Pentests – system security tests
We conduct security tests, and their type depends on the stage of the analysis.
In order to properly plan tests, we follow proven methods and use appropriate tools.
The security testing process is divided into gathering information about the targets being tested, then scanning and identifying the target and the protection in place. The next step is to scan for exploitable vulnerabilities. Further steps are usually more invasive.
Knowing the vulnerabilities of the application and the weaknesses of the security system, we can try to break into the system by acting like a potential intruder. This step is not always taken for security reasons. However, such a “hard” confirmation of the possibility of an attack finally confirms what the range and impact of a given type of attack can be.