Assessing the security of information systems. Penetration testing (Pentest)

Analyzing the security of company data by simulating the actions of an intruder to penetrate the information system.

We conduct testing by Black Box, Gray Box, White Box method

  • Collection of preliminary information about the system under test;
  • Inventory of information systems and resources, identification;
  • Identification of vulnerabilities related to technologies used in the target system;
  • Analysis of configuration files of network equipment, information security tools, servers and workstations;
  • Verification (exploitation) of detected vulnerabilities (if necessary);
  • Reconciliation of false positives and identification of actual vulnerabilities; Reconciliation of “false positives” of vulnerabilities and identification of current vulnerabilities; Reconciliation of “false positives” of vulnerabilities and identification of current vulnerabilities in the target system.

Interested
in cooperation?

Leave your contacts and we will contact you shortly

Start cooperation
Start