2
Penetration Test
A high level sophisticated penetration test which focuses on information assets rather than on information systems. This attack simulates a motivated hacker or team of hackers, which targets a specific asset in an organization, be it source code, emails, financial information, general production environment, SCADA environment or any other organizational asset.
The team will use all means necessary, within given financial limitations, in order to get access. The attacks can include custom developed tools and research in order to bypass security appliances and software on the client's premises.
Tests will include the following:
Social engineering
Malware manipulations
Advanced Phishing (internet or cellular)
Circumventing protection systems
Resilience of network separations
Manual and in-depth testing for logical problems in the infrastructure's architecture and settings
Use of external dark-web tools for filtering, decoding, bypassing and “crypting”