Penetration Testing

Penetration Testing

A PenTest is when an Ethical Hacker attempts to break into an information system (datacenter, servers, site or application) with the permission of the owner of that system. The purpose of this operation is to detect the vulnerabilities of the remote systems and know if they can be exploited so that you can fix them before they can be exploited for malicious purposes by actual threat actors.

The expertise of our Ethical Hackers is mainly on the IT system architectures (Microsoft, GNU/Linux IT systems), network communications (WiFi, Low level TCP/IP exchanges, Web APIs) and web, mobile and IoT applications.

Proposed Audit Types

  • Web Infrastructure Security Testing
  • Internal Network Security Audit
  • Mobile and Desktop Application Security Testing
  • Wireless Audit (WIFI/Bluetooth)
  • RFID Audit (RFID HF/NFC + RFID LF)
  • Code Audit

Each of our penetration test comes with a complete report (with detailed audit process and tests made by our team) listing each vulnerability found as well as a demonstration of vulnerability exploitation and personalized advice to secure your systems.