Do you know the difference between internal pen tests, external pen tests, and wireless pen tests? It matters.
With the threat landscape expanding and criminals taking advantage of security gaps, organizations are turning to controls that can help them limit their exposure. Among other controls, penetration testing stands out because it simulates attackers’ malicious activities and tactics to identify security gaps in business systems or applications. A penetration test aims to understand what vulnerabilities are in business systems, how they could be exploited, and the potential impact if an attacker were successful. Because pen tests thoroughly investigate vulnerabilities, the scope of each pen test must be limited and may differ from test to test.
Pen tests take on different types of perspectives: internal, external, and wireless. In this blog, we will examine what each type of pen testing entails, who conducts these tests, and why they are all worth performing.
External pen tests vet external infrastructure, or all public-facing assets—including the internet at large. Additionally, many organizational applications, like mail servers, websites, or even customer portals maintain a connection to these external networks and can also provide a doorway from which a threat actor can pivot.
External penetration tests are typically what people think of when they hear about pen testing. These tests use the same techniques as adversaries to attempt to exploit weaknesses in an organization’s front facing perimeter or attempt to bypass them altogether with strategies like a phishing campaign or other social engineering methods.
The 2024 Pen Testing Report revealed that 78% of security professionals pen test their external infrastructure. When defending against today’s adversaries, organizations understandably need to know how their first line of defense will hold up.
Internal pen testing proves internal architecture against adversaries who have already gained a foothold in the organization. Since such attacks start with internal access, they may attempt to achieve more high-value objectives including acquiring high-level privileges, compromising the Domain, or accessing other valuable assets and/or information.
Internal attacks can originate from:
And more. Internal threats can be anything from bad hygiene habits, like weak passwords and poor access controls, to system and app misconfigurations and insecure endpoints. When it comes to malicious insiders, the Verizon 2024 Data Breach Investigations Report notes that “Privilege Misuse,” (the new bespoke category), accounted for 897 incidents, 854 with confirmed data disclosure. Considering there were 10,626 total incidents of data disclosure (breaches), that figure amounts to nearly ten percent.
Wireless network pen testing is neither internal nor external but falls under its own category. It involves probing wireless access points and plumbing for vulnerabilities and configuration weaknesses that could allow unauthorized access.
In a wireless pen test, teams will check for vulnerabilities in your corporate Wi-Fi deployment, such as:
And other malicious tactics. The wireless penetration testing review process consists of:
While most organizations honor wired pen tests, wireless penetration tests often get overlooked. However, these types of attacks are significantly easier to launch (and get away with) as it is improbable to block someone from being in the immediate physical vicinity of your Wi-Fi network. Fortra’s wireless pen testing assessment of your wireless protocols identifies vulnerabilities and suggests ways to close those gaps.
Though it’s easy to think that in-house teams would handle all internal tests and external/third party teams would handle external tests, this is not the case. Both teams can conduct internal, external, and wireless pen tests.
Utilizing both types of teams provides the capability to conduct more tests and allows you to get fresh eyes on the problem. Internal teams can mix it up by pen testing wireless assets and go in without bias. External teams could pen test internal systems and help prevent internal teams from getting too used to the environment. And third-party services can also be pulled in to provide a fresh perspective and differing skill sets, helping to simulate the kind of diversity your team will be facing in a real-world scenario against unknown attackers.
Though organizations must make tough choices when deciding which tests they have the time and resources to run, one of the most important criteria to consider is whether you’re balancing internal and external tests. Several things are true:
Today’s cybercriminals aren’t picking and choosing one method alone, and neither should we. It is our job as defenders to be where the bad guys are, and when it comes to attacks, we need to be ensuring our systems from the inside, out.