Our Testing Strategy
Whether we are testing in part or in full, we test in an iterative fashion.
1
1. Reconnaissance -intelligence gathering through communication or passive scans.
2
2. Scan – scanning to understand the infrastructure and applications running
3a
3a. Gain access – attacks are used to identify data or command injections and backdoors
3b
3b. Maintain access – achieve persistent presence to show that an attacker can execute an in-depth attack
3c
3c. Repeat – determine if existing security policies and tools detect repetition of an attack
4
4. Document – describe type, methods, business and security risks and mitigation in a scientific manner