail for other domains
Attackers could exploit an open relay to flood the mail server with spam. Some ISPs blacklist domains which are known to send spam.
Our pentesters examine the mail server using a variety of methods, such as sending emails to non-existent domains.
Remote Sites and Virtual Private Networks
You may have set up a corporate network to connect to other offices over a VPN. While VPNs support secure communication, they may be vulnerable
to the same configuration problems as firewalls, because firewalls handle the VPN. If someone
makes a mistake when they configure your VPN, that can lead to an attack vector to a
corporate network.
Verifying Use of Secure Versions
As researchers discover vulnerabilities and security flaws in software, software vendors release patches for their products. Our pentesters
search for outdated and unpatched versions of software. They run tests against published and patched exploits.
Older versions have lower security thresholds and leave data vulnerable. According to the SANS Institute,
some of the most common vulnerabilities are based on outdated versions of Office 365. Cobalt can help you with that.
Ensuring Security of Legacy Protocols
Our pentesters can test legacy protocols such as POP3, IMAP, and SMTP for known vulnerabilities and security flaws.
Tools
Our pentesters may use the following service discovery tools (and more):
- Burp Suite Community/Professional
- Metasploit
- sqlmap
- Postman