Back to Top

VPN & RAS Testing

Virtual Private Networks (VPN) services provide access for employees and business partners remote access in to a corporate infrastructure. These VPN service endpoints are under threat from information leak, buffer overflow, DoS, and offline password-grinding attacks. Also, the organization need to make sure that remote users don't introduce spyware and malware to the corporate network.

Digital Assurance's VPN testing starts off by determining the type of VPN implementation in an organisation. These might include IPsec, PPTP, or SSL based VPN capabilities. The main objective of VPN penetration testing is to discover any vulnerabilities in the VPN implementation that an attacker may be able to exploit. This is usually considered a zero-knowledge test where only the IP address of the VPN server is known. The first step in the reconnaissance process entails port scanning the VPN server to make an educated guess on the type of VPN implementation. Then Digital Assurance would determine what we are up against by finding out the vendor and version of the VPN server. Another vital attack vector is the exploitation of inherent vulnerabilities in the protocols used to establish the VPN connection. An attacker may also attempt to exploit vulnerabilities in the vendor's implementation of the specific protocols. The final step is the exploitation of any default user accounts. One of the common vulnerabilities in the implementation of any system is the presence of default system accounts with default passwords.