Build & Configuration Review Pentest

  • Home
  • Build & Configuration Review Pentest

Build and configuration review testing uses an authenticated — credential base access and scanning — approach to identify vulnerabilities, security baseline & configuration settings, potential illegitimate access to sensitive data and other issues and potential com promises on devices

Related Posts

Exploitation

Exploitation

Read More

Privilege Escalation & Lateral Movement

Pentest team attempt to gain administrator-level access to target systems and leverage collected data to

Read More

Passive & Active Reconnaissance

In passive Recon, Pentest team attempt to gather information from sources of Open Source Intelligence

Read More