The Objective-Based Penetration Test (OBPT) is a bundle that includes our thorough Infrastructure Penetration Testing service offering. OBPT adds context and specific testing for more goal-oriented security. Define your goals, such as gaining access to your most critical data or domain admin, and our ethical hackers will provide a narrative of how an attack was carried out and the methods used. This will enable your in-house team to identify and address any security vulnerabilities. OBPT is a comprehensive penetration test that includes adversary simulation for added security assistance.
Social engineering scoped to your preferences (phishing, vishing, tailgating, device drops)
Active directory assessment to identify weaknesses in passwords and configurations
Ransomware assessment that will identify potential impacts of a ransomware attack with the current configuration and security controls
A thorough penetration test across your infrastructure
Identify how far a compromised credential can take an attacker. We test captured credentials against externally exposed assets as part of our phishing (e.g., emails, VPNs, and management portals)
Test end-point anti-malware capability against ransomware propagation techniques to identify if your controls are capable and configured correctly
Set specific goals you would like the ethical hacker to target within your environment (including people)
Narratives are constructed to demonstrate the business impact of the objective being completed and helps senior leadership understand risks without the technical jargon.
Leverage the Infrastructure Penetration Test results to target the achieved objectives that are then chained back to the respective findings to connect the dots
Identify threats to a single compromised password or internal end-point
Approach an objective from all angles to ensure that information remains secure.
We simulate the attacks launched by a malicious party, both internally and externally.
Attack narratives outline how a particular objective was obtained.
High-level assessment with recommendations to improve security posture.
During the test the engineer assigned to our case would notify us of any high-priority findings with detailed explanations of the risks right away. They were also quickly responsive to our emails during the test.
- Adam B.
V.P. Engineering
PacketLabs gives the partner peace of mind and reassurance that their cybersecurity needs taken care of. Their team is full of experts who go above and beyond the scope of the engagement.
- Anonymous
Director of IT
The result report was easy to follow and insightful, with recommendations on risk exposure and remediation. We would definitely recommend working with PacketLabs.
- Charlene
Small Business Owner
Our experience with Packetlabs was very positive. They offer excellent service, communicated clearly with us throughout the process, and were very accomodating regarding our timelines. We highly recommend Packetlabs.
- Anonymous
Human Resources
Since engaging Packetlabs, we've been confident in our ability to bid for Pentest engagements no matter the scenario, environment or requirement - they've made the whole process of scoping, quoting, and delivering (on time and on budget) seamless.
- Ian W.
Security Sales Specialist
They shared the results with us in a management report. We discussed all the findings and how we could fix them in meetings, and they also provided us with optional solutions. They did everything remotely.
- Anonymous
IT Infrastructure Manager
The team worked quickly to identify any issues, write up reports, and offer recommendations. Their friendliness set them apart and made them more of a partner than merely a service provider.
- Anonymous
IT Director
Thanks to Packetlabs Ltd.'s excellent cybersecurity efforts, the company was able to resolve its vulnerabilities and establish its secure VPN tunnel. Their responsiveness and diligence were hallmarks of their work.
- Anonymous
Manager
After performing extensive tests, Packetlabs Ltd. produced a thorough report that explained any potential security flaws. Accommodating schedule changes, the team supported effective collaboration.
- Anonymous
Project Manager, ECEBC
Packetlabs Ltd. successfully identified new and preexisting issues, making it easy for the client to resolve them. The team often went above and beyond to explore issues further and provide valuable information for the client.
- Anonymous
Sr Director Technology
From the first phone call to the tech interview and progress updates, they have demonstrated a complete understanding of our needs, are very proactive and responsive, and have clear communication.
- Anonymous
Small Business Owner
Packetlabs Ltd. delivered exactly as requested, meeting the objectives of the project. Not only was the team able to complete the analysis quickly, but they were also open and honest throughout the entire process.
- Anonymous
VP Engineering & Founder
Get a thorough infrastructure penetration test
Choose one, or all of the following: phishing, vishing, tailgating, and device drops.
Test how your facility's network would respond to a new device being connected
Can include application penetration testing
Identify where an attacker may be able to exploit a credential or an endpoint
Test physical controls to see if anyone can get on-site to your facilities
Test your wireless configuration and password
Determine whether a user would plug in an unknown USB to their computer
Test your access badges for replay attacks and cloning
Objective-Based Penetration Testing | Infrastructure Penetration Testing | |
---|---|---|
Foundational Assessment | Yes | Yes |
Network Security | Yes | Yes |
System Hardening | Yes | Yes |
OS and 3rd Party Patching | Yes | Yes |
Authentication Attacks | Yes | Yes |
Cryptography Attacks | Yes | Yes |
Email Phishing | Yes | No |
Ransomware Assessment | Yes | No |
Active Directory Audit | Yes | No |
Active Directory Password Audit | Yes | No |
Antivirus Bypass | Yes | No |
Adversary Simulation | Yes | No |
Physical Security Attacks | Yes | No |
Social Engineering (Phone/In-Person) | Yes | No |
Packetlabs’ OBPT methodology evaluates the security controls across people, processes and technology in order to identify potential areas of weakness.
Download Sample ReportSimulate real-world, covert, goal-oriented attacks to answer the 'what if' of how far a compromised credential can take an attacker.
Download MethodologyDownload our buyer’s guide to learn everything you need to know to successfully plan, scope and execute your penetration testing projects.
Download GuideAugust 15 - Blog
It's official: Packetlabs is a partner and attendee of Info-Tech LIVE 2024 in Las Vegas. Learn more about event dates and registration today.
August 01 - Blog
This article will delve into the most common techniques attackers use to transition from their initial breach to achieving their end goals: Privilege Escalation.
July 31 - Blog
Did you know? Attack attribution supports cybersecurity by providing contextual awareness for building an effective and efficient cybersecurity program. Learn more in today's blog.
There's simply no room for a compromise. We’re here to help. Our team works with yours to ensure you reach your full security potential.
© 2024 Packetlabs. All rights reserved.