Une question ? Contactez notre standard : 01 41 91 58 61 - Un incident de sécurité ? Faites-vous assister : 01 47 28 38 39

internal penetration test

With an internal penetration test, our experts attack your internal networks and equipment, identify vulnerabilities to various scenarios, and provide you with appropriate recommendations.

Perimeters concerned by the internal intrusion test

Workstations

Servers

Business applications

Equipment

Internal networks

Internal environment: what are your risks?

As part of the internal penetration test, our experts identify the risks specific to your internal IT environment. Among the most recurrent:

Taking control of the active directory domain

compromise of internal application servers

q

identity theft

i

theft of confidential business data

Our approach

black box scenario

Simulation of an attack on the internal network by a physical intruder. The aim of this test is to assess the impact of a physical intruder connecting unauthorized equipment to the network.

gray box scenario

Assessment of the impact that a compromised employee or malicious service provider could have, with a standard workstation at his disposal. This assessment focuses on the wireline network.

Vulnerability scanning

Intrinsec can carry out a vulnerability assessment on a representative sample of your in-house equipment.

PASSI LPM & PASSI RGS qualified penetration testing

Since November 2017, Intrinsec has been PASSI RGS qualified (attestation n°20007) and PASSI LPM qualified (qualification decision n°5685) for its organizational and physical audit, configuration, architecture, source code and penetration testing activities.

Would you like to carry out an internal intrusion test? Ask for a quote

Request a quote for an internal intrusion test

Answer our secure qualification questionnaire and receive a concrete answer quickly to carry out the service.

If you don’t have all the information you need, we recommend that you fill in the form below.

I want more information!

Leave us a message describing your security needs, or contact us if you’d like information about our activities.

Don’t forget to enter your e-mail address or telephone number so that we can contact you as soon as possible.

Verified by MonsterInsights