In passive Recon, Pentest team attempt to gather information from sources of Open Source Intelligence like paste sites, leaked password repositories etc. — to gather information about the employees and the organization. In active Recon, pentester characterize the target systems and network — to identify potentially exploitable vulnerabilities or misconfigurations
Pentest conducted through the Internet by an ‘attacker’ with no preliminary knowledge of your system
Read MorePentest team attempt to gain administrator-level access to target systems and leverage collected data to
Read MoreDepending on the scope of the test, ensure that all traces and footprints of the
Read More