Penetration testing, or 'ethical hacking', concentrates on the security of the Information Technology Infrasturcture of the organization to find any loopholes in the system. Penetration tests cover the servers, applications, modems, routers and bridges. These tests include the following :
Onsite Penetration Testing
Onsite Penetration tests will focus on vulnerabilities which exist on the internal system as seen by an insider. Tests would include penetration testing of entire IT related equipment at the client site. Activities done during these penetration tests include
Remote Penetration Testing
Remote Penetration tests will focus on security and robustness of Information Technology Infrastructure of a client organisation. Penetration tests will cover the servers installed, modems, routers, bridges and authenticating services in use at the client premises.
These penetration tests are done using tools which include third party products as well as our own software. These tests will include following activities:
To ensure we do not accidentally penetrate another company (which can be a felony offense), the client will provide the telephone numbers they use and wish us to test.As an alternative, the client could provide us with a corporate telephone book that is available to all employees. We will use this to ensure we stay within the company’s valid phone number ranges.