Our Testing Strategy
Whether we are testing in part or in full, we test in an iterative fashion.

1
1. Reconnaissance -intelligence gathering through communication or passive scans.
2
2. Scan - scanning to understand the infrastructure and applications running
3a
3a. Gain access - attacks are used to identify data or command injections and backdoors
3b
3b. Maintain access - achieve persistent presence to show that an attacker can execute an in-depth attack
3c
3c. Repeat - determine if existing security policies and tools detect repetition of an attack
4
4. Document - describe type, methods, business and security risks and mitigation in a scientific manner