Our consultants combine manual and automated testing with code reviews in order to achieve excellent coverage of your system under test. We generally perform our testing in a white-box fashion in order to ensure a cost-effective relationship with our clients.
- Read more about penetration testing of web applications
- Read more about penetration testing of mobile applications
- Read more about penetration testing of IT infrastructure, cloud environments and Entra/Active Directory
The anatomy of a penetration test
Although the technical details vary depending on the system under test and the target of the test, the process is the same:
- Scoping of the target and planning is done closely together with the customer. The scope can focus on very specific functionality to identify hard-to-find issues or be broad to cover common issues in a large attack surface. The scope and planning is tailored to the maturity of the system under test and the customer needs. Access and availability to systems and hardware are also considered.
- Startup meeting is held with the customer to kick-off the testing, hand over access and any hardware or other information needed.
- Information gathering and reconnaissance is performed to understand more about the system under test and to tailor the coming test.
- Testing consists of multiple activities which can for example be discovery, scanning, vulnerability assessment, exploitation (post-exploitation), final analysis and review. This is when we challenge the system under test.
- Reporting and presentation of the results are done with the goal to enable improvements of the customer's security. After the report is handed over to the customer, a debriefing presentation is held to showcase and discuss the findings with the customer and interested parties.
The goal of the penetration test is to make security easy and understandable for you and your colleagues, to be aware and take active decisions on improving security.
You will recieve a written report and a presentation during a debrief session detailing the findings, including risk rating and recommended actions for mitigation. We describe the tools used, how the test was performed and the reasoning behind the findings and the risks. Any useful scripts for testing can be handed over. The information we provide can be used to strengthen and improve the security posture of your assets.
Some of our customers use the testing outcome to learn and to improve their own security testing. If there are specific competence gaps we also offer trainings stretching from general introductions to hands-on hacking sessions with your developers and testing teams.
Get in touch to inquire about a penetration test with our experienced team.