Security Testing with Aardwolf Security

Page 1

HOW A SECURITY TEST IS PERFORMED AARDWOLF SECURITY

WWW.AARDWOLFSECURITY.COM

THERE ARE SIX STEPS INVOLVED IN THE SECURITY TESTING PROCESS:

Vulnerability assessment Exploitation

This step involves assessing the results produced by the automated scanners for any false positives. The consultant will then use a range of manual probing and verification techniques to delve deeper into the infrastructure and highlighted

Next, the vulnerabilities unveiled in the scanning and manual probing stages are raised to the client. Depending on the client’s business operations and the severity of the vulnerabilities, the client may give the consultant the go-ahead to subject certain issues to exploitation

To get an idea of the client’s security level, a pen testing expert will first conduct an Using automated scanners, the consultant will delve deeper into the infrastructure of the Reconnaissance Scanning

After the exploitation attempts have been made, the pen testing consultant will produce a comprehensive report to highlight the impact likelihood of all system defects, and recommend solutions.

The sixth and final step of the process, offered exclusively at Aardwolf Security, is a free retesting, once the client has actioned their software system solutions, to make sure that their infrastructure weaknesses have been resolved correctly and completely.

THERE ARE SIX
IN THE SECURITY
Reporting Retesting Contact Us 01908 733540 contact@aardwolfsecurity.com www.aardwolfsecurity.com Aardwolf Security Ltd, Midsummer Court, 314 Midsummer Boulevard, Milton Keynes, Buckinghamshire, MK9 2UB United Kingdom
STEPS INVOLVED
TESTING PROCESS:

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.