Ethredix Ethredix
CS

Infrastructure Penetration Testing

Comprehensive testing of network infrastructure, servers and cloud environments according to recognized security standards.

External PT

Testing publicly accessible infrastructure from an external attacker perspective.

Internal PT

Simulating attack from internal network after successful breach or insider threat.

Cloud Security

Assessment of AWS, Azure, GCP configuration according to CIS Benchmarks.

Testing Areas

Network Services

Testing all publicly and internally accessible services - SSH, RDP, SMB, FTP, DNS, mail servers.

Port scanning, service enumeration, version detection

Operating System Security

OS configuration analysis, missing patches, default credentials, weak configurations.

Windows, Linux, Unix hardening assessment

Network Segmentation

Testing network segmentation, VLAN bypass, firewall rules, lateral movement possibilities.

VLAN hopping, pivot points, network isolation

VPN & Remote Access

Security assessment of VPN, RAS, Citrix, VDI, remote desktop solutions.

Weak encryption, authentication bypass, CVE exploitation

Wireless Security

WiFi network testing - WPA2/WPA3 security, rogue APs, evil twin attacks.

WPS attacks, KRACK, handshake capture

Cloud Configuration

Review IAM policies, S3 buckets, security groups, logging, encryption at rest.

AWS, Azure, GCP misconfiguration hunting

Methodologies and Standards

PTES

Penetration Testing Execution Standard - comprehensive framework for systematic penetration testing execution.

7 phases: Pre-engagement → Intelligence Gathering → Threat Modeling → Vulnerability Analysis → Exploitation → Post Exploitation → Reporting

OSSTMM

Open Source Security Testing Methodology Manual - scientific approach to security testing.

RAV (Risk Assessment Values) metrics for objective evaluation

CIS Benchmarks

Center for Internet Security configurations for operating system and cloud environment hardening.

Level 1/2 compliance assessment

NIST SP 800-115

Technical Guide to Information Security Testing and Assessment according to NIST guidelines.

Federal standards for security testing

Testing Output

Executive Report

  • → Overall risk assessment
  • → Attack path visualization
  • → Business impact analysis
  • → Compliance gaps

Technical Findings

  • → Vulnerable hosts/services
  • → CVSS v3.1 scoring
  • → Exploitation evidence
  • → Network diagrams

Remediation Plan

  • → Prioritized action items
  • → Patching recommendations
  • → Configuration changes
  • → Hardening guidelines

Compliance Mapping

  • → CIS Benchmarks alignment
  • → ISO 27001 controls
  • → NIST framework

Process

01

Scoping and Preparation

Scope definition, IP ranges, testing windows, rules of engagement, obtaining access.

02

Reconnaissance

OSINT, subdomain enumeration, network mapping, service discovery, technology identification.

03

Vulnerability Assessment

Automated scanning, manual verification, configuration review, CVE mapping.

04

Exploitation

Controlled exploitation, privilege escalation, lateral movement testing, persistence.

05

Post-exploitation

Data exfiltration testing, credential harvesting, documenting access paths.

06

Reporting

Compiling executive and technical reports, remediation plan, compliance mapping.