Pentest or Penetration Test.
What is a Pentest?
A Pentest or Penetration Test is an authorised security assessment to identify and exploit vulnerabilities in your organisation’s information processing systems. Our ethical hackers will try to gain access to these systems by using their knowledge & experience to penetrate your defenses. After the test, CRANIUM will document the techniques & vulnerabilities used in a comprehensive report & presentation with suggested solutions and a roadmap for improvement.
“A CRANIUM Pentest gives you a good insight into the vulnerabilities of the systems and applications in your organisation.”
– Davy Pinxten
Principal Security Consultant
The 6 Steps of Pentesting.
A CRANIUM Pentest consists of 6 steps. Depending on the size of the organisation, this entire process will take on average 3 to 5 work days. Of course, not every company is the same, and because of this, our expert consultants adapt the process to your organisation’s size and needs.
Discovery phase to gather as much information as possible about the organisation and its available IT systems.
Comprehensive assessment to identify misconfigured systems, outdated software and other vulnerabilities.
3. Analysis & Determination
Analysis of the gathered information to determine the vulnerabilities that are present in the organisation’s assets.
Based on the gathered information, our ethical hackers will try to work their way into your systems.
Our ethical hackers move around in the network to go even further and get more privileges and rights in the network.
6. Report & Recommendation
Crucial phase that covers all previous phases in a detailed report, presented by our pentest experts.
The last phase brings all findings together in a complete and concise report. Our CRANIUM consultant delivers a detailed description of all found vulnerabilities and their potential impact on the organisation. The report also includes appropriate remedial actions and proof of concept where possible. Using the recommendations, the report makes it possible for the IT-department and (Chief) Information Security Officer to immediately start working on fixing the vulnerabilities found.
Do you have any questions, would you like to receive a personal quote or want to request a free consultation with one of our experts to discuss your needs?
Reach out through the form below or give us a call: +32 2 310 39 63.
Is your organisation’s Information Security Maturity level low? Do not fret. We also provide support in setting up phishing campaigns, performing a baseline measurement on your information security and compiling an overview of your risks. When deciding which information is worth (extra) protecting, we can assist in creating a data strategy.