{"id":1787,"date":"2022-05-10T11:58:46","date_gmt":"2022-05-10T09:58:46","guid":{"rendered":"https:\/\/www.dsecbypass.com\/internal-pentest-why-which-scenario\/"},"modified":"2022-09-27T08:29:28","modified_gmt":"2022-09-27T06:29:28","slug":"internal-pentest-why-which-scenario","status":"publish","type":"post","link":"https:\/\/www.dsecbypass.com\/en\/internal-pentest-why-which-scenario\/","title":{"rendered":"Internal pentest : Why ? Which scenario?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p class=\"part\" data-startline=\"6\" data-endline=\"6\">\ud83d\udce8 Today the majority of attacks pass through emails. \ud83d\udce8<\/p>\n<p class=\"part\" data-startline=\"8\" data-endline=\"10\">Effective solutions can be quickly put in place to counteract this problem:<br \/>\u2705 Through targeted training and internal company phishing campaigns<br \/>\u2705 Use of solutions such as Vade or MailInBlack which will, in most cases, prevent the transmission of spam.<\/p>\n<p class=\"part\" data-startline=\"12\" data-endline=\"12\">But when the hacker is already in your company, it is difficult to know the actual impact without first having done a technical assessment that tests the security of your infrastructure.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p class=\"part\" data-startline=\"14\" data-endline=\"14\">\ud83d\udd0e An <a href=\"https:\/\/www.dsecbypass.com\/en\/internal-pentest\/\" title=\"Internal penetration testing\" target=\"_blank\" rel=\"noopener\">internal security audit<\/a> is required \ud83d\udd0e<\/p>\n<p class=\"part\" data-startline=\"16\" data-endline=\"20\">Several scenarios are possible:<br \/>\ud83d\udc80 Malicious employee<br \/>\ud83d\udc80 Malicious visitor<br \/>\ud83d\udc80 Malicious or compromised provider<br \/>These scenarios can also be evaluated in the context of remote workers (telework and mobile workers).<\/p>\n<p class=\"part\" data-startline=\"22\" data-endline=\"24\">This type of audit can also be used to test access:<br \/>\ud83d\udce1 To <a href=\"https:\/\/www.dsecbypass.com\/en\/wi-fi-pentest\/\" title=\"Security audit of Wi-Fi networks\" target=\"_blank\" rel=\"noopener\">Wi-Fi<\/a> networks<br \/>\ud83c\udfec To <a href=\"https:\/\/www.dsecbypass.com\/en\/physical-pentest\/\" title=\"Physical pentest\" target=\"_blank\" rel=\"noopener\">buildings and headquarters<\/a><\/p>\n<p class=\"part\" data-startline=\"26\" data-endline=\"30\">The auditor verifies that the least privileges principle is applied at all different levels of the company:<br \/>\ud83d\udce0 Clerk<br \/>\ud83d\udcca Accountant<br \/>\ud83d\udd27 Technician<br \/>\ud83d\udcbc Service provider<\/p>\n<p class=\"part\" data-startline=\"32\" data-endline=\"32\">Internal penetration testing can also be an opportunity to simulate a ransomware attack \ud83d\udcb0.<\/p>\n<p class=\"part\" data-startline=\"34\" data-endline=\"34\">This analysis allows customers to know their Information System weaknesses, define priorities to improve their security posture and reduce risks in case of cyber attack.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span>\ud83d\udee1\ufe0f DSecBypass supports you in <a href=\"https:\/\/www.dsecbypass.com\/en\/penetration-tests-pentest-security-audits-lyon\/\" target=\"_blank\" rel=\"noopener\" title=\"See IT security audit offers\">IT security audits<\/a>, with quality services and significant experience in this type of service. Do not hesitate to <a href=\"https:\/\/www.dsecbypass.com\/en\/dsecbypass-contact-cybersecurity-company-lyon\/\" target=\"_blank\" rel=\"noopener\" title=\"Contact DSecBypass\">contact <\/a>us for additional information \ud83e\udd14 and \/ or a personalized quote \ud83d\udcdd.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.dsecbypass.com\/en\/contact\/&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;13px&#8221; button_bg_color=&#8221;#4328b7&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#4328b7&#8243; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Titillium Web|700||on|||||&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cdn.statcdn.com\/Infographic\/images\/normal\/15871.jpeg&#8221; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today the majority of attacks pass through emails. \ud83d\udce8<br \/>\nAntispam solutions exist but when the hacker is already in your company, it is difficult to know the actual impact without having, beforehand, an internal security audit!<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[34],"tags":[],"class_list":["post-1787","post","type-post","status-publish","format-standard","hentry","category-blog-en"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=1787"}],"version-history":[{"count":11,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1787\/revisions"}],"predecessor-version":[{"id":2482,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1787\/revisions\/2482"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=1787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/categories?post=1787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/tags?post=1787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}