Dr. Antje Winkler
Penetration Testing
Penetration Testing
With our expertise, we are equipped to thoroughly test your products or systems. We are here to provide guidance and offer the following security testing services:
Using state-of-the-art laboratory equipment, we can analyze all aspects of your embedded systems and IoT devices, from individual sensors to complete ecosystems. As part of our security tests, we provide comprehensive analysis of:
In the realm of web components, we provide penetration testing in accordance with established guidelines like the OWASP Web Security Testing Guide (WSTG). Our services include:
We also conduct thorough source code analysis to identify vulnerabilities in your applications and APIs.
By conducting security tests on your OT and IT environments, you can assess the security of your infrastructure components and internal networks. We offer comprehensive analysis of:
For mobile applications (Android, iOS), we also offer penetration testing based on well-known and up-to-date guidelines such as the OWASP Mobile Application Security Testing Guide (MASTG). Depending on your needs, we conduct the following analyses:
The penetration testing process of BDO Cyber Security GmbH is based on the five-step approach defined in “Study A Penetration Testing Model”, published by the German Federal Office for Information Security (BSI).
During the first phase of the penetration test, test objectives as well as organizational, technical, and legal aspects are coordinated with the client, including:
The results of this phase are documented in a contract, which serves as the legal basis for the penetration testing engagement.
In phase 2, the information and documents provided by the customer are examined, thereby gathering preliminary information about the test object, e.g.,
In parallel, it will be verified whether access to all test components is possible.
Based on the information gathered during previous phases, the list of planned test cases - and therefore the time required - can be adjusted for selected components according to their relevance. This involves identifying, analyzing, and prioritizing potential threats and attack vectors (e.g., based on damage potential, likelihood of success, and possible impacts).
Following the initial analyses, active intrusion attempts are conducted. For this purpose, selected test cases for each component in scope will be executed.
If a test case reveals a (potential) vulnerability, its exploitability and impact are examined:
Furthermore, evidence is gathered for each vulnerability, such as screenshots or step-by-step instructions to reproduce the attack or provoke specific system behaviors.
If applicable, activities from phases 2 and/or 3 will be repeated based on the results and information obtained during this phase. This may involve adding or adjusting test cases, as the presence of certain vulnerabilities could indicate susceptibility to other types of attacks.
The penetration test is concluded with the Final Analysis and Clean-Up Phase. During the final analysis, all results from the previous phases are compiled into a detailed report, including:
If necessary, remnants of the test activities are also removed during this phase.
All tests are primarily conducted manually. This approach allows for the identification of vulnerabilities that automated tools, such as vulnerability scanners, might miss. If feasible, individual test steps may be facilitated using (semi) automated tools. Results, produced by such tools, are reviewed, and analyzed by the test team. If in doubt, automated tests are repeated manually, thereby eliminating false positives.
In the context of the penetration test, test cases are selected and executed based on testing guidelines. While the BSI model for penetration tests categorizes test cases into modules for information gathering (I-Modules) and intrusion attempts (E-Modules), BDO Cyber Security GmbH employs its own framework. The primary reason for this is that the I- and E-Modules are limited to certain technologies, which restricts the testing process.
BDO Cyber Security GmbH's framework is based on recognized, current standards. Specifically, the following guidelines are used depending on the specific test subject: