Comtact Penetration Testing
What Can You Expect?
Our penetration testing methodology:
1. Scoping: we work with you closely to define the scope of the test.
2. Reconnaissance: we use publicly available information to build intelligence that could be used to compromise your business.
3. Mapping: we conduct a full assessment of your network infrastructure to gain a complete picture of your organisation’s attack surface.
4. Vulnerability analysis: we perform and in-depth audit of applications residing on target hosts to identify security vulnerabilities to exploit.
5. Service exploitation: we attack vulnerabilities to gain access into your systems and data.
6. Pivoting: we attack further assets by leveraging compromised systems.
7. Clean up: we remove testing data from your systems.
8. Reporting and debrief: our experts write an in-depth penetration test report with clear recommendations and guidance for remediation, available for delivery in written, virtual or face-to-face formats.