Penetration Tests

Pentests serve to increase the security of your systems and applications by a simulated real-world hacker attack. Pentests (also known as ethical hacking) are important preventive actions, since of the increasing number of cyber-attacks. Pentest should be performed regularly, since new attacks and vulnerabilities are discovered. We want to protect your IT system from hacker attacks. Secure your data from unauthorized access. So you stay in the control of your IT system. Penetration testing can be carried out from the Internet or from your corporate network.

A penetration test is designed to actually exploit weaknesses in the system architecture or computing environment. Where a vulnerability scan can be automated, a penetration test requires various levels of tester expertise.

Penetration Tests

Penetration tests can be conducted in several ways. The most common difference is the amount of knowledge of the implementation details of the system being tested that are available to the testers. Black box testing assumes no prior knowledge of the infrastructure to be tested. The testers must first determine the location and extent of the systems before commencing their analysis. At the other end of the spectrum, white box testing provides the testers with complete knowledge of the infrastructure to be tested, often including network diagrams, source code, and IP addressing information. There are also several variations in between, often known as grey box tests. Penetration tests can also be described as "full disclosure" (white box), "partial disclosure" (grey box), or "blind" (black box) tests based on the amount of information provided to the testing party.

Our scope of services

Web Application

Web applications forms an integral part of any modern IT landscape. In general, penetration tests are performed on Web applications from an external perspective. It may also well be quite useful to adopt the internal perspective. You always wear the decision on the attack scenario. You can discuss the optimal setup with our security consultants.

Infrastructure

We simulate an attack on your infrastructure. Possible targets can your be your servers, services or network components. Such an attack can take place from the external or internal starting point, for example, from your Wireless Network or out of your LAN Network.

Social Engineering

We examine how your employees respond to phishing attacks and malicious websites. By manipulated websites passwords or malicious code can get into their network. The main of such tests is to raise awareness of your employees.

Our Approach

We would like to offer you a penetration test fitted to your individual requirements. That is why we always begin penetration tests with a preliminary discussion.

Your safety is important to us

We do employ the latest Technology and Tools

We educate ourselves continually and know the current issues

We always act responsibly with your data

If you have any questions, do not hesitate to contact us!

Give us a call, we look forward to it. +49 69 15322864

Unsere Partner

Contact

C-Def UG
Scheidswaldstrasse 77
D-60385 Frankfurt am Main
E-mail: kontakt@c-def.com
Phone: +49 69 15322864
Fax: +49 69 24747108