top of page
th (3)_edited_edited.jpg

Penetration testing

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

1. Information Gathering

  • Open-source intelligence (OSINT) scanning

  • Network scanning

  • System and service identification

  • Vulnerability assessment

  • Social engineering

2. Network and System Compromise

  • Direct system exploitation

  • Network sniffing

  • Malware-based attacks

  • DOS and DDOS attacks

  • Wi-Fi and LAN hacking

3. Platform Compromise

  • Hacking web servers and web applications

  • Bypassing IDS, firewalls, and honeypots

  • SQL injection

bottom of page