Penetration Testing, or Pen Test, is a planned hacking attempt / cyber attack against your computer network or system to find holes and vulnerabilities.
A Pen Test involves trying to break into your computer system using different technologies such as SQL injection, unsanitized inputs, bruteforce, etc…
First we plan our attack, then we execute. This could involve email phishing attempts, dropped USB drives, and many other things. Once we finish, we give you a full report of what we recovered or found!
External Penetration testing targets the network from outside. We try to get into your websites, external applications, as well as your firewall. This could be a phishing attack or similar.
In an internal test, a tester with access to an application behind its firewall simulates an attack by a malicious insider. This isn’t necessarily simulating a rogue employee. A common starting scenario can be an employee whose credentials were stolen due to a phishing attack.
In a blind test, your staff have no idea what is going on. This is the preferred method. we set up a attack and see who bites.
In this scenario, we target a specific user, computer, etc…