We discover and safely exploit vulnerabilities before hackers do

Penetration testing is a simulated attack orchestrated by certified security engineers to attempt to compromise your network and digital assets.

We do quality pen-tests much faster and cost-effective than the traditional approach. Our consultants achieve this by combining their advanced technical skills with powerful tools. You get an accurate security posture of your web applications or network as well as actionable recommendations.

  • Highly trained and certified penetration testing team
  • Guaranteed findings or test is free
  • Proven penetration testing methodology (NIST, OSSTMM, OWASP, PTES)
  • Clear & concise reports with prioritized, actionable items
  • POC creation with no business interruption

From:$4,999.95

Plus Tax

Contact Sales

Internal Infrastructure Penetration Testing

An internal infrastructure penetration test identifies vulnerabilities present while connected to your internal network infrastructure.

This type of test will identify the potential impact that a rogue employee, contractor, guest, or malicious piece of software, virus, or malware would have on compromising internal hosts while connected to your internal network.

Reporting

We provide a beautifully structured report which is easy to read at any level; containing an executive summary, followed by risk ranked vulnerabilities that were discovered in order of priority, how we were able to exploit them, and exact steps required to remediate in each instance. For your technical team, we include all test results in our reports.

We are also always on hand to provide consultation after completion of the security penetration testing.

Penetration Test Methodology

Rhyno Cybersecurity uses a comprehensive internal penetration testing methodology based upon the Open Source Security Testing Methodology Manual (OSSTMM), the National Institute of Standards and Technology Special Publication 800-115 (NIST 800-115), and our own independent research. An internal penetration test normally includes the following:

  • Initially we will connect to your internal network without a valid user account to check for insecure network configuration, insecure protocols, and insecure services running, followed by a vulnerability discovery phase.
  • We will attempt to exploit discovered vulnerabilities, escalate privileges, gain access to sensitive data, as well as gain access to other networks from your corporate network.
  • A review of your workstation hardware and SOE configuration is performed in order to test for vulnerabilities in the operating system, browser, email, and other system software.
  • A password audit will be performed in order to identify weak passwords, and ineffective or unenforced password policies.

External Infrastructure Penetration Testing

An external infrastructure penetration test is an excellent way to find out if an attacker could break into your network via the services listening on your external facing IP addresses.

Rhyno Cybersecurity performs tests to check whether your firewalls are secure and your VPNs offer sufficient protection. We will discover all of the devices that are connected to your external IPs and what ever services are listening on those devices. Then, our team performs independent research to discover any vulnerabilities on these services, and work to exploit those vulnerabilities in an attempt to compromize and gain access to the vulnerable host(s).

Reporting

We provide a beautifully structured report which is easy to read at any level; containing an executive summary, followed by risk ranked vulnerabilities that were discovered in order of priority, how we were able to exploit them, and exact steps required to remediate in each instance. For your technical team, we include all test results in our reports.

We are also always on hand to provide consultation after completion of the security penetration testing.

Penetration Test Methodology

Our security experts use a comprehensive external penetration testing methodology based upon the Open Source Security Testing Methodology Manual (OSSTMM), the National Institute of Standards and Technology Special Publication 800-115 (NIST 800-115), and our own independent research. An external penetration test will involve the following:

  • A reconnaissance is performed to determine the topology of the network and live hosts.
  • Enumeration of the hosts takes place to identify operating systems, services, and protocols. Vulnerability scanning, port scanning, service identification, OS fingerprinting, and DNS enumeration techniques occur at this stage using a variety of the latest tools.
  • Firewall and VPN penetration testing is carried out alongside password brute forcing.
  • Vulnerability research is carried out and potential vulnerabilities are manually tested in order to identify false positives in order to make sure reporting is accurate.
  • Attempts are made to manually exploit verified vulnerabilities and identify any further vulnerabilities resulting from any hosts we are able compromise.

Designed for websites, SaaS, or e-commerce applications

Whether it’s a new website, an updated website, or an annual process required by PCI-DSS compliance. Let us hack you before the bad guys do.

Vulnerabilities in web applications are responsible for some of the most high profile data breaches today. Not only that, a compromised web application can host stored cross site scripting (XSS) which can be used to target the browser of every single visitor to your site. These types of vulnerabilities can cause severe damage to your brand and reputation if not dealt with.

Rhyno CYbersecurity’s web application penetration testing service will enable your business to identify and close off any vulnerabilities discovered in your web application, thus considerably reducing risk and providing assurance to your brand, reputation, and your customers.

Reporting

We provide a beautifully structured report which is easy to read at any level; containing an executive summary, followed by risk ranked vulnerabilities that were discovered in order of priority, how we were able to exploit them, and exact steps required to remediate in each instance. For your technical team, we include all test results in our reports.

We are also always on hand to provide consultation after completion of the security penetration testing.

Penetration Test Methodology

Rhyno Cybersecurity has developed a world-class, comprehensive web application penetration testing methodology which is based upon the Open Web Application Security Project (OWASP), CWE/SANS Top 25 Most Dangerous Software Errors, The Open Source Security Testing Methodology Manual (OSSTMM), National Institute of Standards and Technology Special Publication 800-115 (NIST 800-115), and our own independent research.

