🌙
 

Subscribe to the Taegis™ XDR Documentation RSS Feed at .

Learn more about RSS readers or RSS browser extensions.

External Penetration Test

Service Overview

The objective of an External Penetration Test is to discover and demonstrate weaknesses present on the perimeter that would allow a threat actor to breach and gain access to the internal network or internal resources. The test includes exploitation of vulnerabilities, username and password discovery.

The test exposes security flaws that vulnerability assessments do not usually detect, and is more aligned with how modern threat actors attack and breach network perimeters or gain access to restricted resources.

Service Methodology

The Secureworks approach to advanced network security testing is based on an internally developed methodology, derived from industry best practices and extensive security testing experience. Secureworks works closely with you to determine in-scope and out-of-scope targets. Prior to the test, Secureworks will schedule a kickoff call to establish rules of engagement, level of effort, scope, risk acceptance, remote testing appliance (RTA) requirements, reporting requirements, test timelines, and schedules.

Listed below are components of the test:

Network Discovery

Secureworks performs port-scans of IP ranges you provide to identify live hosts. This test includes activities such as scanning a range of IP addresses to identify top transmission control protocol (TCP) ports in use and identifying specific applications and potential version information through banner grabbing. For external tests, scan data is delivered after the test is complete, detailing live hosts and top open ports. Port-scan data is not included with internal test reports.

Open Network Services Enumeration

Secureworks interrogates network services to determine additional information about Customer network that could lead to compromise. Examples include the following:

Note: Any Intrusion Prevention Systems, Web Application Firewalls, or other active security control devices may filter or obstruct testing traffic. Secureworks requests that the testers source IP's be allow-listed (or set to alert-only) for the duration of testing.

Open Network Services Exploitation

Secureworks will use information from "Open Network Services Enumeration" to attempt compromise of network services. Examples of techniques used include the following:

Note: Use of captured credentials, while not a software vulnerability, is a common vector of attack. Use of captured credentials and publicly disclosed breach data are considered in-scope. The use of any exploits with high risk of Customer service impact will be discussed prior to use.

Post Exploitation and Lateral Movement

Secureworks will attempt to identify compromise vectors for the wider network and domain infrastructure. The following techniques may be used to show the impact of compromise from earlier phases:

Note about Web Applications: Web applications are characteristically the most vulnerable applications. Secureworks provides services that assess web application security. If web applications are detected within the range of Customer's in-scope IP addresses that will be assessed for this Service, then Secureworks will perform generic (also known as black box) testing of those web applications; however, this testing is not considered a comprehensive test of Customer's web application. If in-depth web application testing is needed, see our Web Application Security Assessment service.

Remote Retest

Secureworks will conduct one (1) remediation validation ("RV") for only the high- and critical-severity findings listed in the final report. After primary test completion, Customer has ninety (90) days in which to remediate issues, schedule the RV, and have Secureworks perform the RV. Customer must submit the RV request through email to the Secureworks point of contact for the assessment within thirty (30) days of delivery of the final report or the RV is forfeited.

For external penetration tests, findings discovered after pivoting and post-exploitation can be difficult to validate and are therefore not included in RV. For internal penetration tests, RV can only be performed if the original test used the Secureworks RTA. Secureworks will issue a brief report summarizing the results of the RV, which will include information about whether Customer successfully remediated the issues.

Note: Secureworks only conducts RVs remotely, regardless of whether the assessment was conducted on-site.

Outcome

Presentation of findings and deliverables compiled by Secureworks will be provided to you in the form of a report. The report will include the following:

Customer shall have one (1) week from delivery of the report to provide comments to be included in the final report. If there are no comments received from Customer before the expiration of the review period, the report will be deemed final.

Upon completion of the Services, the Customer-designated contact will receive a secure/encrypted email confirmation from Secureworks. Unless otherwise notified in writing to the contrary by the Customer designated contact, within five (5) business days of such email confirmation, the Services and this SOW shall be deemed complete.

Scoping information

External testing will be limited to pre-defined target systems or network ranges. For the purposes of scoping, a target system refers to a live system exposing at least one port/service to the Internet.

While we do perform some OSINT to find undocumented assets associated with the customer, no live testing of those systems will be performed without written approval. Any modifications to scope will be discussed and documented with Customer before proceeding, and may incur additional fees through a Change Order.

External penetration testing typically relies on a blackbox methodology adhering to an artificially compressed timeline. Supplying additional information allows for efficient testing which can remain focused on impactful results. Providing a set of valid credentials for a specified test account allows Secureworks to perform more accurate password spraying, and to configure tooling for the most efficient testing possible.

Scope Description
External Penetration Test - Small Up to 50 external IP addresses

IP addresses for the test must be all external; otherwise, separate work effort is required.
External Penetration Test - Medium Up to 250 external IP addresses

IP addresses for the test must be all external; otherwise, separate work effort is required.
External Penetration Test - Large Up to 500 external IP addresses

IP addresses for the test must be all external; otherwise, separate work effort is required.

Work is conducted during business hours of the Secureworks consultant. After-hours feature is available for an additional cost.

The complete Service Description for this service can be found here: Penetration Testing

 

On this page: