Enet 1 Group logo
secure enterprise and mobile architecture
Phone: 832-510-7119

Services


 

 

 

 

 

 

Web & Mobility Testing

Penetration Test Mobile Devices and Applications to Protect Your Most Sensitive Data

Penetration testing for mobile device applications

Penetration testing, commonly called pen testing, is necessary on a regular basis for your corporate network; and, if your company accepts credit card payments over the Web, PCI requires pen testing of your system. Most companies do not have pen testers on staff. As a best practice, it is preferred that a third party executes the testing.

Since the addition of a bevy of mobile devices and their applications to most enterprises, it becomes critically important that pen testing is also performed to test mobile components for vulnerabilities. In reality, mobile devices that are removed from the corporate premises and used on a home or other outside networks are more liable for malicious penetration than your static corporate network.

Like most mobile IT concerns, pen testing of mobile applications requires specialized knowledge and experience. The Enet 1 Group has tested mobile applications for over 12 years. We understand the process and what is required.

While the techniques differ, our process remains similar to that used testing network systems.

The process of penetration testing

There are 4 phases of testing:

» Phase 1: Passive Data Collection — This is the information gathering phase and test application as well as networks, both traditional and wireless*:

» Phase 2: Active Intrusion — This phase analyzes the information gathered in Phase 1 and the early stages of Phase 2:

» Phase 3: Report Vulnerabilities and Steps to Mitigate — After evaluation, detailed reports are prepared and sorted by risk, usually color-coded by priority. These reports include the steps required to mitigate risks.

» Phase 4: Aggressive Penetration — Used only when our clients needs to show actual data or system weaknesses:


*Wireless Assessments

Most companies have not kept up with the rapid changes in mobile networks and devices. This provides a prime area for intrusion and requires specific tools and measurements.

**Social Engineering

Perhaps the least known of hacker strategies. Key passwords and other information can lead a creative hacker straight into your network. This information can be gathered by asking someone in the company simple questions that appear to be from a trusted source. Those people who think they can’t be fooled are the most vulnerable.

Make Social Engineering part of your defense strategy. We will train executives and employees to identify a social engineer at work and proactively prevent the intrusion.


The Enet 1 Group Mobile Experience

No company has more experience than our specialists at the Enet 1 Group. We are leaders in penetration testing and in all things connected to mobility. We want to help your network stay secure — on corporate campuses, at employees’ homes, and as they travel with their mobile devices.

Contact us for a full overview of our mobile penetration testing services.

Phone: 832-510-7119

Copyright EnterNet Security, LLC. All rights reserved. EnterNet Security, LLC is the parent company of Enet 1 Group.

Enet 1 Group logo