"If you know yourself but not the enemy, for every victory gained, you will also suffer a defeat."
Sun Tzu, Art of War


Penetration Testing is the process of checking and testing the organization's network and services for possible loopholes and vulnerabilities that can be used by criminals to harm your business.

We are called white hats. We perform hacking in ethical ways, without causing any damage to the computer system, thereby increasing the security perimeter of your organization.


Penetration Testing is required because it helps you determine the flaws related to hardware and software system design and operation, and quite importantly, personnel readiness.

Early identification helps protect the network. If the vulnerabilities aren't identified early, then they become an easy intrusion point for the attacker.


It is important to comprehend how malicious hackers exploit systems and how deep they can reach.

It is the duty of system administrators and network security professionals to guard their infrastructure against exploits by knowing the enemy - seeking to use the same infrastructure for illegal activities.

Hacking Vs Penetration Testing (Ethical Hacking)

Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to the system resources. It involves modifying system or application features to achieve
a goal outside of the creator's original purpose.

Ethical hacking involves the use of hacking tools, tricks, and techniques to identify vulnerabilities
so as to ensure system security. It focuses on simulating techniques used by attackers to verify the
existence of exploitable vulnerabilities in system security.

THE BUSINESS CASEPenetration testing will make sense if you want to achieve the following goals:

1.identify the THREATS facing an organization's information assets

2.REDUCE the organization's IT security COSTS and provide a better Return On Security Investment (ROI)

3.provide the organization with ASSURANCE: a thorough and comprehensive assessment of organizational security covering policy, procedure, design, and implementation

4.gain and maintain CERTIFICATION to an industry regulation

5.adopt BEST PRACTICES by conforming to legal and industry regulations

6.test and validate the EFFICIENCY of SECURITY PROTECTIONS and controls. May lead to changing or upgrading existing infrastructure of software, hardware, or network design

7.evaluate the EFFICIENCY of NETWORK SECURITY DEVICES such as firewalls, routers, and web servers

8.focus on HIGH-SEVERITY VULNERABILITIES and emphasize application-level security issues to development teams and management

9.provide a COMPREHENSIVE APPROACH of preparation steps that can be taken to prevent upcoming exploitation



One of the most common types of penetration tests. Involves finding target systems on the corporate network, searching for openings in their base operating systems and available network services, and exploiting them.

Some of these tests take place remotely across the Internet, targeting the organization’s perimeter networks. Others are launched locally, from the target’s own business facilities, to assess the security of their internal network or the DMZ from within, seeking the kinds of vulnerabilities an internal user could find.


Looks for security vulnerabilities in web-based applications and / or programs deployed and installed, operational and running on target environment and resources.


Involves discovering a target’s physical environment searching for unauthorized wireless access points, or authorized wireless access points that have security weaknesses or other issues.


Attempts to get a user to reveal sensitive information, such as a password or any other sensitive data.

These tests are quite often conducted over the phone, targeting selected help desks, users or employees, evaluating processes, procedures, and user awareness and reaction readiness.

HOW IS IT DONE?During penetration testing, a pen tester analyzes all security measures currently employed by the organization, searching for any design weaknesses, technical flaws, and other critical or predefined by the organization’s decision makers vulnerabilities.

There are two classic ways penetration testing is performed:

  • 1.BLACK BOX testing-

  • simulates an attack from someone who is unfamiliar with the system, establishing externally “available” backdoors or other perimeter-breach opportunities

  • 2.WHITE BOX testing-

  • simulates an attacker that has knowledge about the system

Once all the tests are conducted, the pen tester prepares a comprehensive report that includes:


2.test RESULTS




Finally, the pen tester delivers the report to the executive, management, technical and all other authorized audiences.

Besides standard scenarios based on the type of Pentesting (whitebox, graybox, blackbox) and territory (network, application, wi-fi, etc.), we engage you in developing and implementing scenarios that are most relevant to your environment and in accordance with your specific information risks. For example, we can change the concept to reflect the possible behavior of a particular type of perpetrator that is important to you, taking into account various starting points:

1.Externally located person: has no initial knowledge of your infrastructure. They start by going to the coffee shop next to your office, and commence hacking...

2.Your own employee: usually receives standard preconfigured IT tools (laptop, tablet, phone, etc.) and human access - email, corporate portal, etc. We can show you how far such person can go with these tools and what possible damage they can inflict.

3.Your partner: has access to your ERP system, service provisioning team, etc. Again, we will evaluate how much this person can roam around and beyond their authorized access, and what they can inflict.

4.Any other starting point that is important to you in relation to your business operations.

For each starting point we can and will on your command apply all types and variations of pentesting.


  • Describes the course of Penetration testing, which involves defining the Scope, signing an Agreement and working on Recommendations.


Determine which critical systems are to be tested and prepared for mitigation under an attack scenario. The scope can be determined by an external certification or compliance requirement, or simply by what management has chosen in order to achieve adequate security assessment.


A formal expression of will and agreement to proceed with testing under the determined scope, timing and method. This is followed by a comprehensive report on the risks facing information systems that provides the necessary insight and guidance to secure operations.


Review test results and proposed recommendations, filter through risk management mechanisms and follow up with appropriate GOVERN or BUILD endeavors.