Penetration tests

Find your vulnerabilities before someone else does

Information about technical vulnerabilities of information
systems being used shall be obtained in
a timely fashion, the organization’s exposure to such vulnerabilities evaluated, and appropriate measures taken to address the associated risk.”

Annex A of
ISO 27001:2013

About Pentests

In a pentest your IT-systems are tested for vulnerabilities that can be used by cyber criminals to penetrate your network. Specialist are conducting a real-life simulation of hacking into your systems. Pentest or ethical hacking as it is also called help your organisation protect critical data. eBuilder Security provide pentests as a service.

Staying ahead

Cybercrimes are skyrocketing. By 2025, the annual damages for cybercrimes will have reached 10.5 trillion dollars according to AIG. That is almost half the US GDP. Cybercrimes have become an industry with traditional products and services. Hacking tools can be rented or purchased as regular software. Level of sophistication is growing for each year. Preventing a cyber-attack is essential to stay ahead of a growing threat to organizations across the world.

Comprehensive Pentest

eBuilder Security provides comprehensive penetration testing that follows a strict methodology. It is manual work where specialists are simulating a real-life hacker attack using our own methodology (see below). The goal of the penetration test is to find vulnerabilities that can be used by hackers to attack your organization. Pentest also improve your organization’s skills i handling major incidents.

Methodology

1

RECONNAISSANCE

Gather information from online data sharing web sources and from the client on business requirements. Leverage on phishing wherever applicable.

2

ASSESS AND ANALYZE

Identify critical application pages and perform automated scans to identify vulnerabilities. Analyze, verify and eliminate false positives from vulnerability analysis report.

3

EXPLOIT AND PENETRATE

Attempt exploitation techniques on identified vulnerabilities. Penetrate into the underlying infrastructure using the application vulnerabilities.

4

ATTACK PERSISTENCE

Establish access, replicate attack and escalate privileges. Pivot through the network and penetrate into other critical servers like AD, Mail server etc.

5

RAPID REPORTING CYCLE

The overall goal of the Rapid Reporting Cycle is to reduce the time between detection and resolution of security issues. This is in contrast to traditional reports, where consultants provide reports only at the end of work.

6

VERIFICATION

After the security threats have been removed, verification tests are executed.

Trusted Globally

eBuilder has provided cyber security solutions to global customers in the private and public sector for over a decade. Among our customers are Government Agencies, Swedish Defence Industry, and a number of International Banks. We work with the latest tools and methods to ensure our customers IT-environment is secure 24/7/365. Our headquarters are located in Stockholm, Sweden.

ebuilder-security-pentester

our history

1
2000
Parcelhouse was founded with its headquarters in Stockholm.
2
2005
Parcelhouse and Marakanda are merged under the name of eBuilder.
3
2007
eBuilder's ASA plattform is used in 80+ countries with more than 500,000 users.
4
2011
5,000 employees in the Swedish public sector are using eBuilder's Travel System.
5
2016
eBuilder and Acunetix commence a partnership to provide vulnerability management services for eBuilder's customers in the financial sector.
6
2021
eBuilder Security becomes a new business unit.

Start improving your Cyber Security Today.

Click to access the login or register cheese