Pentest

A penetration test is the ideal starting point for upgrading your cyber security. Through a penetration test, DeepBlue investigates whether, and if so how (malicious) externals can enter your network. We try to penetrate your network to determine where the vulnerabilities are.

pentest-1-faseringenstrategien-icon-DeepBlue.svg

Phasing and strategies

A penetration test runs according to a number of phases: application testing, network pentesting and internal auditing. There are several strategies for carrying out a penetration test. In consultation with you, DeepBlue conducts penetration tests with 0% prior knowledge (black box), 50% prior knowledge (grey box) or 100% prior knowledge of the assignment (white box). We clearly determine in advance the scope, approach and objectives of the penetration test for optimal results.

pentest-2-daadwerkelijkinbreken-icon-DeepBlue.svg

Actually breaking in

Practically, we exploit the potential weaknesses in the security of your network to access the underlying systems or information. DeepBlue's specialists use proprietary and highly intelligent tools. The results of our burglary attempts initiate new detection possibilities and are taken into account in the analysis phase. Through a penetration test, we can also investigate the likelihood of abuse by unauthorized persons, such as ex-employees or other third parties that do not act in your interest.

pentest-3-handwerk-icon-DeepBlue.svg

Tradecraft

There are plenty of companies offering penetration tests. But often they don't get beyond automated scans. These scans reveal error messages they process in a report. However, the power of a good test lies precisely in the manual work. Our certified specialists - ethical hackers - manually check the findings of scans and try to exploit any weaknesses by hand. Just like a real hacker would. In other words, DeepBlue sees penetration testing not only as a scan but as a manual test and delivers just the extra service needed to deliver quality and to get a tight grip on your data security.

hacking - Pentest
Scroll to top