{"id":1252,"date":"2015-10-27T13:26:36","date_gmt":"2015-10-27T13:26:36","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=1252"},"modified":"2023-03-24T17:59:20","modified_gmt":"2023-03-24T12:29:20","slug":"external-penetration-testing-case-study","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/","title":{"rendered":"External Penetration Testing &#8211; Case Study"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2015\/10\/pentest-1.jpg\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"pentest - Varutra Consulting\"><\/p>\n<h3><strong>ABSTRACT<\/strong><\/h3>\n<p style=\"text-align: justify\">External Penetration Testing consists of a reviewing and assessing the vulnerabilities that could be exploited by external users\/Hacker without any credentials or without having any access to target system.<\/p>\n<p style=\"text-align: justify\">The assessment basically plays vital role in ensuring perimeter security, infrastructure security of the organization which may or can leads to the impact of business as Sensitive information present. Also it will ensure about possibilities of external threats\/attackers &amp; behavior of them as well, to minimize risk and threat ratio External Network Security Assessment has taken into consideration.<\/p>\n<p style=\"text-align: justify\">If External Network Security is not taken seriously, will leads to information\/data theft which will be damage to the image of the company\/organization\u2019s brand and ultimately it will affect whole business of the organization. This will show whether there has been a Return on Investment (ROI) of existing implemented security controls, such as firewalls, intrusion detection and prevention systems, or implemented application defenses.<\/p>\n<p style=\"text-align: justify\">The role of a pentester is to perform penetration testing of the internet facing network, find vulnerabilities and try to exploit vulnerable systems\/network to obtain confidential and sensitive information which can or may compromise the network perimeter and suggest measures to remediate the security issues to secure the network.<\/p>\n<p style=\"text-align: justify\">Varutra\u2019s penetration testing methodology is in accordance with best standards and follows guidelines from OSSTMM, OSINT, NIST and OWASP. It makes use of our extensive experience in penetration testing and security assessment to discover previously missed vulnerabilities providing an impact level of security assurance.<\/p>\n<p style=\"text-align: justify\">This is a case study of an external network penetration test that Varutra performed on one of the overeas client organization proving egovernance. Some of the information has been changed or modified to maintain confidentiality.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>BACKGROUND<\/strong><\/h3>\n<p style=\"text-align: justify\">The client network was consisting of various technologies such as firewall, routers, IPS, web servers etc. \u00a0The goal was to understand the current level of external risks which may compromise the sensitive data of the customer as well as the organization. Mainly we had to understand about infrastructure of client network &amp; based on it we started the Penetration Testing. Client commissioned Varutra to carry out an external penetration testing and supplied Varutra with the external IP address ranges to be tested. No other information given such as live IP addresses, name, type, nature of systems along with the underlined services running on them.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>APPROACH AND METHODOLOGY<\/strong><\/h3>\n<p style=\"text-align: justify\">Varutra consultants then proceeded with the following stages of the penetration test:<\/p>\n<p style=\"padding-left: 30px\"><strong>Information gathering (Active &amp; Passive)<\/strong><\/p>\n<p style=\"padding-left: 60px\">&#8211; Attacking on DNS<\/p>\n<p style=\"padding-left: 60px\">&#8211; Discovering Firewall &amp; IPS<\/p>\n<p style=\"padding-left: 60px\">&#8211; Scanning for External IP\u2019s and associated systems, services.<\/p>\n<p style=\"padding-left: 30px\"><strong>Attacking WordPress application<\/strong><\/p>\n<p style=\"padding-left: 30px\"><strong>Attacking Joomla\u00a0application<\/strong><\/p>\n<p style=\"padding-left: 30px\"><strong>Attacking Web Servers<\/strong><\/p>\n<p style=\"padding-left: 60px\">&#8211; Attacking Web Applications<\/p>\n<p style=\"padding-left: 60px\">&#8211; User Account Bruteforcing<\/p>\n<p style=\"padding-left: 30px\"><strong>Attacking Network Layer<\/strong><\/p>\n<p style=\"padding-left: 60px\">&#8211; Attacking Web Servers<\/p>\n<p style=\"padding-left: 60px\">&#8211; Attacking Email Server<\/p>\n<p style=\"padding-left: 60px\">&#8211; Firewall Evasion<\/p>\n<p style=\"padding-left: 30px\"><strong>Producing a detailed report of issues and recommendations with proof of concepts screenshots<\/strong><\/p>\n<p style=\"text-align: justify\">Varutra has followed scenario based assessment approach for the Penetration Testing Phases.<\/p>\n<p style=\"text-align: justify\">During an External Penetration Test, Varutra can take the perspective of a known or unknown external threat to the organization. Varutra has started footprinting of the organization using Open Source Intelligence (OSINT), Domain Name System (DNS) reconnaissance, NSLookup and other techniques to identify all information that belongs to the client\u2019s network &amp; infrastructure. Varutra started identifying and discovering ports with respect to its services on each workstation and identified vulnerabilities associated with them.