Speak directly to a qualified member of staff 0845 301 5778

A Decade of Success!

Step 3 - Gaining and Maintaining Access

This phase involves one of our ethical hackers attempting to actually gain access to the target systems or network. The exploit could occur over a LAN, the internet or our hacker could utilise deception or theft.

After the scanning phase, and when the ethical hacker has obtained all of the information that they require about the target network, they will try to exploit possible system vulnerabilities in order to gain access to the actual network. Additional vulnerabilities could also be created using backdoors, Trojans or diallers. The penetration tester might need to use 'sniffer' techniques in order to capture data packets from the target network.

This is the most important stage of penetration testing in terms of establishing the potential damage to the target systems. During a real security breach it would be this stage where the hacker could utilize simple techniques to cause irreparable damage to the target system.

What a hacker could and could not do would depend, primarily, on:

  • Architecture;
  • Configuration of the target system;
  • Individual skill of the hacker; and
  • Initial level of access obtained;

Brochures & Newsletter Subscription

Digital evidence is now more important than ever to the construction of a successful case. Unfortunately, the correct way to handle and examine such evidence is in a seemingly constant state of flux. Keep up to date with the latest changes and stay ahead of the curve by subscribing to our newsletter. Simply enter your email address in the box below then click subscribe:

About Us

about

Fields Associates is a consultancy firm specialising in digital forensics, security and electronic discovery who have, following our formation in 1999, assisted numerous high-profile and prestigious clients from solicitors firms, law-enforcement agencies and numerous organisations within both the private and public sectors.


Technology now plays a prominent role in our everyday lives and the need to have a robust, skilled and reliable team of experts to hand cannot be understated. Irrespective of whether you require assistance discovering evidence stored on any kind of electronic device, an expert report or witness testimony to assist with litigation or to implement new and more dependable information security systems, Fields Associates has the expertise and experience to meet your needs.


  • checked
  • acs
  • acs
  • acs
  • acs