Penetration Testing (PenTest) 滲透測試

Table of Content

  1. | What is PenTest ?滲透測試是什麼?
  2. Our Penetration Testing Services我們的滲透測試服務

What is PenTest ?

  • Penetration testers mimic the activities of cyberattackers, but in a controlled manner.
  • Like attackers, penetration testers use tools to gain additional information about the characteristics of the network, systems and applications; and to exploit vulnerabilities.
  • Penetration testing can be technical or it can include social engineering and similar methods.

Ron Hale, Ph.D., CISM (former chief knowledge officer of ISACA)

Back to Top

Our Penetration Testing Services :

(A) Network and System Penetration Testing

  • External Assessment
    • Perspective: Assessing from across the Internet
    • Simulated Attacker : Hackers from the world
  • Internal Assessment
    • Perspective: Assessing inside corporate network
    • Simulated Attacker : unauthorized employees

(B) Web Application Penetration Testing

  • External Assessment
    • Perspective: Assessing from across the Internet
    • Simulated Attacker : Hackers from the world

(C) Mobile App and Gateway Penetration Testing

  • External Assessment
    • Perspective: Assessing from across the Internet
    • Simulated Attacker : Hackers from the world

(D)Social Engineering Simulation Testing

Back to Top

滲透測試是什麼?

  • 滲透測試人員以可控的方式模仿網絡攻擊者的活動。
  • 與攻擊者一樣,滲透測試人員使用工具獲取有關網絡,系統和應用程序特徵的其他信息; 並利用漏洞。
  • 滲透測試可以是技術性的,也可以包括社會工程和類似方法。

Ron Hale,博士,CISM(ISACA前首席知識官)

我們的滲透測試服務

(A)網絡和系統滲透測試

  • 外部評估
  • 透視:從互聯網上評估
  • 模擬攻擊者:來自世界各地的黑客
  • 內部評估
  • 透視:評估企業網絡內部
  • 模擬攻擊者:未經授權的員工

(B)Web應用程序滲透測試

  • 外部評估
  • 透視:從互聯網上評估
  • 模擬攻擊者:來自世界各地的黑客

(C)移動應用和網關滲透測試

  • 外部評估
  • 透視:從互聯網上評估
  • 模擬攻擊者:來自世界各地的黑客

(D)社會工程模擬測試

回頁首