BSI-Study for Penetration Testing

Penetration Tests according to BSI Implementation Concept Study

Our procedure for penetration tests of IT infrastructures is based on the implementation concept study for penetration tests from the BSI (german Federal Office for Information Security). The study by the BSI names criteria for classifying a penetration test and divides the procedure of a penetration test into different phases. The actual test steps are summarized in so-called I and E modules, with the I modules describing how information is obtained and the E modules describing various intrusion attempts. Even if the implementation concept for penetration tests was last updated by the BSI in 2003, it is still used today due to its general significance.

Our service in nutshell: Conducting Penetration Testing

Since 2013 our certified penetration tester team conduct pentests for IT infrastructures, web applications and mobile APPs (iOS / Android) and using a structured approach based on all relevant publications. As a service provider evaluate the identified and exploited vulnerabilities based on the associated business risk and compiling it into a report that contains a summary for the IT management and the technical details of the vulnerabilities identified. After you fix the vulnerabilities, we usually perform a retest without any additional charge.

  • Structured approach
  • Certifications: OSCP, OSCE, BACPP
  • Identifying technical and business security risks
  • Risk-weighted vulnerability assessment or CVSS scoring
  • Report splitted in management and technical part
  • Retesting included

BSI-Study for Penetration Testing included Methodology

Pentests use the same tools and techniques that real attackers would use to break into a system. It includes the use of security tools and carrying out manual tests to uncover vulnerabilities. Thus is it not a automatic vulnerability assessment. On the contrary, as a service provider for penetration testing we are using the same tools and techniques that real attackers would use to break into a system. But while a real attacker only needs to find and exploit one vulnerability, a penetration tester checks all relevant attack vectors.

Having a structured approach is one of the most important factors to achive this in order to provide a professional pentesting service. Our approach is based on all relevant standards and publications and also includes the requirements of BSI-Study for Penetration Testing.

Getting an Offer

Pentests are always a compromise between effort and cost. Successful pentests offer a good balance between these criteria to facilitate the testing of all relevant attacks and attack vectors. The cost of such a test always depends on the time the penetration tester spends and on the extent and complexity of the IT system or web applications. While a penetration test for a small application takes only som days, it can take several weeks for a large network or complex application.

Binding offers require prior information about the systems and applications that are to be examined. It is important that we get an initial impression of the target. For web applications, for example, test access can be helpful. Any additional information, e.g. the framework etc., can make it easier for us to draft a suitable offer for you. If you need us to pentest an IT system, we will need the corresponding network addresses in advance. In this particular case, we will first perform a non-invasive network scan to get a first look at your network. We will provide a detailed offer once we can estimate the effort required.

binsec GmbH is your security service provider for penetration testing. Please get in touch with us if you would like to get a formal quote or if you have any questions. We are your pentesting vendor!

FAQ

Of course. Please contact us for a quote and a sample report.

It is difficult to give an generalized answer to this question, since the toolset used basically depends on the respective test object. Of course, we use tools such as nmap to check IT infrastructures or the Burp Suite Professional in the case of web applications.

However, we believe that publishing a tool list is mere window dressing, as each target system should be tested individually. However, you are welcome to ask us about the tools we used after the pentest.

If you fix the vulnerabilities within a reasonable amount of time, we would be glad to retest at no additional cost.
Hosting a critical business application on a cloud provider such as Amazon AWS, Microsoft Azure or Hetzner Cloud is becoming more and more common. Of course, we conduct penetration tests for applications that are operated in the cloud. This also applies to cloud infrastructure penetration tests as long as the virtual machines are not managed by the cloud provider itself.
There are three approaches based on the information a penetration tester gets before starting: Black-Box-Pentest, Grey-Box-Pentest and White-Box-Pentest. We always recommend going for grey box pentesting. It has the best cost-benefit ratio if you like to get your complete attack surface tested.
Of course, we also offer Offensive Security and Red Teaming. Basically they are a subcategory of pentesting with a very strong focus on unstructured Ethical Hacking.
We can pentest any business, IT system, application or network, right down to protocol fuzzing. We only leave the analysis of hardware chips under the microscope to others. We test for example: