Testing

External Penetration Testing

Sprocket looks for risks and security vulnerabilities utilized by real-world hackers against your attack surface. Find forgotten and vulnerable applications as well as the more uncommon attack paths posing real risk to your organization.

Discovery Methodology

Discovering weaknesses
across your attack surface.

Our team dives deep with a proven methodology to discover security holes in your websites, assets, services, configurations, and authentication processes.

Your team can provide a scope or allow us to find company assets ourselves. Continuous Penetration Testing drives us to improve our open-source reconnaissance methods constantly.

Testing Techniques

A blend of both automated and manual testing procedures.

Unique and proprietary techniques drives what Sprocket does. Automated and manual testing procedures allow our testers to carry out unique attack paths that many other firms miss.

Our guiding star is Continuous Penetration Testing meaning that what testers do during your engagement is cutting-edge and represents the latest risk to companies today.

Explore The External Testing Blog

Reporting & Remediation

Engage with Findings and generate reports within the Sprocket Portal.

Following External Penetration Testing, our team reports on their Findings. You'll gain access to real-time analytics on your remediation velocity, attack surface, and threat detection.

The Sprocket Platform makes it easy to maintain PCI & SOC2 compliance. Clients are able to generate attestation reports and Executive Summaries on demand.

How It Works

External Testing Methodology

Reconnaissance

Sprocket learns about your organization using the latest attack techniques with publicly available information. Port scans are not all Sprocket does. Testers search proprietary sources for up-to-date information about your company's assets. This enables us to identify key weaknesses across your security perimeter.

Vulnerability Analysis

Testers dive deep to discover vulnerabilities across your attack surface. Whether it be outdated web applications or misconfigurations, Sprocket discovers risk. Testers meticulously catalog services, assets, applications, and configurations in need of review with actionable insights.

Credential Abuse

Another large part of our testing process is attempting to guess employee credentials. Our testers have worked tirelessly to perfect this process to heighten the chances for success. Employee credentials are a pivotal part of most compromise scenarios. Testers have turned this process into a science.

Exploitation

Information collected during reconnaissance, vulnerability analysis, and credential abuse enables us to attempt exploits upon your assets and breach the perimeter. Testers will attempt to leverage compromised credentials, gaining us access to your internal network and company resources.

Post-Exploitation

After breaching the perimeter, testers then showcase the real impact on your organization by leveraging lateral movement and privilege escalation. Testers attempt to access personally identifiable information, critical business infrastructure, and intellectual property to showcase what the real bad guys are targeting.

Service Delivery

Clients gain access to our proprietary portal platform, helping drive the remediation of our findings. Reports are compiled for both business leaders and information technology teams alike. Testers make sure every stakeholder involved receives actionable insights in the report.

Continuous Human & Automated Security

The Expert-Driven Offensive
Security Platform

Continuously monitor your attack surface with advanced change detection. Upon change, testers and systems perform security testing. You are alerted and assisted in remediation efforts all contained in a single security application, the Sprocket Platform.

Watch Demo Request Quote

Expert-Driven Offensive Security Platform

  • Attack Surface Management
  • Continuous Penetration Testing
  • Adversary Simulations