project black logo
Penetration Testing

External Network Testing

Discover what attackers see when they look at your organisation from the outside. Our external network testing simulates real-world attacks to identify vulnerabilities in your internet-facing infrastructure before malicious actors can exploit them.

Our Engagement Process

T-14 days

Scoping

Our scoping process begins with identifying all internet-facing assets and infrastructure that should be included in the assessment. We work with you to understand your network architecture and define clear testing boundaries.

This phase ensures we have a comprehensive view of your external attack surface while respecting any testing limitations.

T-7 days

Pre-Testing Preparation

We work with you to establish testing windows that minimise business impact and ensure proper monitoring is in place. This includes setting up appropriate notifications for your security team and confirming emergency contact procedures.

We’ll also verify that all necessary authorisations are in place to conduct external scanning and testing activities.

Start of Testing

Testing begins with our expert team conducting both automated and manual assessments of your external infrastructure. We employ a combination of commercial and custom-built tools to identify potential security weaknesses.

Any critical vulnerabilities discovered during testing are reported immediately to allow for swift remediation.

T+14 Days

Report Delivery and Debrief

Upon completion of testing, we deliver a comprehensive report detailing all discovered vulnerabilities, their potential impact, and specific recommendations for remediation.

Our debrief session walks through the findings in detail, ensuring your team understands the risks and has a clear roadmap for implementing security improvements.

Why External Network Testing?

Identify External Vulnerabilities

Discover and address vulnerabilities in your internet-facing infrastructure before they can be exploited by malicious actors. Regular external testing helps maintain a strong security posture against evolving threats.

Regulatory Compliance

Meet compliance requirements for regular security assessments while gaining actionable insights to improve your security posture. Many regulatory frameworks require regular external security testing.

Validate Security Controls

Verify that your perimeter security controls, including firewalls, IDS/IPS systems, and access controls, are effectively configured and protecting your assets as intended.

Enhance Incident Response

Test your organisation's ability to detect and respond to external threats. External testing provides valuable insights into your security team's capabilities and helps identify areas for improvement in your incident response processes.

Our External Network Testing Methodology

Our external network penetration testing combines automated scanning with extensive manual testing to provide comprehensive coverage of your external attack surface.

Project Black's approach to external network testing follows industry-standard methodologies while incorporating our own expertise and custom tools. Our testing process is aligned with frameworks such as NIST SP 800-115 and the Penetration Testing Execution Standard (PTES).

Below are the key testing categories we focus on during external network assessments:

  1. Open Source Intelligence (OSINT) Gathering
    Before active testing begins, we gather intelligence from public sources to understand your external footprint and identify potential security issues.

    • Domain and Subdomain Enumeration
    • Public Data Source Analysis
    • Digital Asset Discovery
    • Historical Infrastructure Data
  2. Network Enumeration and Discovery
    The next phase involves comprehensive mapping of the external network infrastructure to identify all potential entry points and exposed services.

    • Host Discovery and Port Scanning
    • Service Version Enumeration
    • Network Protocol Analysis
    • Infrastructure Mapping
    • Cloud Service Discovery
  3. Vulnerability Assessment
    We conduct thorough vulnerability scanning and manual verification to identify security weaknesses in network services and infrastructure.

    • Service Misconfiguration
    • Outdated Software Versions
    • Known CVE Exploitation
    • Weak Cryptographic Implementations
    • Protocol-Specific Vulnerabilities
  4. Exploitation and Post-Exploitation
    Controlled exploitation of discovered vulnerabilities to demonstrate real-world impact and identify attack chains.

    • Impact Assessment
    • Vulnerability Chaining
    • Privilege Escalation Testing

Project Black leverages industry-standard tools and methodologies combined with our proprietary testing frameworks to deliver comprehensive external network security assessments.

Ready for a Pentest Quote?

Simply fill out and submit the form, and we'll provide you with a quote within hours - unless you fill it in at 3am!

Contact Us:

  • Privacy Policy (November 2023)
  • This policy outlines how we collect, use, and safeguard your personal information.
  • Information We Collect & How We Use It
  • Contact Form: When you use our contact form, we collect your name, email, and phone number. This is used to respond to your inquiries
  • Microsoft Clarity, Google & Bing Analytics: We use Microsoft Clarity together with Google & Bing Analytics to collect data such as your page views, and visitor behavior on our site. This helps us understand how our website is used to help us improve our site.
  • We do not share your personal data with any third parties, except as necessary for Microsoft Clarity, Google & Bing Analytics analysis, see their privacy policies for more information.
  • Data Security
  • Contact form information is sent via formspree.io as this is a 100% static site to a shared mailbox in Office 365. Access to this mailbox is restricted to specific individuals within our company to ensure the security of your information.
  • formspree.io helps us archive a copy of the form submission where it is retained for 30 days. If you prefer to contact us directly, you can email us at [email protected] for the same purpose.
  • Your Rights
  • You have the right to access, amend, or request the deletion of your personal data. If you have any privacy-related concerns, questions, or requests regarding your personal information, please contact us at [email protected].
  • Changes to Privacy Policy
  • Our privacy policy may be updated periodically. Any changes will be posted here and communicated to individuals who have previously submitted forms.
  • Jurisdiction
  • This privacy policy adheres to the Australian Privacy Principles.