Internal Network Penetration Testing
Praetorian identifies and examines vulnerabilities for internal, Intranet systems to determine whether they can be exploited by an attacker to compromise targeted systems, or used to gain access to sensitive information.
Internal penetration testing methodology →
Mobile App Penetration Testing
Using a combination of manual and dynamic analysis along with custom automated fuzzing, Praetorian's Mobile Security Testing covers areas such as storage protection, transport protection, authentication, authorization, session management, data validation, and error and exception handling.
Mobile Penetration Testing methodology →
Wireless Penetration Testing
Praetorian's wireless penetration testing and assessment services evaluate the security of your organization's wireless implementations and provide recommendations for improvement.
Wireless penetration testing methodology →
Phishing Campaign Testing
A simulated phishing campaign test establishes a phishing attack vulnerability benchmark as well as a structured, on the spot user awareness training where employees learn how to help keep the organization safe and secure.
Phishing campaign methodology →
External Network Penetration Testing
Praetorian identifies and examines vulnerabilities for external, Internet facing systems to determine whether they can be exploited by an attacker to compromise targeted systems, or used to gain access to sensitive information.
External penetration testing methodology →
Application Penetration Testing
The overall goal of an application penetration test is to uncover software vulnerabilities, demonstrate the impact of the weaknesses, and provide recommendations for mitigation. During a penetration test, Praetorian has two primary objectives: the obtainment of unauthorized access and/or the retrieval of sensitive information.
Application penetration testing methodology →
Product Penetration Testing
The overall goal of a product penetration test is to uncover software vulnerabilities, demonstrate the impact of the weaknesses, and provide recommendations for mitigation.
Product penetration testing methodology →
Social Engineering Testing
Social engineering is commonly defined as a technique that uses persuasion and/or manipulation to acquire unauthorized access. While email phishing is more prevalent, telephone and physical social engineering campaigns can also be used to induce human reaction.
Social engineering methodology →
ATM Penetration Testing
ATM platforms offer a unique attack surface that requires a multi-disciplinary approach to testing methodologies that incorporates all aspects of the device under test including: physical access, local peripheral access, network surface, and software interfaces.
ATM penetration testing methodology →