First Base Technologies

Contact Us
Phone 01273 454525
email

Mobile Device & MDM Penetration Testing



Mobile Device Penetration Testing Methodology

Our penetration testing services are conducted by skilled professionals using the latest tools, best practice and our own proprietary testing techniques.

  • Conduct a penetration test against standard build mobile devices.
  • Analyse the mobile device for physical security weaknesses
  • Simulate real-world attack vectors by connecting the devices to our test wireless network.
  • Conduct unauthenticated attacks against the device (e.g. simulating a device being stolen).
  • Examine the mobile device from an authenticated perspective to determine if access to sensitive data is possible.
  • Attempt to subvert operating system controls, access data stored on the devices and compromise the client network.
  • Conduct physical tests on one of the supplied devices, such as the removal and forensic analysis of the drives.
  • If MDM is in use, examine the policies in use on the device.
  • The test process is creative and the tester will conduct tests appropriate to the environment and client organisation.


Hover over each segment of the diagram below to read about each stage of the testing process.

At First Base Technologies we pride ourselves in being with you every step of the way in securing your mobile devices from attack.

More Information

You can read our FAQ on penetration testing and vulnerability analysis here

See what our clients say about us here


Contact Us
+44 (0)1273 45 45 25

CREST


ISO 27001


ISO 9001


CREST Cyber Essentials

E&OE
© 2001-2015 First Base Technologies LLP - All Rights Reserved.
First Base Technologies LLP is a limited liability partnership registered in England & Wales, number: OC352070
Website designed and mastered by
didilogix


W3 Org says this page is HTML 4.01 compliant