Pentest Logo

Network Reconnaissance Service

Helping you understand your IT network, the assets within it and to identify where potential cybersecurity issues exist

Our network reconnaissance service

One of the fundamental security challenges within an organization is the visibility gap between assumed, or known infrastructure, and what exists. After all, if you can’t see a legitimate device on your network then how can you properly defend it?

Similarly, if you are missing legitimate devices, are you also missing unauthorized ones too? Devices that could provide backdoors into your network and leave your infrastructure exposed.

Whether it’s because of merger activities, personnel changes, or infrastructure changes over time, it is estimated that the average ‘shadow IT’ visibility gap in large organizations is around 40% of the total network infrastructure.

Our network reconnaissance service is designed to provide you with an accurate, 360-degree view of your IT network and the assets within it, helping you make informed decisions when it comes to your cybersecurity.

Benefits of our network recon service:

Understand your IT network

Identify potential weaknesses

Support your cybersecurity improvement

Network reconnaissance phases

Whether you’re looking for a one-off review of your digital network or a regular assessment, our network reconnaissance service is tailored to your needs, utilizing both software tooling and cybersecurity consultancy services to ensure you get the best possible results.

Our service typically consists of two testing phases:

Phase 1: Discovery

The discovery phase uses non-invasive techniques to gather a list of domains, IP ranges, and other assets believed to belong to the organization. Once we have a list, we will confirm ownership of these assets and seek approval to obtain further information.

Phase 2: Active Reconnaissance

During the active reconnaissance phase, network traffic will be sent directly to the approved assets, allowing us to enrich the asset register with details such as the open ports, software versions running, and screenshots of any web applications or services.

Network reconnaissance process

Every network reconnaissance engagement goes through a rigorous process to ensure you get the best possible results for your organization. Below we outline the key stages our engagements go through:

1. Understanding your test requirements

No two organizations, or networks, are the same. We work with you to gain an in-depth knowledge of your needs and a detailed understanding of the network under investigation, before putting forward a bespoke proposal of work.

2. Expert led, manual testing

Our network reconnaissance service is conducted manually by our expert consultants and is designed to fully uncover your digital estate. All our consultants are directly employed by us, meaning we ensure the highest quality of service.

3. Reporting, tailored to your needs

Reporting isn’t just a piece of paper, it’s a process. Our reporting process can be tailored to suit your needs, providing you with timely, relevant, and detailed information, not just on our findings but also our expert remediation advice.

4. Post-test support & documentation

Our job doesn't finish on the delivery of a test report. We make our security consultants available after the test to provide you with the remediation support you need and to help prioritise your cybersecurity next steps.

Like the sound of our network recon approach?

You can find out more about our test process and why it sets us apart.

Find out more about our network reconnaissance service

Our team are on hand to provide you with the information you need. Please fill out the form below and one of our team will be in touch shortly.