PENETRATION TESTING

Let Us Help You Prioritise Your IT Security Spending

Cyber 7’s Penetration Tests not only identify vulnerabilities, but also provide recommendations for remediation that help you prioritise IT security spending.
 
Unlike some providers with narrower skill sets and experience, we can give you an indication of operational deficiencies that are the likely root cause of vulnerabilities.
 
Real value is realised after a Cyber 7 Penetration Test, when we can work with you to provide remediation activities that are pragmatic and effective.

If you’ve been stunned by the cost of a good penetration test or concerned about the benefits of a cheaper one, you’ll be pleased to hear about Cyber 7’s new Penetration Testing Packages.

Our fixed price packages address a gap in the market for high quality, affordable penetration tests.
 
Cyber 7’s tests are performed by highly qualified and experienced security professionals using premium tools and best practice methodologies.  However our low overheads, sophisticated tools and efficient processes mean you don’t need to pay a fortune for the superior results this delivers.

We Are The Penetration Testing Experts

Award Winning

 

Principal Security Consultants personally perform most of our penetration testing work and our award winning CEO carefully oversees all testing.  

Our Penetration Testers have a minimum 5 years’ experience in penetration testing, threat assessments, and security and IT solutions .

Qualifications include:

Proven Methodology

 

Cyber 7’s methodology has been developed over decades of penetration testing which has generated thousands of positive results.

Our methodology incorporates the full range of emerging global standards and best practices including:

Premium Tools

 

Our arsenal of penetration testing tools includes the gold standard Core Impact and Nessus 5, as well as other highly specialised
commercial and open source tools.

We are experts in researching who the attackers are, what they’re after and how they’ll attack you.

We use many of the same tools and techniques that criminal hackers would use to attack you.

Detailed Recommendations

 

Our detailed reports cover the vulnerabilities identified and make technical, procedural and strategic recommendations for remediation.

Reports are presented in person to explain the findings and remediation.

They also include an executive summary in business language so non-technical senior managers can understand the recommendations.

Penetration Testing Packages

Cyber 7’s fixed price packages provide excellent value and are designed to help you quickly assess your risks and prioritise the necessary steps to protect your systems.

WEB APPLICATION PACKAGE

 

  • One single external web application.
  • All web application testing is aligned to OWASP, CEH & other methodologies.
  • Authenticated & unauthenticated testing.
  • Vulnerability scanning for exploits.
  • Identifying & manually exploiting found vulnerabilities.
  • Full report covering the approach taken, techniques applied and vulnerabilities identified.  
  • Recommendations are given for each vulnerability found.
  • Full report is presented in person.

 

NOTE:  Additional web applications can be added for a fixed price per application.

NETWORK PACKAGE

 

  • 1-20 external facing IP addresses.
  • All network testing is aligned to CEH & other best practice methodologies.
  • Scanning & testing of firewalls, switches, routers, load balancers, security devices & servers.
  • Vulnerability scanning for exploits.
  • Identifying & manually exploiting all found vulnerabilities.
  • Full report covering the approach taken, techniques applied and vulnerabilities identified.  
  • Recommendations are given for each vulnerability found.
  • Full report is presented in person.

 

NOTE:  Additional block of 10 IP addresses can be added for a fixed price per block.

WIRELESS PACKAGE

 

  • 1-5 access points and/or mobile devices.
  • All testing is aligned to CEH & other best practice methodologies.
  • Scanning & testing of access points, smartphones, tablet/iPad type devices & other wireless devices.
  • Vulnerability scanning for exploits (including identifying rogue access points, non-encrypted data, WEP key security, DOS & MAC spoofing).
  • Identifying & manually exploiting all found vulnerabilities.
  • Full report covering the approach taken, techniques applied and vulnerabilities identified.  
  • Recommendations are given for each vulnerability found.
  • Full report is presented in person.

 

NOTE:  Additional blocks of 5 IP addresses can be added at a fixed cost.

Call Us For More Information And Pricing: 1300 958 434