{"id":14059,"date":"2022-10-28T11:55:34","date_gmt":"2022-10-28T09:55:34","guid":{"rendered":"https:\/\/www.secify.com\/?page_id=14059"},"modified":"2024-06-12T14:37:58","modified_gmt":"2024-06-12T12:37:58","slug":"penetration-test","status":"publish","type":"page","link":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/penetration-test\/","title":{"rendered":"Penetration testing"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none hundred-percent-fullwidth non-hundred-percent-height-scrolling Hero\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:50px;--awb-border-radius-bottom-left:50px;--awb-overflow:hidden;--awb-background-color:var(--awb-custom_color_1);--awb-background-image:url(&quot;https:\/\/www.secify.com\/wp-content\/uploads\/2023\/08\/Pentest-1564x1044.webp&quot;);--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column bgh1\" style=\"--awb-padding-top:250px;--awb-padding-bottom:150px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><h1 style=\"text-align: center;\"><span style=\"color: #ffffff;\">Penetration testing<\/span><\/h1>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2 EyeBrow\" style=\"--awb-text-transform:none;\"><p>Introduktion<\/p>\n<\/div>\n<div class=\"fusion-text fusion-text-3\" style=\"--awb-text-transform:none;\"><h2>Penetration testing requirements?<br \/>\nWe will solve it!<\/h2>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\" style=\"--awb-text-transform:none;\"><p>All systems have vulnerabilities. Vulnerabilities that could increase the risk of data breaches if left untouched. A penetration test, or pentest, discovers vulnerabilities and identifies which ones are most critical. Having a picture of the system&#8217;s vulnerabilities makes it easier to prioritize resources to address them.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-image:linear-gradient(180deg, #fcae8e 0%,#f2e3d2 100%);--awb-bg-size:cover;--awb-border-radius:30px 0px 30px 0px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-image:url(&#039;https:\/\/www.secify.com\/wp-content\/uploads\/2023\/02\/Chris-Robertsson-Secify.jpg&#039;);--awb-bg-size:cover;--awb-border-radius:30px 0px 30px 0px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column fusion-empty-column-bg-image fusion-column-has-bg-image\" data-bg-url=\"https:\/\/www.secify.com\/wp-content\/uploads\/2023\/02\/Chris-Robertsson-Secify.jpg\"><img class=\"fusion-empty-dims-img-placeholder fusion-no-large-visibility\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\"><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-column\"><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-5 EyeBrow DarkBlue\"><p>Contact Us<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:120px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-6 BoxText\"><p>Do you want to know more about our service and solutions? Contact us and we will assist you.<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ffffff;--button_accent_hover_color:#4200ff;--button_border_hover_color:var(--awb-color1);--button-border-radius-top-left:30px;--button-border-radius-top-right:30px;--button-border-radius-bottom-right:30px;--button-border-radius-bottom-left:30px;--button_gradient_top_color:#4200ff;--button_gradient_bottom_color:#4200ff;--button_gradient_top_color_hover:#e9e2ff;--button_gradient_bottom_color_hover:#e9e2ff;--button_font_size:1em;--button_padding-top:20px;--button_padding-bottom:20px;--button_typography-font-family:&quot;Inter&quot;;--button_typography-font-style:normal;--button_typography-font-weight:400;\" target=\"_self\" href=\"#Contact\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contact Us<\/span><\/a><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:30px;width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-bottom:60px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7 EyeBrow\" style=\"--awb-text-transform:none;\"><p>This is what you get<\/p>\n<\/div><div class=\"fusion-text fusion-text-8\"><h2>The best support in pentesting<\/h2>\n<\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-text-transform:none;\"><p>In addition to the fact that all systems have vulnerabilities that you want to identify and remove, the background to the need for a pentest can come from external requirements from investors, customers, suppliers or as a requirement for, for example, certifications. No matter where the need comes from, we understand the requirement and can deliver the best support for your penetration test.<\/p>\n<p>We have a solid experience of different types of tests for companies and organizations where the assignments range from tests in simple environments to very complex. We carry out our assignments with highly experienced specialists according to a well-proven methodology and various industry practices. Conducting pentests is a craft and our testers take great personal responsibility to always deliver with the highest quality.<\/p>\n<p>Our standard package includes retesting as part of our offer. We do this to ensure that the identified vulnerabilities are actually addressed. After the test is completed, we will provide you with a report of the results and recommendations, which we will review with you.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:60px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10 EyeBrow\" style=\"--awb-text-transform:none;\"><p>This is what we can test<\/p>\n<\/div><div class=\"fusion-text fusion-text-11 AvsnittsRubrik\" style=\"--awb-text-transform:none;\"><p>Our penetration tests<\/p>\n<\/div><div class=\"fusion-text fusion-text-12\" style=\"--awb-text-transform:none;\"><p>No two companies&#8217; IT environments are the same. It is therefore important that we go through the conditions and methods together with you to come up with a good solution. Common to all our penetration tests is that we follow industry standards and methods from OSSTMM, OWISAM, OWASP, OASAM, ISSAF, NIST, ISACA, SANS, Mitre Attack. We perform penetration tests on web applications, mobile applications, infrastructure and APIs but also have the possibility to customize a test based on your needs.