Measure the security level of your information system
Whatever your constraints or challenges, our team puts its technical expertise at your service to establish an inventory of the level of protection of your sensitive data.
Why perform penetration tests?
Direct consequences
- Knowledge of the real level of security of the IS.
- Indispensable complement to the security audit.
- Complement to the recurring and automated vulnerability audit.
- Checking for configuration errors.
Indirect consequences
- Improved security.
- Awareness of IT security.
- Improved responsiveness of security teams.
- Improvement of intrusion detection systems.
Different types of services offered by our experts
Internal penetration test
This test involves performing the attack directly on the internal corporate network.
Configuration audit
Confronts the level of security of a given environment with the state of the art in terms of security.
External intrusion test
This test aims to assess the resistance of infrastructures to an attack carried out from the Internet.
Source code audit
Allows near exhaustive detection of vulnerabilities in an application.
Wifi intrusion test
This test is used to assess the resilience of the wireless infrastructure to attacks.
Architecture audit
Complete and technical audit of the information system architecture.
Methods used:
Our teams simulate an attack by a malicious user or malware to assess the level of security of your IS. For this, we differentiate three situations:
- Our team puts themselves in the shoes of a potential attacker
- Our team has a limited amount of information
- Our team has all the necessary information
We use all known and unknown attack methods developed by our experts: OWASP, OSSTMM, ISC², ISACA, GIAC, Offensive Security. Our consultants are certified: CEH, OSCP, OSCE and participate in many CTFs