pentest
Before conducting a pentest, it is important to define the appropriate scope as a it can encompass everything from online servers to physical access within the company.
A typical example could be testing against the servers that have undergone a vulnerability scan to ensure there are no security vulnerabilities.
When performing a penetration test, we act as ethical hackers and attempt to gain unauthorized access to the company's systems using various methods such as brute force login, SQL injection, API bypass, phishing, and more.
After completing a penetration test, a report is prepared detailing the discovered security vulnerabilities and suggestions for improvement.