Infrastructure Penetration Testing

Security assessments of networks, systems, devices, and supporting services — scoped based on your environment, threat model, and requirements.

20
Service Types
Portal
Managed Delivery
24hr
Response Time

Select a Service

Open-Source Intelligence (OSINT)

The Open-Source Intelligence (OSINT) Security Assessment evaluates information about an organisation that is publicly accessible without requiring direct interaction with internal systems or networks.

Reconnaissance Passive Digital Footprint Exposure Analysis OSINT
View details →

External Infrastructure

The External Infrastructure Security Assessment evaluates the security posture of an organisation’s internet-facing systems and services.

External Network Internet-Facing Perimeter Remote
View details →

Internal Infrastructure

The Internal Infrastructure Security Assessment evaluates the security of systems, services, and controls within an organisation’s internal network environment.

Internal Network Lateral Movement Privilege Escalation Active Directory
View details →

Network Segmentation

The Network Segmentation Security Assessment evaluates the effectiveness of network segmentation controls within an organisation’s environment.

Network Segmentation Trust Zones Firewall Rules Isolation
View details →

Network Device Configuration

The Network Device Configuration Security Assessment evaluates the security posture of network devices through the review of their configurations and operational controls.

Network Configuration Routers Switches Hardening
View details →

Environment Breakout

The Environment Breakout Security Assessment evaluates the effectiveness of containment mechanisms designed to isolate systems, applications, or users within restricted environments.

Environment Isolation Dev/Test/Prod Container Escape Sandbox
View details →

Operating System Build Review

The Operating System Build Review Security Assessment evaluates the security posture of operating system builds against recognised security best practice and hardening standards.

Configuration Hardening CIS Benchmarks Windows Linux
View details →

Web Server Configuration

The Web Server Configuration Security Assessment evaluates the security posture of web server platforms through the review of their configuration and operational controls.

Configuration Web TLS Headers Nginx/Apache
View details →

Active Directory Configuration Review

The Active Directory Configuration Review Security Assessment evaluates the security posture of an organisation’s Active Directory environment through the review of its configuration, permissions, and operational controls.

Active Directory Configuration Kerberos GPO Domain
View details →

Cloud Environment

The Cloud Environment Security Assessment evaluates the security posture of cloud-hosted infrastructure and services across public, private, or hybrid cloud environments.

Cloud Infrastructure AWS Azure GCP
View details →

Firewall Configuration

The Firewall Configuration Security Assessment evaluates the security and effectiveness of firewall rules, policies, and associated controls within an organisation’s environment.

Firewall Configuration Rule Review ACLs Network Security
View details →

VPN Configuration Review

The VPN Configuration Review Security Assessment evaluates the security posture of Virtual Private Network (VPN) implementations used to provide remote or site-to-site connectivity.

VPNConfiguration
View details →

Voice Over IP (VoIP) Device

The Voice Over IP (VoIP) Device Security Assessment evaluates the security posture of VoIP systems and associated devices within an organisation’s communications environment.

VoIP Network SIP Telephony UC
View details →

Database Configuration Review

The Database Configuration Review Security Assessment evaluates the security posture of database platforms through the review of configuration, access controls, and operational settings.

DatabaseConfiguration
View details →

Secure Network Development

The Secure Network Development Security Assessment evaluates the security considerations embedded within the design and implementation of network environments.

Network Development Architecture Design Review Best Practice
View details →

Stolen Device

The Stolen Device Security Assessment evaluates the security controls and operational readiness of an organisation in the event of a device being lost or stolen.

Device Physical Disk Encryption Data Recovery Endpoint
View details →

Mobile Device Configuration

The Mobile Device Configuration Security Assessment evaluates the security posture of mobile devices through the review of their configuration and applied security controls.

Mobile Configuration iOS Android Hardening
View details →

Mobile Device Management

The Mobile Device Management (MDM) Security Assessment evaluates the security posture and effectiveness of an organisation’s MDM solution and associated controls.

MDM Mobile Policy Compliance Endpoint
View details →

Wi-Fi

The Wi-Fi Security Assessment evaluates the security posture of an organisation’s wireless network infrastructure and associated access controls.

Wireless Network WPA2/3 802.1X Rogue AP
View details →

Bluetooth

The Bluetooth Security Assessment evaluates the security posture of Bluetooth-enabled devices and their associated communication mechanisms within an organisation’s environment.

Bluetooth Wireless BLE Pairing Proximity
View details →
Portal Access
Detailed Reporting
Remediation Guidance
Direct Communication
Attestation Letters

All services are delivered subject to formal scoping, contractual agreement, and explicit authorisation.

Get in Touch

If you would like to discuss an assessment or understand how Nanorisk can support your organisation, please get in touch.