Systematically test the defenses protecting your most critical assets to pinpoint and reduce vulnerabilities and misconfigurations in your security systems.
Mandiant’s penetration tests are tailored to an organization’s environment and needs, assessing specific aspects of the security program and the state of its critical systems, networks, and applications.
Mandiant security experts simulate the tactics, techniques, and procedures (TTPs) of real-world attackers targeting your high-risk cyber assets. Our deep knowledge of advanced attacker behavior can help you:
Mandiant consultants conduct penetration tests customized to your environment – no two assessments are ever the same. With a wide variety of options, each can provide you with unique information that can dramatically improve your organization’s security.
External or internal penetration test
Better understand risks to business assets with tests that use the internet or simulated malicious insider to identify and exploit vulnerabilities on systems, services, and applications.
Web application assessment
Prevent unauthorized access to or exposure of applications that broker access to critical data with comprehensive tests of security vulnerabilities for web or mobile apps.
Cloud penetration testing
Assess the effectiveness of existing cloud security defense capabilities and controls. With expertise across popular cloud platforms, our service is tailored to meet the needs of your organization’s cloud-hosted resources.
Social engineering assessment
Learn how an organization reacts to the exploitation of human beings with security awareness and security control assessments focused on manipulation through email, phone calls, media drops, and physical access.
Embedded device/IoT penetration testing
Assess the security of your device by attempting to exploit the embedded firmware, control the device by passing or injecting unsolicited malicious commands, or modify data sent from the device.
ICS penetration testing
Combine penetration testing and exploitation experience with industrial control system expert knowledge to prove the extent an attacker can access, exploit, or otherwise manipulate critical ICS/SCADA systems.
Target reconnaissance: Mandiant consultants gather information about your environment, including company systems, usernames, group memberships, and applications.
Vulnerability enumeration: Mandiant security professionals seek to identify your exploitable vulnerabilities and determine the best way to take advantage of them.
Vulnerability exploitation: Penetration testers attempt to realistically exploit the identified vulnerabilities using a combination of publicly available exploit code, commercial penetration testing tools, and customized exploit code and tools.
Mission accomplishment: Mandiant experts gain access to your internal environment.
Tactics could include internet access, data theft from segmented environments, or device subversion with malicious commands.