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:70px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:50px 50px 0px 0px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-13 AvsnittsRubrik White\"><p>Pentest web application<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_2 1_2 fusion-flex-column White\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-14\"><p>A web application such as an e-commerce site, a booking system or a customer and supplier portal often stores and handles sensitive information.<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:#ffffff;--awb-title-color:var(--awb-color4);--awb-content-color:#000356;--awb-icon-box-color:var(--awb-color1);--awb-toggle-hover-accent-color:var(--awb-color3);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-14059-1\"><div class=\"fusion-panel panel-default panel-e53475647d0a7eec5 fusion-toggle-no-divider\" style=\"--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><div class=\"panel-title toggle\" id=\"toggle_e53475647d0a7eec5\"><a aria-expanded=\"false\" aria-controls=\"e53475647d0a7eec5\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-14059-1\" data-target=\"#e53475647d0a7eec5\" href=\"#e53475647d0a7eec5\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-minus-circle fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-plus-circle fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Read more<\/span><\/a><\/div><\/div><div id=\"e53475647d0a7eec5\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_e53475647d0a7eec5\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>By penetration testing the application, we can find vulnerabilities that in many cases can be exploited to either access sensitive information or to gain administrator access to underlying systems.<\/p>\n<p><strong>Benefits of penetration testing web applications<\/strong><\/p>\n<ul>\n<li>Identifying ways to manipulate the system<\/li>\n<li>Finding security issues related to cookies<\/li>\n<li>Identifies misconfigured security settings<\/li>\n<li>Tests protection against injection attacks<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:70px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color5);--awb-bg-color-hover:var(--awb-color5);--awb-bg-size:cover;--awb-border-radius:50px 50px 0px 0px;--awb-width-large:100%;--awb-margin-top-large:-70px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-15 AvsnittsRubrik DarkBlue\"><p>Pentest mobile application<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion_builder_column_inner_1_2 1_2 fusion-flex-column DarkBlue\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-16\"><p>Vulnerabilities in mobile apps can potentially harm both businesses and mobile users.<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color4);--awb-title-color:var(--awb-color4);--awb-content-color:#000356;--awb-icon-box-color:var(--awb-color1);--awb-toggle-hover-accent-color:var(--awb-color2);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-14059-2\"><div class=\"fusion-panel panel-default panel-ff03fc6468e965e24 fusion-toggle-no-divider\" style=\"--awb-title-color:var(--awb-color4);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><div class=\"panel-title toggle\" id=\"toggle_ff03fc6468e965e24\"><a aria-expanded=\"false\" aria-controls=\"ff03fc6468e965e24\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-14059-2\" data-target=\"#ff03fc6468e965e24\" href=\"#ff03fc6468e965e24\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-minus-circle fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-plus-circle fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Read more<\/span><\/a><\/div><\/div><div id=\"ff03fc6468e965e24\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ff03fc6468e965e24\"><div class=\"panel-body toggle-content fusion-clearfix\">Cybercriminals exploit vulnerabilities in mobile applications to either gain access to a company&#8217;s information assets or use it as a tool to spread malware to users. Our mobile application testing provides valuable insights into the vulnerabilities and issues of applications. These insights are primarily used to close security gaps, thereby protecting the client&#8217;s and the company&#8217;s information.<\/p>\n<p><strong>Benefits of penetration testing mobile applications<\/strong><\/p>\n<ul>\n<li>Identifies improper storage of sensitive information<\/li>\n<li>Identifies misconfigured security settings<\/li>\n<li>Identifies improper or unencrypted communication<\/li>\n<li>Identifies authentication issues<\/li>\n<li>Tests protection against injection attacks<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-image:linear-gradient(180deg, var(--awb-custom_color_1) 0%,var(--awb-color5) 100%);--awb-bg-size:cover;--awb-border-radius:50px 50px 0px 0px;--awb-width-large:100%;--awb-margin-top-large:-70px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-6 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-17 AvsnittsRubrik DarkBlue\"><p>Pentest infrastructure (network)<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-7 fusion_builder_column_inner_1_2 1_2 fusion-flex-column DarkBlue\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-18\"><p>A pentest performed on the infrastructure can reveal which parts of the network are vulnerable and can be used as a gateway to access an underlying system.