<\/p>\n<p style=\"text-align: justify\">During the attack phase, Varutra attempts to find all possible ways which can breach client\u2019s network using the combinations of tools and techniques employed by hackers in real world attacks. Mainly targets includes web applications\/web servers, email system, firewalls and personal information through techniques of Social Engineering attacks.<\/p>\n<p>\u00a0<a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2015\/10\/ExternalPenetrationTesting1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1271 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2015\/10\/ExternalPenetrationTesting1.jpg\" alt=\"External Penetration Testing Methodology\" width=\"2376\" height=\"1833\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2015\/10\/ExternalPenetrationTesting1.jpg 2376w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2015\/10\/ExternalPenetrationTesting1-300x231.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2015\/10\/ExternalPenetrationTesting1-1024x790.jpg 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2015\/10\/ExternalPenetrationTesting1-768x592.jpg 768w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2015\/10\/ExternalPenetrationTesting1-1536x1185.jpg 1536w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2015\/10\/ExternalPenetrationTesting1-2048x1580.jpg 2048w\" sizes=\"(max-width: 2376px) 100vw, 2376px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Figure: External Penetration Testing\u00a0Methodology<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>KEY FINDINGS\/OBSERVATIONS<\/strong><\/h3>\n<p style=\"text-align: justify\">Varutra identified and analysed network perimeter based on the scanning techniques and responses getting from the target. Identified firewall IP which was giving wrong information regarding ports i.e. firewall was misconfigured showing closed ports as well. While doing web server assessment we came across web-server running with outdated version of Apache which leads us conducting Denial of Service attack on the web-server. The attack was successfully achieved. On the web application layer Varutra found multiple critical vulnerabilities such as SQL Injection, XSS, HTML Injection, and Improper Session Management as well as some low and informational level vulnerabilities. This all assessment done with the automated testing using commercial and open source tools as well as\u00a0extensive manual testing for verification and validation. This was the most important phase of a penetration test because it effectively demonstrates the impact of breach for the concern organization. Main targets in this phase were security credentials and other personal information, web-server\/website credentials and sensitive proprietary information of organization (such as source code, or internal methodologies and formulas).<\/p>\n<p style=\"text-align: justify\">In the final deliverable, Varutra has provided in detailed information for each and every vulnerability which was discovered and exploited, including suggested recommendation or mitigation steps. Finally, Varutra has provided a detailed step-by-step impact of the breach to target organization which explains how several low severe vulnerabilities also can be linked together to achieve a complete and successful compromise.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>KEY HIGHLIGHTS<\/strong><\/h3>\n<p>Varutra consultants completed Penetration Testing process with scenario based. Main key highlights of the testing are listed below:<\/p>\n<p style=\"padding-left: 30px\">1. Initial scoping of the network was conducted to map and identify the current network, sensitive assets, entry points, existing security mechanisms etc.<\/p>\n<p style=\"padding-left: 30px\">2. Conducted penetration testing on the target network devices and systems.<\/p>\n<p style=\"padding-left: 30px\">3. Exploit tests carried out, such as mail spoofing and DNS zone transfer.<\/p>\n<p style=\"padding-left: 30px\">4. Consultants leveraged on the known vulnerabilities to further penetrate the network and identify the impact of the vulnerabilities if getting exploited.<\/p>\n<p style=\"padding-left: 30px\">5. Technical, in depth list of issues listed and recommendations on reducing the risk starting with the most critical.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>DELIVERABLES<\/strong><\/h3>\n<p style=\"text-align: justify\">The reports and remediation information provided by Varutra were customized to match the Client\u2019s operational environment and requirement. The following reports were submitted to the client:<\/p>\n<p style=\"padding-left: 30px\">1. <span style=\"text-decoration: underline\">Executive Report<\/span>: Overview of the entire engagement, the vulnerabilities statistics and the roadmap for the recommendations made to mitigate the threats identified.<\/p>\n<p style=\"padding-left: 30px\">2. <span style=\"text-decoration: underline\">Technical Report<\/span>: Comprehensive information, proof of concept examples and detailed exploitation instructions of all the threats\/vulnerabilities identified and remediation for the same.