Aardwolf Security Guide to Security Testing

Page 1

HOW A SECURITY TEST IS PERFORMED

www.aardwolfsecurity.com

Th e r ea r e six st e p s in volve d in the security testing process:

Reconnaissance

To get an idea of the client’s security level, a pen testing expert will first conduct an analysis, assessing the potential requirements, using Open Source Intelligence (OSINT).

Scanning

Using automated scanners, the consultant will delve deeper into the infrastructure of the client’s servers, picking up any surface level weaknesses.

Th e r ea r e six st e p s in volve d in the security testing process:

Vulnerability assessment

This step involves assessing the results produced by the automated scanners for any false positives.

The consultant will then use a range of manual probing and verification techniques to delve deeper into the infrastructure and highlighted vulnerabilities.

Exploitation

Next, the vulnerabilities unveiled in the scanning and manual probing stages are raised to the client. Depending on the client’s business operations and the severity of the vulnerabilities, the client may give the consultant the go-ahead to subject certain issues to exploitation attempts.

Th e r ea r e six st e p s in volve d in the security testing process:

Reporting

After the exploitation attempts have been made, the pen testing consultant will produce a comprehensive report to highlight the impact likelihood of all system defects, and recommend solutions.

Retesting

The sixth and final step of the process, offered exclusively at Aardwolf Security, is a free retesting, once the client has actioned their software system solutions, to make sure that their infrastructure weaknesses have been resolved correctly and completely.

TH AN K Y O U Contact Us 01908 733540 contact@aardwolfsecurity.com www.aardwolfsecurity.com Aardwolf Security Ltd, Midsummer Court, 314 Midsummer Boulevard, Milton Keynes, Buckinghamshire, MK9 2UB United Kingdom

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.