1- Scope finalization
- Meeting with client
- Gather testing requirements
- Prepare test plan
2- Information Gathering
Intelligent information gathering
Information gathering using search engines
Network mapping
3- System Fingerprinting
- Determine network ranges
- Identification of active machines
- Ports and access point analysis
4- Vulnerability Analysis
Vulnerability analysis
Pre Exploitation
Test case execution
5- Exploitation
- Identification of 0 days
- 0-day Exploitation
- exploit the vulnerability
- privilege escalation
- Pivoting
6- Reporting
Sensitive data that was accessed
Information gathering report
Technical Report
Executive Summary
6- Risk Management
- Information Gathering Report
- Technical Report
- Executive Summary
Our security team will have a structured walkthrough of our findings with your company and assist in reconfiguring enterprise’s firewall and other security solutions to reinforce the identified vulnerabilities and protect against imminent attacks.