Penetration tests represent a simulation of an attacker attacking the tested systems, applications and websites. Their main goal is to determine how easily identifiable a target these systems are, what information can be obtained about externally accessible systems, how vulnerabilities that can be exploited to gain unauthorized access to sensitive resources can be detected, and to propose appropriate recommendations for remediation.
During penetration tests, procedures, techniques and tools available on the Internet are used to simulate as closely as possible the likely course of action of an attacker. Cyber Hazard’s testing methodology is based primarily on the OWASP Testing Guide v.4.2, currently the most recognized methodology for web security. This procedure provides a comprehensive approach to examining all areas of web security of current technological capabilities.