Penetration Test
The simulation of a cyber attack to test the defences of an infrastructure and reveal potential vulnerabilities.
We exploit vulnerabilities to penetrate systems, as a cybercriminal would do.
How does a Penetration Test work? Here are the steps:
- Information Gathering: It consists of gathering as much information about the target as possible, including technical information.
- Enumeration: to identify valid accounts or shared resources connected to the systems.
- Gaining Access: in this step, the attacker takes control of a system or part of it (OS, network).
- Privilege Escalation: is the phase in which the attacker takes control of a system or part of it (OS, network). It consists of increasing privileges and having total control over systems.
- Maintaining Access: is the phase in which the attacker tries to maintain access to the system.
- Covering Tracks: This is the final stage in which access logs and any artifacts that can trace back to the attacker or the attack itself are removed.
At the end of the Penetration Test activity, we will write and deliver to the client a report containing a list of identified vulnerabilities, a risk analysis of the vulnerabilities and finally a remediation plan containing the solutions to correct them.
Are you looking for an Ethical Hacker?
Hacker Vs Ethical Hacker
The difference lies only in the purpose. Hiring an Ethical Hacker means hiring a professional with the same skills as a criminal hacker to test the resilience of your infrastructure, the main difference is that an Ethical Hacker will stop before creating major damage. An Ethical Hacker can also help a company that has suffered an attack to try to recover stolen data, restore systems by eliminating viruses, or even hunt down the hackers who perpetrated the attack..
Discover all our services
Vulnerability Assessment
Vulnerability Assessment is an analysis of the security which aims to identify and classify system vulnerabilities according to the level of risk.
Discover moreSIEM
SIEM systems allow real-time monitoring of accesses and events, to identify anomalies or critical signals and generate alarms that allow quick response
Discover moreSecurity Assessment
Security Assessment is a detailed analysis of the components of an infrastructure, which gives you a clear and complete picture of the security of your IT ecosystem.
Discover morePenetration Test
The simulation of a cyber attack to test the defenses of an infrastructure and reveal potential vulnerabilities.
Discover moreLog Management
Analyzing Logs allows you to analyze the operations executed in a system and discover the traces left by cyber criminals in case of attacks.
Discover moreCyber Threat Intelligence
The CTI is the Intelligence developed in cybersecurity. It consists in the acquisition and analysis of information in order to identify cyber threats.
Discover more