Penetration Testing
Our penetration testers will perform various tests to validate the effectiveness of controls and also to determine the integrity or configuration of an application, a system or network. They are experienced in performing testing within critical operational environments, regulated industries and on a wide range of devices and systems.
Based on the findings of our assessment and testing, we will make recommendations for specific mitigations to reduce risks and prevent incidents in an organisation’s business and operational environment.
Types of Penetration Testing
External Penetration Testing
Internal Penetration Testing
Application Penetration Testing
Physical Penetration Testing
Wireless Penetration Testing
Social Engineering
Our Approach
1
PRE-ENGAGEMENT INTERACTIONS
Represents the phase in which we discuss with the client about the rules of engagement for penetration testing
2
INTELLIGENCE GATHERING
Represents the phase in which data is collected to help guide evaluation actions
3
SCANNING
It is the phase in which our testers will use automatic and manual tools to find vulnerabilities
4
VULNERABILITY ANALYSIS
It represents the phase in which we identify and evaluate the security risks presented by the identified vulnerabilities
5
EXPLOITATION
It is the phase in which our testers will exploit the vulnerabilities found
6
REPORTING
It is the phase in which our testers prepare the penetration test report
7
RETESTING
It is the phase in which our testers validate that the identified vulnerabilities have been successfully fixed
Join us! It will only take a minute
GET STARTED TODAYPenetration Test Report
Executive Summary
It provides a very brief overview of your major findings and their potential impact on the business being tested
Recommendations
Our recommendations for remedial approach
Evaluation Methodology
The evaluation methodology used for automatic and manual penetration testing
Findings Summary
List of all vulnerabilities found and classified according to their risk and impact
Vulnerabilities Details
For each vulnerability, we will include the associated risk, the technical description, the proof of concept, its impact and the recommended remedial actions