top of page

Penetration testing
Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.
1. Information Gathering
-
Open-source intelligence (OSINT) scanning
-
Network scanning
-
System and service identification
-
Vulnerability assessment
-
Social engineering
2. Network and System Compromise
-
Direct system exploitation
-
Network sniffing
-
Malware-based attacks
-
DOS and DDOS attacks
-
Wi-Fi and LAN hacking
3. Platform Compromise
-
Hacking web servers and web applications
-
Bypassing IDS, firewalls, and honeypots
-
SQL injection
bottom of page