An intense and detailed test for web applications, browsers, and their components like ActiveX, applets, plug-ins, sriptlets fall in the scope of this type of pen testing.
Social engineering, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information.
Remote Tests are used to trick an employee into compromising confidential data using electronic means. The tester could conduct such an attack via a phishing email campaign.
Physical Tests requires direct contact with the subject to retrieve the sensitive information. It might involve human handling tactics like Dumpster Diving, Imitation, Intimidation or convince the subject via phone calls.
Looking to discover vulnerabilities and gaps in the network infrastructure of the clients. Since the network could have both internal and external access points, so it is mandatory to run tests locally at the client site and remotely from the Internet.
We target the following network areas in our penetration tests:
We also test software modules with penetration testing:
The goal of these tests is to pinpoint security threats that happen locally. There could be a flaw in a software application running on the user’s computer which a hacker can easily exploit. These may be programs or applications like Putty, Git clients, Sniffers, browsers (Chrome, Firefox, Safari, IE, Opera), and even presentation as well as content creation packages like MS Power Point, Photoshop, and media players. Also, using open source software to create or extend in-house applications could cause severe threats. These locally developed tools should also pass through the penetration test cycle.
This test intends to analyze the wireless devices used at the client site. The list of devices includes items such as tablets, laptops, notebooks, smartphones, etc. We also test the protocols used for configuring wireless, and access points for wireless setup.
Copyright © 2020 Get_Event_Log - All Rights Reserved.