{"id":10395,"date":"2024-01-15T00:34:39","date_gmt":"2024-01-15T00:34:39","guid":{"rendered":"https:\/\/convex-network.ro\/?page_id=10395"},"modified":"2024-06-28T12:56:54","modified_gmt":"2024-06-28T12:56:54","slug":"penetration-tests","status":"publish","type":"page","link":"https:\/\/convex-network.ro\/en\/cyber-security\/cyber-security-services\/penetration-tests\/","title":{"rendered":"Penetration Tests"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10395\" class=\"elementor elementor-10395 elementor-2891\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-2891d64 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2891d64\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8eaf48a\" data-id=\"8eaf48a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7dc4b3b elementor-widget__width-initial elementor-widget-widescreen__width-initial elementor-widget-laptop__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-aux_button\" data-id=\"7dc4b3b\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"go-back\" data-widget_type=\"aux_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<button   class=\"aux-button aux-tiny aux-dark-orange aux-round aux-outline aux-uppercase aux-icon-left\" ><span class=\"aux-overlay\"><\/span><i aria-hidden=\"true\" class=\"aux-icon auxicon2 auxicon2-arrow-backward\"><\/i><span class=\"aux-text\">Back<\/span><\/button>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d8ac11 elementor-widget elementor-widget-aux_breadcrumbs\" data-id=\"7d8ac11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"aux-elementor-breadcrumbs\"><p class=\"aux-breadcrumbs\"><span><a href=\"https:\/\/convex-network.ro\/en\/\" title=\"Home\">Home<\/a><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f28b33e elementor-widget elementor-widget-html\" data-id=\"f28b33e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script type=\"text\/javascript\">    jQuery(document).ready(function() {     jQuery('#go-back').on('click', function() {       window.history.go(-1);        return false;     }); });   <\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-inner-section elementor-element elementor-element-f8b5c0e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f8b5c0e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-09cc300\" data-id=\"09cc300\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ded6685 aux-appear-watch-animation aux-fade-in-right elementor-widget elementor-widget-aux_modern_heading\" data-id=\"ded6685\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h6 class=\"aux-modern-heading-primary\">Penetration Tests<\/h6><div class=\"aux-modern-heading-divider\"><\/div><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-311b910 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"311b910\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e032aaf\" data-id=\"e032aaf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c41b27 elementor-widget__width-initial aux-appear-watch-animation aux-slide-from-bot elementor-widget elementor-widget-aux_modern_heading\" data-id=\"9c41b27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><p class=\"aux-modern-heading-primary\"><\/p><h4 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Penetration Testing Services<\/span><\/h4><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98763a9 elementor-widget elementor-widget-text-editor\" data-id=\"98763a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Penetration testing is the most effective method for determining how secure an IT infrastructure is. This testing method involves making controlled attempts to exploit system vulnerabilities, such as faulty operating systems, networks, services, and applications; incorrect configurations; and even potentially dangerous actions on the part of end users.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">When compared to a Vulnerability Assessment, which is included in every Penetration Test, this approach will eliminate any false-positive results, and the process of mitigating the vulnerability will be simpler from both a technical and a resource point of view.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The procedures that are utilised for the identification and evaluation of vulnerabilities are based on the most effective practices in the industry, as determined at the international level. These methodologies include, but are not limited to the following<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Open Web Application Security Project \u2013 OWASP WSTG\/MSTG;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Information Systems Audit and Control Association \u2013 ISACA<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Penetration Testing Framework<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Penetration Testing Execution Standard<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li><\/ul><p><span data-contrast=\"auto\">The steps of the assessment are:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559731&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Pre-engagement Interactions<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559731&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Intelligence &amp; Information Gathering<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559731&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"7\" data-aria-level=\"1\"><span data-contrast=\"auto\">Threat Modelling<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559731&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"8\" data-aria-level=\"1\"><span data-contrast=\"auto\">Vulnerability Analysis<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559731&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">Exploitation<\/span><\/li><li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559731&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">Post Exploitation, Pivoting &amp; Privilege Escalation<\/span><\/li><li data-leveltext=\"\u25cf\" data-font=\"Arial\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559731&quot;:360,&quot;469769226&quot;:&quot;Arial&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u25cf&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"9\" data-aria-level=\"1\"><span data-contrast=\"auto\">Reporting &amp; Mitigation, Wiping Evidence<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Back Home Penetration Tests Penetration Testing Services Penetration testing is the most effective method for determining how secure an IT infrastructure is. This testing method involves making controlled attempts to exploit system vulnerabilities, such as faulty operating systems, networks, services, and applications; incorrect configurations; and even potentially dangerous actions on the part of end users.\u00a0\u00a0 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":10334,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","footnotes":""},"class_list":["post-10395","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages\/10395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/comments?post=10395"}],"version-history":[{"count":0,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages\/10395\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/pages\/10334"}],"wp:attachment":[{"href":"https:\/\/convex-network.ro\/en\/wp-json\/wp\/v2\/media?parent=10395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}