In passive Recon, Pentest team attempt to gather information from sources of Open Source Intelligence like paste sites, leaked password repositories etc. — to gather information about the employees and the organization. In active Recon, pentester characterize the target systems and network — to identify potentially exploitable vulnerabilities or misconfigurations
Build and configuration review testing uses an authenticated -- credential base access and scanning --
Read MoreEnd users are the weakest link of cybersecurity control chain. An assessment is conducted to
Read MorePentest scenarios based on an internal ‘attacker’, like a legitimate infrastructure user or visitor with
Read More