Basic Penetration Testing Service

Order

Basic Penetration Testing Service is designed to ensure that your IP addresses that is open to Internet Network is secured and free of vulnerabilities to cyber attacks.  

Pentest_Basic.png
Pentest_Enterprise_Methodology_yeni2.png

 NSPECT.IO Pentest team will scan by leveraging  best practices frameworks and execute the process with the phases against IP address:

 

  1. Reconnaissance:The stage of gathering information about the target network and systems.

  2. Discovery and Enumeration : Open ports on the resulting active systems are detected. The names and operating system versions of existing services on the open ports on the systems are discovered.

  3. Vulnerability Detection: The known open ports of existing services and operating systems in discovered systems are scanned with vulnerability scanning tools. In addition, a manual analysis of weakness is performed on the services.

  4. Exploitation : Exploitation is the stage of exploiting weaknesses for the detected operating system and service versions.

  5. Reporting : Obtained information and documents are converted into a Penetration Testing Report and presented