Première page Précédent Suivant Dernière page Résumé Images
What is a pentest?
Simulation of a real attack on:
- Infrastructure by exploiting badly designed firewall rules, exposed services, ...
- Exposed Web applications by testing user inputs, application bugs, …
Mainly from two point of view:
- Blackbox, without information about the remote infrastructure, just a URL
- Greybox, with a user account
- Security assessment
- Decision makers awareness
- Technical staff awareness