Table of Content
What is PenTest ?
- Penetration testers mimic the activities of cyberattackers, but in a controlled manner.
- Like attackers, penetration testers use tools to gain additional information about the characteristics of the network, systems and applications; and to exploit vulnerabilities.
- Penetration testing can be technical or it can include social engineering and similar methods.
Ron Hale, Ph.D., CISM (former chief knowledge officer of ISACA)
Our Penetration Testing Services :
(A) Network and System Penetration Testing
- External Assessment
- Perspective: Assessing from across the Internet
- Simulated Attacker : Hackers from the world
- Internal Assessment
- Perspective: Assessing inside corporate network
- Simulated Attacker : unauthorized employees
(B) Web Application Penetration Testing
- External Assessment
- Perspective: Assessing from across the Internet
- Simulated Attacker : Hackers from the world
(C) Mobile App and Gateway Penetration Testing
- External Assessment
- Perspective: Assessing from across the Internet
- Simulated Attacker : Hackers from the world
(D)Social Engineering Simulation Testing

滲透測試是什麼?
- 滲透測試人員以可控的方式模仿網絡攻擊者的活動。
- 與攻擊者一樣,滲透測試人員使用工具獲取有關網絡,系統和應用程序特徵的其他信息; 並利用漏洞。
- 滲透測試可以是技術性的,也可以包括社會工程和類似方法。
Ron Hale,博士,CISM(ISACA前首席知識官)
我們的滲透測試服務
(A)網絡和系統滲透測試
- 外部評估
- 透視:從互聯網上評估
- 模擬攻擊者:來自世界各地的黑客
- 內部評估
- 透視:評估企業網絡內部
- 模擬攻擊者:未經授權的員工
(B)Web應用程序滲透測試
- 外部評估
- 透視:從互聯網上評估
- 模擬攻擊者:來自世界各地的黑客
(C)移動應用和網關滲透測試
- 外部評估
- 透視:從互聯網上評估
- 模擬攻擊者:來自世界各地的黑客
(D)社會工程模擬測試

You must be logged in to post a comment.