Penetration Testing Service

What is Penetration Testing?

Penetration testing (also known as intrusion testing) is a service that evaluates the security of target systems or networks by simulating cyberattacks. The goal is to verify whether test objectives—such as system intrusion, theft of sensitive information, or acquisition of administrative privileges—can be achieved, and assess the effectiveness of the client’s security measures.

Many organizations regularly perform tabletop security risk assessments or incident response drills. However, few verify whether their security measures and response frameworks will function as expected during actual cyberattacks.

By utilizing our penetration testing services, clients can clearly understand the effectiveness of their internal security measures and frameworks.
Since the scope of systems, networks, scenarios, and reports varies significantly by client, we conduct thorough pre-testing consultations to tailor the service accordingly.

We offer optional re-testing services after the initial test. We believe it is crucial to verify whether identified security threats have been appropriately addressed.

Our Strengths in Penetration Testing Services

Comprehensive Testing through Manual and Automated Methods

・Penetration testing is often conducted within a limited timeframe. Our services leverage both manual testing by engineers and our proprietary automated penetration testing device, MUSHIKAGO, to perform as many tests as possible within the given timeframe and validate the client’s security risks.

Experienced Security Professionals

・Penetration testing experts certified by organizations like OffSec (e.g., OSCP), with experience in international Capture the Flag (CTF) competitions.
・Security experts with backgrounds in critical infrastructure organizations.
・Former consultants from major security firms providing customer-focused services.
・Developers of MUSHIKAGO, offering insights from a developer’s perspective.

Proven Record of Discovering New Vulnerabilities

・Our team includes members actively researching and investigating zero-day vulnerabilities. Depending on the scope of the test, we also examine specific vulnerabilities unique to the client’s environment.

Example Test Scenarios

Our service tailors the test content to the client’s specific needs. Here are examples of past test scenarios:

• Tests targeting externally exposed systems such as websites, DNS, email servers, and VPN devices.
• Simulates external cyberattacks to assess potential security risks.

• Simulates malware execution on endpoints (systems or office PCs).
• Tests the extent of security risks after infection through a simulated C2 server.

• Tests attacks from IT systems to OT systems, attacks within control networks, and analysis of control protocols used in control networks to assess the extraction of sensitive information.

Test Methodology

Clients can choose from the following two methods, or a hybrid approach, depending on their requirements:

Remote Testing

Penetration tests conducted remotely via the internet from our test network.

On-Site Testing

Engineers visit the client’s site or data center to perform penetration tests within their internal network.

Test Flow

1

Inquiry

Please contact us via our inquiry form or by phone.

2

Pre-consultation and proposal (includes email communication)

We will discuss the target systems, network scope, expected scenarios, and report details.

3

Quotation

Based on the information you provide, we will send you a quote.

4

Contract

Upon reviewing and approving the quote, we will proceed with the contract process.

5

Preparations (detailed discussions on test content)

We will conduct a hearing with you to set up the necessary equipment and build the environment for the test.

6

Test execution

The test will be conducted either remotely or onsite, depending on your preference.

7

Reporting

Based on the test results, we will provide detailed information on identified security threats and their countermeasures.

8

Re-testing (Optional)

We will check whether the identified security threats have been appropriately addressed.

1

Inquiry

Please contact us via our inquiry form or by phone.

2

Pre-consultation and proposal (includes email communication)

We will discuss the target systems, network scope, expected scenarios, and report details.

3

Quotation

Based on the information you provide, we will send you a quote.

4

Contract

Upon reviewing and approving the quote, we will proceed with the contract process.

5

Preparations (detailed discussions on test content)

We will conduct a hearing with you to set up the necessary equipment and build the environment for the test.

6

Test execution

The test will be conducted either remotely or onsite, depending on your preference.

7

Reporting

Based on the test results, we will provide detailed information on identified security threats and their countermeasures.

8

Re-testing (Optional)

We will check whether the identified security threats have been appropriately addressed.

