Penetration Test

The simulation of a cyber attack to test the defences of an infrastructure and reveal potential vulnerabilities.

We exploit vulnerabilities to penetrate systems, as a cybercriminal would do.

How does a Penetration Test work? Here are the steps:

  1. Information Gathering: It consists of gathering as much information about the target as possible, including technical information.
  2. Enumeration: to identify valid accounts or shared resources connected to the systems.
  3. Gaining Access: in this step, the attacker takes control of a system or part of it (OS, network).
  4. Privilege Escalation: is the phase in which the attacker takes control of a system or part of it (OS, network). It consists of increasing privileges and having total control over systems.
  5. Maintaining Access: is the phase in which the attacker tries to maintain access to the system.
  6. Covering Tracks: This is the final stage in which access logs and any artifacts that can trace back to the attacker or the attack itself are removed.

At the end of the Penetration Test activity, we will write and deliver to the client a report containing a list of identified vulnerabilities, a risk analysis of the vulnerabilities and finally a remediation plan containing the solutions to correct them.

Are you looking for an Ethical Hacker?

Hacker Vs Ethical Hacker

The difference lies only in the purpose. Hiring an Ethical Hacker means hiring a professional with the same skills as a criminal hacker to test the resilience of your infrastructure, the main difference is that an Ethical Hacker will stop before creating major damage. An Ethical Hacker can also help a company that has suffered an attack to try to recover stolen data, restore systems by eliminating viruses, or even hunt down the hackers who perpetrated the attack..

Do you need more info about Penetration Test?