<\/p>\n<p style=\"padding-left: 30px\">3. <span style=\"text-decoration: underline\">Mitigation Tracker<\/span>: Simple and comprehensive vulnerability tracker aimed at helping the IT asset owner\/administrator to keep track of the vulnerabilities, remediation status, action items, etc.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>BENEFITS<\/strong><\/h3>\n<p style=\"text-align: justify\">Our Penetration Test helped the client to identify the potential threats \/ vulnerability that could have compromised their network and its components. We also assisted them in assessing percentage of potential business and operational impacts of successful attacks\/exploitation.<\/p>\n<p style=\"text-align: justify\">Additionally, the client gained the following benefits:<\/p>\n<p style=\"padding-left: 30px\"><strong>* Risk Benefits<\/strong>: Varutra minimized security risks by assessing and analysing the client\u2019s infrastructure vulnerabilities and recommended solutions and remediation with proven methods to enhance security of organization.<\/p>\n<p style=\"padding-left: 30px\"><strong>* Cost Savings<\/strong>: Varutra suggested cost-effective risk-mitigation measures based on the client\u2019s business requirements that would ensure security and continuity of the business.<\/p>\n<p style=\"padding-left: 30px\"><strong>* Customer Satisfaction<\/strong>: Penetration testing was conducted with minimum interruption and damage across client systems\/workstations to identify security vulnerabilities, their impacts and potential risks.<\/p>\n<p style=\"padding-left: 30px\"><strong>* Compliance<\/strong>: As an added bonus, the client was able to utilize the information gained from this Penetration Test to easily gain industry certifications and provide a higher level of service to its customers.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>REFERENCES<\/strong><\/h3>\n<p>https:\/\/www.dionach.com\/library\/network-penetration-test-case-study<\/p>\n<p><a href=\"http:\/\/www.testlab.com.au\/images\/pentest.png\">http:\/\/www.testlab.com.au\/images\/pentest.png<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>AUTHOR: <\/strong><\/p>\n<p>Omkar Joshi &amp; Chetan Gulhane<\/p>\n<p>Security Consultant, Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>ABSTRACT External Penetration Testing consists of a reviewing and assessing the vulnerabilities that could be exploited by external users\/Hacker without any credentials or without having&#8230;<\/p>\n","protected":false},"author":3,"featured_media":2970,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[140,261,278,282,274],"tags":[98,99,101,102],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Case study of external penetration testing that we performed on one of the client organization proving egovernance. Approch, Methodology and Benefits.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"External Penetration Testing - Case Study\" \/>\n\t\t<meta property=\"og:description\" content=\"Case study of external penetration testing that we performed on one of the client organization proving egovernance. Approch, Methodology and Benefits.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2015\/10\/pentest-1.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2015\/10\/pentest-1.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"993\" \/>\n\t\t<meta property=\"og:image:height\" content=\"592\" \/>\n\t\t<meta property=\"article:section\" content=\"Case Study\" \/>\n\t\t<meta property=\"article:tag\" content=\"external penetration testing\" \/>\n\t\t<meta property=\"article:tag\" content=\"network penetration testing\" \/>\n\t\t<meta property=\"article:tag\" content=\"network security assessment\" \/>\n\t\t<meta property=\"article:tag\" content=\"penetration testing\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2015-10-27T13:26:36+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2023-03-24T12:29:20+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"External Penetration Testing - Case Study\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Case study of external penetration testing that we performed on one of the client organization proving egovernance. Approch, Methodology and Benefits.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2015\/10\/pentest-1.jpg\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#article\",\"name\":\"External Penetration Testing - Case Study\",\"headline\":\"External Penetration Testing &#8211; Case Study\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/pentest-1.jpg\",\"width\":993,\"height\":592,\"caption\":\"pentest\"},\"datePublished\":\"2015-10-27T13:26:36+05:30\",\"dateModified\":\"2023-03-24T17:59:20+05:30\",\"inLanguage\":\"en-US\",\"commentCount\":1,\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#webpage\"},\"articleSection\":\"Case Study, Ethical Hacking, Network Pentesting, Patch Management, Security Hardening, External Penetration Testing, Network Penetration Testing, Network Security Assessment, Penetration Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#listItem\",\"position\":2,\"name\":\"External Penetration Testing - Case Study\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/\",\"name\":\"External Penetration Testing - Case Study\",\"description\":\"Case study of external penetration testing that we performed on one of the client organization proving egovernance. Approch, Methodology and Benefits.