Sample Test Items

Our test services are based on internationally recognized penetration testing standards such as NIST 800-115 and PTES (Penetration Testing Execution Standard). We also incorporate the latest security risks. Below are examples of remote test items for externally exposed systems:

Information Gathering on the Target Systems
Test ItemDescription
ICMP ScanUtilize ICMP echo requests to confirm the existence of the target system.
TCP ScanConduct scans on TCP ports to identify open TCP ports on the target system.
UDP ScanConduct scans on UDP ports to identify open UDP ports on the target system.
OS and Version DetectionAnalyze scan results to identify the operating system and its version on the target system.
Detection of Running Services and Version IdentificationAnalyze scan results to identify the exposed services and their respective versions.
FQDN and Domain InvestigationInvestigate the Fully Qualified Domain Name (FQDN) and domain of the target system to confirm server and network information being used by the system.
Vulnerability DetectionIdentify vulnerabilities based on the detected OS and service versions. Prioritize vulnerabilities that can be exploited for initial access or other purposes.
Exploration of Various ServicesTest services like HTTP/HTTPS, SMB, SNMP, FTP, Telnet, SSH, RDP, and various databases by attempting logins using default credentials or password lists to confirm if credentials can be obtained.
Initial Intrusion into Target System
Test ItemDescription
Remote Login Service Login AttemptsIf services such as Telnet, SSH, RDP, or WinRM are available, use valid credentials to test login.
Exploit Code ExecutionIf publicly available exploit codes are applicable, execute them to establish reverse shells or test for arbitrary operations.
Information Gathering Post-Initial Intrusion
Test ItemDescription
Search for Sensitive InformationCollect sensitive information such as account details stored within the system.
User EnumerationObtain a list of local users and, if applicable, Active Directory (AD) users.
Sensitive Information Search in AD EnvironmentsUse techniques such as AS-REP Roasting, Kerberoasting, Silver/Golden Ticket, and DCsync to check if authentication information for AD users can be obtained.
Malware Protection Software InvestigationObtain lists of running processes and files to verify the presence of endpoint protection platforms (EPP) or endpoint detection and response (EDR) solutions.
Local Vulnerability ScanningAnalyze patch information, installed packages, and program details to detect known vulnerabilities. Identify vulnerabilities that could be used for privilege escalation.
Sniffing and Communication AnalysisCapture communication data on the compromised device to identify the protocols used and analyze communication details.
Search for Usable SoftwareIdentify software such as remote login tools or password managers that could be leveraged for privilege escalation or lateral movement.
Privilege Escalation
Test ItemDescription
Using Vulnerabilities for Privilege EscalationIf vulnerabilities suitable for privilege escalation are detected during local vulnerability scans, test if escalation can be achieved using exploit codes.
Using Misconfigurations for Privilege EscalationTest if processes running with administrative privileges can be edited or operated by standard users, or if commands executable by administrators can be run by standard users to escalate privileges.
Using Credentials for Privilege EscalationTest if administrative credentials (passwords or hashes) obtained can be used for privilege escalation.
Post-Privilege Escalation Information Gathering
Test ItemDescription
Search for Sensitive InformationInvestigate the extended range of access granted by administrative privileges to confirm if sensitive information inaccessible to standard users can be obtained.
Search for Authentication CredentialsAccess processes or memory storing authentication credentials to test if such credentials can be obtained.
Lateral Movement to Other Systems
Test ItemDescription
Port Scanning on Other DevicesConduct TCP/UDP port scans on other devices to identify services running on those systems.
Using Vulnerabilities for Lateral MovementExploit vulnerabilities on other devices to establish reverse shells or perform arbitrary operations.
Using Credentials for Lateral MovementUse obtained credentials to attempt login to other systems.

Report

The test results are presented in an easy-to-understand format for clients, utilizing frameworks such as MITRE ATT&CK. They also comply with international penetration testing standards, including NIST 800-115 and PTES (Penetration Testing Execution Standard).

The report primarily consists of the following sections:

1. Recommended Remediation Measures: Suggestions for addressing identified vulnerabilities.

2. Executive Summary: A concise overview of the test results.

3. Detailed Findings: A comprehensive summary of the test results.

Tools Used in this Test

In our testing service, we leverage the following tools, combining manual and automated testing methods to conduct assessments from all possible angles and perspectives:

MUSHIKAGO

Our proprietary automated penetration testing tool supports a wide range of scenarios, including vulnerability detection, exploitation, post-exploitation, and OT system testing. 
More Details >

Metasploit Framework

A de facto standard for penetration testing, offering exploit codes, payloads, and C2 capabilities, serving as a foundational framework for operations.

Cobalt Strike

A framework focused on C2 functionalities, with customizable beacons and configurations, excelling in antivirus evasion.

Other Specialized and Proprietary Tools

We use exploit codes from Exploit-DB, GitHub, and open-source tools, complementing our testing methods across various scenarios.

Certifications and Expertise

Our engineers possess high skills and extensive experience, including certifications such as:

・Information Security Management Specialist
・Offsec Certifications (OSCP, etc.)
・PortSwigger Certifications (BSCP, etc.)

Pricing

We offer discounted rates when performing a platform assessment in addition to the web application assessment. For more details, please contact us.

Inquiries About the Service

Feel free to contact us with any questions about the service.