Using high level automated and manual tests, our ethical hacker searches for pre-existing flaws in the code of your application. Our blackbox penetration test involves simulating external attacks with no prior knowledge of its internal workings.
-
Timing
Together, we will determine a start date. For starting dates within 2 weeks, please contact us first.
-
Scope
We define your goals beforehand to ensure a thorough understanding of your specific security objectives.
-
Mapping
Mapping helps us in understanding the application, enabling us to determine which tests are necessary.
-
Assessment
Both automated tools and manual techniques are used to identify weaknesses in the application.
-
Human logic
By using human logic, our hackers can find weaknesses that automated systems may overlook.
-
Structured
We rely on the Penetration Testing Execution Standard (PTES) to structure and streamline our testing process.
-
Results
Our ethical hacker will collect all findings and assign a risk level (high, medium, and low) to each identified vulnerability.
-
Report
A detailed, custom report will provide a substantiated analysis of the findings and recommendations for improvement.
-
Retest
It is advisable to perform a targeted test to verify the resolution of vulnerabilities (available at additional charge).