Our team offers penetration testing services, red team and APT simulation and offensive security operations services. We are qualified and trained to perform real-world cyber attack scenarios and to test the ability of IT infrastructures to respond, protect and contain cybersecurity incidents.
Our penetration testing process
Pre-engagement Interactions
This is the preparation phase for the pen test. It is all about document approvals and tools needed
for the test.
Intelligence gathering
In this phase information about the target system are gathered from external sources like social media websites, official records etc. This phase comes under OSINT (Open-Source Intelligence).
Threat Modelling
It is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system. It is skipped in typical pan tests.
Vulnerability Analysis
This phase discovers and validates vulnerabilities and the risk that an attacker could exploit and gain authorized access to the system or application.
Exploitation
In this phase, the tester try to reach the security of the target system using the vulnerabilities previously identified and validated.
Post Exploitation
This phase maintains the control over target system and collects data.
Reporting
Documents the entire process as well as the audit result, recommendations for mitigating the risks and vulnerabilities discovered in the process.