Call us on 03450 21 21 51

SRM Solutions

Penetration Test Quote Builder

Choose your requirements and build your own penetration testing quote online.

01 Infrastructure Penetration Test

A penetration test goes a step further than a vulnerability assessment. It simulates the actions of both external and internal attackers whose intention it is to breach the information security of an organisation.

Many tools and techniques are employed in a penetration test. AT SRM our team of highly qualified penetration testers hold, at company and individual level, qualifications including QSA, PA-QSA, GCIH, GCFE and the industry gold, OSCP. Our consultants are also CREST-approved ethical security testers using their skills and experience to exploit critical systems and gain access to sensitive data.

Our deliverable is a comprehensive but easy to understand detailed breakdown of results presented by a consultant in an easily interpretable report. It will identify the threats in a jargon-free manner and mitigation steps for the key risks are explained.

Proceed

02 Web Application Penetration Test

Testing a website is vital to ensure malicious attack attempts do not exploit poor configuration, out of date patching, cross-site scripting or injection vulnerabilities of the underlying web application.

SRM will undertake a website vulnerability assessment to include:

  • Testing of web services for known vulnerabilities and configuration issues
  • Identification of the website structure and active code (i.e. web pages providing functionality)
  • Testing of functionality and web interactions to ensure that web vulnerabilities (such as the OWASP Top Ten issues) are not present
  • Where applicable, SOAP/REST and similar API testing is also undertaken.
Proceed
Back

03 Mobile Application Penetration Test

As with any technology, mobile applications come with their own set of common issues.

SRM are able to reverse engineer app code where possible, check root protection is in place and highlight any other security issues that may arise due to custom functionality within an app.

SRM will also test the back-end server of a mobile application as this is also commonly a target for hackers.

Proceed
Back

04 API Penetration Test

Using API documents provided to us, SRM will provide penetration testing against any back-end APIs. We will look for common API issues, such as insufficient access control and attempts will be made to access data that a normal user should not have access to.

All API testing is completely tailored to the specific API calls available and gives excellent value to our clients. SRM will take the size of your API into consideration and focus testing on calls with the highest potential risk.

Proceed
Back

05 Social Engineering

In information security, the human element can be the weakest link; opening up an organisation to unintentional vulnerability. Social engineering is an attack vector which relies on the psychological manipulation of people to gain access to systems.

This type of attack can take the form of Phishing scams, where emails attempt to gain access information by tricking an individual within an organisation into divulging confidential passwords or details to attackers, enabling them to gain access to systems.

Other forms of social engineering include Pretexting where a fabricated scenario is created to lure an individual into revealing confidential access information. There is also Baiting which are similar to Phishing attacks but access is gained to individuals via, for example, free music or movie download sites.

Baiting attacks can also be physical through the introduction of physical media. An example of this is an infected USB stick which a naïve employee might plug into their computer, activating a keylogger and providing access to a number of login details.

Social engineering attacks are constantly being re-invented but current threats also include Quid Pro Quo, which promises a benefit in exchange for information and Tailgating, where an attacker infiltrates an employee’s account and follows them into a restricted area.

Preventing social engineering attacks requires a number of strategies, including education, alerts and regular monitoring.

Proceed
Back

06 Contact Options

Would you like us to get in touch about your quote, or provide a formal quote?

Proceed
Back

07 Get my quote

We hold a range of accreditations both at a company and individual level including QSA, PA-QSA, CISSP, Cyber Essentials (IASME), Tiger and the industry gold OSCP.

Our deliverable to you will be a comprehensive but easy to understand detailed breakdown of all your results presented by a consultant in an easily interpretable report. It will identify the threats in a jargon-free manner so that we can work together to mitigate the key risks to your business.

To get your result, simply fill out your details in the form.

Message sent

Thanks for contacting us – we’ll be in touch with you soon to discuss your requirements.


Contact us

Your personal information is important so we treat it in the strictest confidence and in accordance with the SRM Privacy Policy.