Penetration Tests

Penetration Testing Services

Penetration testing is the most effective method for determining how secure an IT infrastructure is. This testing method involves making controlled attempts to exploit system vulnerabilities, such as faulty operating systems, networks, services, and applications; incorrect configurations; and even potentially dangerous actions on the part of end users.  

When compared to a Vulnerability Assessment, which is included in every Penetration Test, this approach will eliminate any false-positive results, and the process of mitigating the vulnerability will be simpler from both a technical and a resource point of view. 

The procedures that are utilised for the identification and evaluation of vulnerabilities are based on the most effective practices in the industry, as determined at the international level. These methodologies include, but are not limited to the following 

  • Open Web Application Security Project – OWASP WSTG/MSTG; 
  • Information Systems Audit and Control Association – ISACA 
  • Penetration Testing Framework 
  • Penetration Testing Execution Standard 

The steps of the assessment are: 

  • Pre-engagement Interactions 
  • Intelligence & Information Gathering 
  • Threat Modelling  
  • Vulnerability Analysis  
  • Exploitation
  • Post Exploitation, Pivoting & Privilege Escalation
  • Reporting & Mitigation, Wiping Evidence