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/pentest-1.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#mainImage\",\"width\":993,\"height\":592,\"caption\":\"pentest\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/external-penetration-testing-case-study\\\/#mainImage\"},\"datePublished\":\"2015-10-27T13:26:36+05:30\",\"dateModified\":\"2023-03-24T17:59:20+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>External Penetration Testing - Case Study<\/title>\n\n","aioseo_head_json":{"title":"External Penetration Testing - Case Study","description":"Case study of external penetration testing that we performed on one of the client organization proving egovernance. Approch, Methodology and Benefits.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"External Penetration Testing - Case Study","og:description":"Case study of external penetration testing that we performed on one of the client organization proving egovernance. Approch, Methodology and Benefits.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2015\/10\/pentest-1.jpg","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2015\/10\/pentest-1.jpg","og:image:width":"993","og:image:height":"592","article:section":"Case Study","article:tag":["external penetration testing","network penetration testing","network security assessment","penetration testing"],"article:published_time":"2015-10-27T13:26:36+00:00","article:modified_time":"2023-03-24T12:29:20+00:00","twitter:card":"summary_large_image","twitter:title":"External Penetration Testing - Case Study","twitter:description":"Case study of external penetration testing that we performed on one of the client organization proving egovernance. Approch, Methodology and Benefits.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2015\/10\/pentest-1.jpg","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"6 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#article","name":"External Penetration Testing - Case Study","headline":"External Penetration Testing &#8211; Case Study","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2015\/10\/pentest-1.jpg","width":993,"height":592,"caption":"pentest"},"datePublished":"2015-10-27T13:26:36+05:30","dateModified":"2023-03-24T17:59:20+05:30","inLanguage":"en-US","commentCount":1,"mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#webpage"},"articleSection":"Case Study, Ethical Hacking, Network Pentesting, Patch Management, Security Hardening, External Penetration Testing, Network Penetration Testing, Network Security Assessment, Penetration Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#listItem","position":2,"name":"External Penetration Testing - Case Study","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/","name":"External Penetration Testing - Case Study","description":"Case study of external penetration testing that we performed on one of the client organization proving egovernance. Approch, Methodology and Benefits.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2015\/10\/pentest-1.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#mainImage","width":993,"height":592,"caption":"pentest"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/#mainImage"},"datePublished":"2015-10-27T13:26:36+05:30","dateModified":"2023-03-24T17:59:20+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"1252","title":"External Penetration Testing - Case Study","description":"Case study of external penetration testing that we performed on one of the client organization proving egovernance. Approch, Methodology and Benefits.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"External Penetration Testing\",\"score\":90,\"analysis\":{\"keyphraseInTitle\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInURL\":{\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"Penetration Testing\",\"score\":100,\"analysis\":{\"keyphraseInDescription\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2015\/10\/pentest-1.jpg","og_image_width":"993","og_image_height":"592","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Case Study","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"Article","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:18:04","updated":"2023-03-24 12:36:12"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/\" title=\"Case Study\">Case Study<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tExternal Penetration Testing \u2013 Case Study\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Case Study","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/"},{"label":"External Penetration Testing &#8211; Case Study","link":"https:\/\/www.varutra.com\/varutravrt3\/external-penetration-testing-case-study\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1252"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=1252"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1252\/revisions"}],"predecessor-version":[{"id":17965,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1252\/revisions\/17965"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/2970"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=1252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=1252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=1252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}