Services

Pentesting Methodology

De pentesting methodologie binnen BOSSIT voor penetration testing en Ethical Hacking maakt gebruik van een uitgebreide, op risico gebaseerde methodologie om handmatig kritieke kwetsbaarheden te identificeren op netwerken, systemen, hosts, applicaties, personeel en fysieke assets.
Pentest Methodology steps
The steps in

Pentest Methodology

At BOSSIT, we adhere to the PTES methodology, which encompasses a structured approach to penetration testing. This standard is divided into sections that define what should be included in a qualitative penetration test.

PTES defines penetration testing in seven phases:

  1. Pre-Engagement Interactions
  2. Information Gathering (Intelligence Gathering)
  3. Threat Modeling
  4. Vulnerability Analysis
  5. Exploitation
  6. Post-Exploitation
  7. Reporting

Network Pentest

According to the PTES methodology, we conduct various tests including but not limited to network scans, port scans, vulnerability scans, DNS recon, SNMP recon, sniffing, Man-in-the-Middle (MiTM) attacks, specific system errors, etc.

Application Pentest

Our comprehensive approach to application penetration testing includes vulnerabilities from the Open Web Application Security Project (OWASP) Top 10, including but not limited to: injection, authentication errors, unauthorized access, security misconfigurations, XSS, searching for known vulnerabilities, and more.

Pentest As A Service

Within our Pentest As A Service, we follow established frameworks such as PTES (Penetration Testing Execution Standard), ISSAF (Information Systems Security Assessment Framework), OWASP (Open Worldwide Application Security Project), and OSSTMM (Open Source Security Testing Methodology Manual).

 

Automated Testing vs

Manual Testing

Our approach consists of approximately 80% manual testing and about 20% automated testing. Automated tools make testing more efficient, but primarily during the initial phases of a penetration test. At BOSSIT, we believe that an effective and comprehensive penetration test can only be achieved through rigorous manual testing techniques.

Hands on - Manueel testen
Pentest Report
Conclusion and

Pentest Report

We view the reporting phase as the beginning of our relationship. At BOSSIT, everyone strives to provide the best possible customer experience and service to our clients. As a result, our report is just a small part of our deliverables. We offer clients a knowledge base for problem-solving and dedicated staff to assist you.

Remediation and Re-Testing

Our goal is to help our clients enhance their ability to remediate vulnerabilities, not just identify them. Consequently, remediation re-testing is provided at no extra cost for up to six findings within six months after project completion. If a significant number of findings need to be re-examined, or if additional remediation retests are required, please contact us to find a solution that meets your specific needs.

Our reports detail everything our ethical hackers have found, how we found it, and the best approach to remediate the findings. Since our aim is to ensure that your systems or infrastructure are correctly addressed once we identify the issues, BOSSIT offers remediation testing at no extra cost. When you and/or your team are ready for us to retest, just give us a call. Whether it’s in two weeks or two months, we remain prepared to retest your adjustments to vulnerabilities and schedule this when you are ready.

If you have questions that arise during your remediation, whether related to your testing or not, please call or email us, and we will ensure you get the answers you need.

Interested in learning more about pentesting methodology?

We are using cookies to give you the best experience. You can find out more about which cookies we are using or switch them off in privacy settings.
AcceptPrivacy Settings

GDPR

  • Disclaimer en Privacy
  • Google Analytic

Disclaimer en Privacy

We gebruiken jouw gegevens om de dienst te leveren en te verbeteren. Door gebruik te maken van de dienst ga je akkoord met de verzameling en het gebruik van informatie zoals beschreven in dit beleid. Tenzij anders gedefinieerd in dit Privacybeleid, hebben de termen die in dit Privacybeleid worden gebruikt dezelfde betekenis als in onze Algemene Voorwaarden, die te vinden zijn op https://www.bossit.be.

Je kunt ons volledige beleid hier lezen: https://www.bossit.be/disclaimer-en-privacy/

Google Analytic

Deze website maakt gebruik van Google Analytics om anonieme informatie te verzamelen, zoals het aantal bezoekers aan de site en de meest populaire pagina’s.

Het inschakelen van deze cookie helpt ons onze website te verbeteren.