Basic Penetration Testing

Category:

Description

The process of evaluating the current security state Assets to find vulnerabilities that an attacker could exploit to gain unauthorized access to systems and information.

 

Scope

Phase 1
• Information gathering
• Assets Discovery
• Vulnerability Scanning
• Vulnerability Verification
• Removing false positive & Validations

Phase 2
• Exploitation & Post Exploitation (wherever possible and performed after customer approval)
Deliverables
Technical report, attack/vulnerability impact with mitigations guidelines/recommendations, revalidation test (if required), advisory

Reviews

There are no reviews yet.

Be the first to review “Basic Penetration Testing”

Your email address will not be published. Required fields are marked *