The penetration testing service applies a systematic approach to uncovering vulnerabilities that leave your critical assets at risk. It is comprised of four steps: target reconnaissance, vulnerability enumeration, vulnerability exploitation and mission accomplishment.
In target reconnaissance, Mandiant consultants gather information about your environment, including company systems, usernames, group memberships and applications.
For vulnerability enumeration, Mandiant security professionals seek to identify your exploitable vulnerabilities and determine the best way to take advantage of them.
In vulnerability exploitation, penetration testers attempt to realistically exploit the identified vulnerabilities using a combination of publicly available exploit code, commercial penetration testing tools and customized exploit code and tools.
Finally, we arrive at mission accomplishment, which may be in the form of Mandiant experts gaining access to your internal environment via the Internet, stealing data from segmented environments or subverting a device with malicious commands.