top of page
Image by Markus Spiske
Internal pentest.jpg

Vulnerability Scanning

What Is Vulnerability Scanning?

Vulnerability scanning involves the identification of potential "known" vulnerabilities in network devices, web application servers and database applications. This is often automated and focuses on finding these vulnerabilities without exploiting them. The scope and goal of a vulnerability scan is to assess the risk and security posture of a network environment (internal and external).

 

We provide high-level remediation advisory for the identified weaknesses or vulnerabilities identified during our vulnerability scanning engagements.

​

​

Our Methodology

Bastion-Fort Security has extensive experience with complex architecture designs gained through years of experience working with clients of all sizes, industries and structures. As we are stay updated with hreat activity on a daily basis, we are constantly learning about the latest attack techniques, exploits and security flaws.

 

Our methodology covers:

 

  • Reconnaissance – Our team of security consultants will perform information gathering before any simulated attacks are executed.

  • Vulnerability Detection – Bastion-Fort Security will perform vulnerability detection to discover flaws in systems, networks and applications which can then be leveraged by the consultant.

  • Exploitation – Bastion-Fort Security will try to actively exploit security weaknesses identified in the vulnerability detection phase. To achieve this Pure Security may use publicly available, in-house developed or commercially available exploit kits.

  • Privilege Escalation – After a target has been successfully compromised, Bastion-Fort Security will try to gain a further foothold within the organization, this may involve gaining higher privileges in the system or potentially gaining access to other systems on the internal network. The end goal is to gain complete control of the network.

  • Data Exfiltration – Based on the scope of the project, Bastion-Fort Security may be required to perform data extraction. To achieve this, our security consultant will use a set of tools and techniques in order to extract specific data from the organization’s network.

  • Reporting and Delivery – Bastion-Fort Security will document, in priority order, the issues identified, along with recommendations for every issue identified. These are presented in a clear and meaningful way for both a technical and a business audience.

Contact Us

​

See How We Can Secure Your Assets
​
At Bastion-Fort Security, we can meet your organization's cybersecurity needs. Fill the contact form below, call us or email us to get started.
tel: (404)933-0668 | email: info@bastionfortsecurity.com
​
​

© 2021 Bastion-Fort Security. All rights reserved

bottom of page