Pentest conducted through the Internet by an ‘attacker’ with no preliminary knowledge of your system
Pentest scenarios based on an internal ‘attacker’, like a legitimate infrastructure user or visitor with
Pentest team attempt to gain administrator-level access to target systems and leverage collected data to
Exploitation