Skip to content

Penetration Testing

A penetration test is an authorized simulated cyberattack on a computer system performed to identify its weaknesses.

Conducting regular penetration tests ensures that vulnerabilities are identified before they can be exploited by threat actors.

With over 10 years of experience in cybersecurity, we offer pentest services to meet a wide variety of needs. Depending on the situation, we make sure to take a unique approach to choose the most appropriate solution for your business.

How to get a pentest?

  1. The first step is to contact us to discuss your project and needs.

  2. Before the beginning of the assessment, we will define together the scope of engagement. The scope defines the assets you want to be tested and the ones you don't.

  3. We will perform the penetration test using state-of-the-art methodologies and security tools.

  4. At the end of the assessment, you will receive a penetration test report similar to this pentest report example. The report will contain details about the issues, the severity of the vulnerabilities and some recommendations.

Types of Penetration Tests

According to your needs, the types of penetration tests we perform can cover software, network services, wireless and sometimes physical assets. Here are some examples of penetration tests we can perform and the scope of each one.

External Penetration Testing Services

To find exploitable security vulnerabilities on your Internet-facing infrastructure. This assessment focuses on the publicly accessible assets of your organization's system and network.

Internal Penetration Testing Services

To find exploitable security vulnerabilities within your internal network(s). This assessment focuses on the assets that are only accessible within your organization's network. This penetration test can be done via a VPN access but it can also be performed on-site.

Web Penetration Testing Services

To find exploitable security vulnerabilities on your website(s). This assessment focuses on web applications such as a portal, an online shop, or a blog.

Application Penetration Testing Services

To find exploitable security vulnerabilities in your softwares. This assessment focuses on desktop, server, or mobile applications.