This means, at minimum we will perform rigorous testing covering all of the the OWASP Top 10 vulnerabilities including:

  • OWASP A1: Injection including SQL, LDAP, XPath, OS commands, program arguments
  • OWASP A2: Broken authentication and session management
  • OWASP A3: Cross-site scripting (XSS)
  • OWASP A4: Insecure direct object references
  • OWASP A5: Security misconfiguration within the platform, webserver, application server, database,framework, and custom code
  • OWASP A6: Sensitive data exposure such as weak crypto, hashing, passwords protecting sensitive data
  • OWASP A7: Missing function level access control
  • OWASP A8: Cross-site request forgery (CSRF)
  • OWASP A9: Using components with known vulnerabilities
  • OWASP A10: Unvalidated redirects and forwards

Wireless (WiFi) Penetration Testing

Wireless technology is becoming more and more prevalent, and it is often not properly secured against some of the most common attacks.

When wireless technology is not secured properly it becomes an easy point of entry into your corporate or private network, and often it can be attacked from great distance from your organization’s trusted perimeter or premises. We can perform penetration tests on WiFi, Bluetooth, and various other radio transmissions.

Reporting

We provide a beautifully structured report which is easy to read at any level; containing an executive summary, followed by risk ranked vulnerabilities that were discovered in order of priority, how we were able to exploit them, and exact steps required to remediate in each instance. For your technical team, we include all test results in our reports.

We are also always on hand to provide consultation after completion of the security penetration testing.

Penetration Test Methodology

We initially conduct an architecture review in order to identify the location and function of access points within your organization. This also helps us to identify any rogue devices which may be connected.

  • From the wired network, we scan and enumerate connected interfaces of all access points in order to identify any running services and potential vulnerabilities.
  • We will then attempt to exploit any administrative interfaces and weaknesses identified on the access point’s wired interfaces.
  • Using the latest tools and techniques we will attempt to intercept data transmissions by cracking the encryption being used. This could include transmissions encrypted using either WEP or WPA/WPA2 in either pre-shared key (PSK), or enterprise mode.

TIERED TESTING

OPPORTUNISTIC
FULL COVERAGE
CUSTOM
Duration
5 Days10 DaysOver 10 Days
Team Size
2 Experts3 ExpertsCustom
Post Patching Verification
NoYesYes
Free if no breach
NoNoYes
Price
$4,999.95
$8,999.95
Contact Us!
Contact SalesContact SalesContact Sales

Detailed Reporting

Here is a Website Vulnerability Scanner sample report:

  • The report starts with a quick summary of the findings and risk ratings
  • Each finding has a detailed explanation in terms of risk and recommendations
    The vulnerabilities are ordered by the risk level

Frequently Asked Questions

Who performs these tests?

The penetration testers performing the assessments are the best in industry and they have the following certifications:

  • OSCP
  • GWAPT
  • GPEN
  • GXPN
  • GIAC Advisory Board
  • OSWP
  • GCIA
  • GSEC
  • CEH

What testing methodologies are you using?

We combine our own expertise with well known methodologies such as the Open Source Security Testing Methodology Manual (OSSTMM), the National Institute of Standards and Technology Special Publication 800-115 (NIST 800-115)OWASP Testing Guide and the Penetration Testing Execution Standard. The tests are performed both manually and automatically and we validate all the findings returned by the security scanners. Depending on the complexity and the time available, we also try to demonstrate the vulnerabilities by providing small proof-of-concepts.

Will my network or application go down?

No. We understand that a business needs to be running at all times. There are three main aspects in information security: confidentiality, integrity, and availability. We compromise the first two by extracting and modifying data and breaching vulnerabilities, however we do not compromise availability. This means, we don’t shut down or restart, take down services or perform DDoS attacks on web applications.

How long does it take?

The pentest is performed in a fixed-interval schedule of 5, 10 or custom days (during working hours). We focus on the key aspects of network or application security and we’re able to offer a comprehensive picture of the relevant security issues that affect your business. The report will be delivered in maximum 48 hours after the test is completed.

What does the report contain?

The deliverable of this penetration test is a pdf report containing all the necessary information for you to understand, reproduce and fix the vulnerabilities.

Is this a Vulnerability Assessment?

No. Exploitation makes the difference between a vulnerability assessment and a penetration test. Furthermore, exploitation is necessary to prove the real risk of a vulnerability instead of just estimating it. In our pentests we do time-bound exploitation but enough to understand the risk of the vulnerability. For the high-risk issues, you will receive basic Proof-of-Concepts that show how to trigger the vulnerabilities and how a basic exploitation can be performed.

What approvals do I need?

You need to have explicit authorization from the owner of the target system in order to test it. If you are using cloud services (ex. Amazon, Azure, etc) you need to ask and obtain explicit permission for the test.

Can I perform a pentest against my client’s system?

Yes, of course. You can test your clients’ systems as long as you have authorization from them to do that. This scenario is mostly applicable to consultancy companies, web development agencies or managed service providers.

What if I have more questions?

Please use this contact form to ask us additional questions and we will happily respond and clarify them.

Rhyno has the rightsolution for you