The RedLegg methodology for conducting penetration testing provides high-quality results and detailed corrective actions that can help lower the overall risk of the tested environment. Each assessment is a specialized event unique to each client and application.
During formal scoping, clients can request internal and external testing options, network, web, and password testing tactics, visibility (blind) options, as well as denial of service (DoS) testing. The testing phases are summarized below:
Phase 1 – Reconnaissance
During this phase, RedLegg generates threat intelligence, researches OSINT available about the organization, and enumerates the network to discover ports, services, and potential attack vectors for use during testing.
Phase 2 – Validation
RedLegg validates the reconnaissance findings to determine whether a vulnerability exists and is actionable. Any vulnerability that can be validated as 100% false (false positive) is removed from the test during this phase.
Phase 3 – Threat Model
RedLegg creates a Threat Model of the organization based on the client vertical and any discovered threat intelligence affecting the organization.
Phase 4 – Attack Plan
RedLegg creates an Attack Plan based on the generated threat model for the organization, and the information discovered during Phase 1 and validated during Phase 2. This plan focuses, as a priority, on in-scope attack techniques that are likely to be leveraged against the organization.
Phase 5 – Exploitation
RedLegg attempts to gain a foothold on an exploitable system based on the Attack Plan. RedLegg will leverage any footholds to achieve the mutually understood client testing objective.
Phase 6 – Deliverable Creation
Based on client request, RedLegg supplies up to three deliverables detailing the results of the assessment: an executive Penetration Testing Report, a spreadsheet containing the discovered vulnerabilities, and a package containing the raw data from the penetration test.
Phase 7 – Debriefing
Once the deliverables have been received, RedLegg schedules a debriefing meeting to discuss the results of the assessment. During this phase, RedLegg works with the client to determine any necessary changes to the report.
Phase 8 – Retesting (Optional)
Within 90 days of the findings meeting, RedLegg can perform two types of retesting, by client request. The first type tests any discovered and reported vulnerabilities that the client says are now remediated; any tested items found to be remediated are updated with that information in the report. The second type is a full retest of the network scope to determine whether any fixes have created new vulnerabilities.
Additional Services
RedLegg also offers vulnerability scanning (discovery only), vulnerability assessment (reconnaissance and validation only), full application assessment, secure code review, and social engineering testing services. Learn more about RedLegg's pen testing methodology and pen testing services.
RedLegg Can Help
Trust RedLegg to help protect your organization with penetration testing.
- Gain insight into the risks you face by identifying vulnerabilities and detecting potential breach points.
- Prioritize the biggest threats and strategically plan your road map to safeguard your organization.
- Reduce the impact and likelihood of a successful breach and data exfiltration.
- Senior level assessors enhance your defense strategy with experience in your sector and vertical.
- Show stakeholders and customers your commitment to secure and protect their most valuable assets.
RedLegg’s innovative cyber security solutions deliver real results. More importantly, they provide peace of mind. From consulting to advising, proactive monitoring and battle testing, we can guide you through the process. The cost of pen testing can vary greatly depending on your unique situation and how you need to approach security.