Penetration Testing [PenTest]

Brick House penetration testers use ethical hacking methodologies to identify your vulnerabilities and minimize your risk, protecting your organization against the most current threats.

Penetration tests can appear daunting when your main concern is keeping your business and network operations up and running. Brick House penetration testing is system-friendly and won’t interfere with your business. Brick House Pen Testers identify the root cause of your vulnerabilities and offer advice on establishing preventive security measures and eliminating future problems. By receiving a thorough evaluation of your organization’s internal and external network, you will be able to understand the primary source of your vulnerabilities.

Knowing the root cause of your vulnerabilities is the first step to address your network’s issues. Brick House Pen Testers give you the personal advice you need to remediate and maintain a secure network going forward. Your precise and detailed report contains graphs and tables that explain your vulnerable items, the potential for exploitation, and remediation steps. Save time and focus your efforts by using your Brick House threat report with step-by-step explanations. Included in your Brick House penetration test is additional consulting for remediation assistance, security, and the opportunity to retest your system.

Thoroughly testing your environment through a manual penetration test helps you identify logic and design flaws that would not be discoverable otherwise. Brick House Pen Testers undergo rigorous data security best practices training and want to help you get secure, not just check the compliance box. Brick House will assign you a clear point of contact who will be available to answer your questions and ensure you are fully satisfied with your pen test’s accuracy.

The type of penetration test you choose will depend on the areas of your environment you want to address. Here are a few types to consider.

Network Layer Penetration Test

A network penetration test is used to locate security issues within your design, implementation, and maintenance of servers, workstations, and network services.

Application Penetration Test

An application penetration test discovers security issues resulting from insecure development practices in the design, coding, and publishing of the software.

Segmentation Checks Penetration Test

A segmentation check is used to identify whether there is access into a secure network because of a misconfigured firewall.

Wireless Penetration Test

A wireless penetration test can identify misconfigurations of authorized wireless infrastructure and the presence of unauthorized access points.

Brick House penetration testing includes four primary steps and continual assistance, so you don’t have to wonder what comes next.


During this phase, you will experience a pre-engagement conference call covering your pen test needs, methodologies, the scope of your pen test, and pen test date. Closer to your pen test date, you will receive a questionnaire that collects the needed information and documentation. You will then work with your pen tester to ensure your office is prepared for the test and that you won’t experience any downtime.


Brick House Pen Testers then attempt to find and exploit your vulnerabilities by using industry-standard methodologies such as target profiling and enumeration, automated testing, service research, and application analysis. Brick House Pen Testers document everything they find, simplifying remediation.


Within six weeks, you will receive your threat report that includes a narrative of the pen test findings. Once you have analyzed your report, you can work with a Brick House Pen Tester to receive advice on how to remediate and patch any weaknesses.


Once you’ve finished your first remediation phase, a pen test analyst will schedule a retest of your system, checking for proper patching. Unlike many other penetration testing firms, Brick House penetration testing includes retesting in your initial quote.