<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color4);--awb-title-color:var(--awb-color4);--awb-content-color:#000356;--awb-icon-box-color:var(--awb-color1);--awb-toggle-hover-accent-color:var(--awb-color2);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-14059-3\"><div class=\"fusion-panel panel-default panel-ebc0cd2c683f9ec2f fusion-toggle-no-divider\" style=\"--awb-title-color:var(--awb-color4);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><div class=\"panel-title toggle\" id=\"toggle_ebc0cd2c683f9ec2f\"><a aria-expanded=\"false\" aria-controls=\"ebc0cd2c683f9ec2f\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-14059-3\" data-target=\"#ebc0cd2c683f9ec2f\" href=\"#ebc0cd2c683f9ec2f\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-minus-circle fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-plus-circle fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Read more<\/span><\/a><\/div><\/div><div id=\"ebc0cd2c683f9ec2f\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_ebc0cd2c683f9ec2f\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>We can test SQL servers, VPN servers and connections, mail servers, firewalls, FTP and file servers, interconnected third-party systems, and other inputs to the organization&#8217;s internal network and systems. In addition, we can also test the IT system&#8217;s operating system and examine and advise on how to configure it safely (hardening).<\/p>\n<p><strong>Benefits of penetration testing infrastructure<\/strong><\/p>\n<ul>\n<li>Finds and tests CVE vulnerabilities<\/li>\n<li>Identifies flaws in firewall configurations<\/li>\n<li>Identifies what an attacker can do if it is on the internal network or enters the network via a VPN connection<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:70px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color5);--awb-bg-color-hover:var(--awb-color5);--awb-bg-size:cover;--awb-border-radius:50px 50px 0px 0px;--awb-width-large:100%;--awb-margin-top-large:-70px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-8 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-19 AvsnittsRubrik DarkBlue\"><p>Pentest API<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-9 fusion_builder_column_inner_1_2 1_2 fusion-flex-column DarkBlue\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-20\"><p>An API (application programming interface) is used to allow applications to communicate with each other.<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color4);--awb-title-color:var(--awb-color4);--awb-content-color:#000356;--awb-icon-box-color:var(--awb-color1);--awb-toggle-hover-accent-color:var(--awb-color2);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-14059-4\"><div class=\"fusion-panel panel-default panel-67ff07d52849fc069 fusion-toggle-no-divider\" style=\"--awb-title-color:var(--awb-color4);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><div class=\"panel-title toggle\" id=\"toggle_67ff07d52849fc069\"><a aria-expanded=\"false\" aria-controls=\"67ff07d52849fc069\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-14059-4\" data-target=\"#67ff07d52849fc069\" href=\"#67ff07d52849fc069\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-minus-circle fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-plus-circle fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Read more<\/span><\/a><\/div><\/div><div id=\"67ff07d52849fc069\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_67ff07d52849fc069\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Examples of such links are between the company&#8217;s website and CRM systems, analytical tools, payment systems or external forms. Our API pen test checks whether the API has vulnerabilities that can be exploited by an attacker. For example, strengthening the API endpoints can prevent customer information from being exposed to the attacker.<\/p>\n<p><strong>Benefits of penetration testing API connections<\/strong><\/p>\n<ul>\n<li>Identifies if the API connection exposes sensitive data<\/li>\n<li>Identifies incorrect security settings and authorization structures<\/li>\n<li>Tests protection against injection attacks<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top-small:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column fusion-flex-align-self-flex-start fusion-column-no-min-height\" style=\"--awb-padding-top:30px;--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"LogoMarquee\">\n  <div class=\"LogoTrack\">\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2026\/03\/svenska-ingenjorer-logo.png\" alt=\"Sveriges Ingenj\u00f6rer\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2022\/04\/svedbergs_logo.png\" alt=\"Svedbergs\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/05\/lansforsakringar_jonkoping_logotyp-2.png\" alt=\"L\u00e4nsf\u00f6rs\u00e4kringar J\u00f6nk\u00f6ping\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/05\/if.png\" alt=\"If\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2022\/11\/coop-medmera.png\" alt=\"Coop MedMera\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/10\/infare.png\" alt=\"Infare\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2023\/10\/tidsam.png\" alt=\"Tidsam\"><\/div>\n    <div class=\"LogoBox\"><img class=\"LogoResp LogoDesk\" src=\"\/wp-content\/uploads\/2019\/12\/aleris-logo.png\" alt=\"Aleris\"><\/div>\n  <\/div>\n<\/div>\n\n<script>\ndocument.addEventListener(\"DOMContentLoaded\", function () {\n  document.querySelectorAll(\".LogoTrack\").forEach(function(track) {\n    if (!track.dataset.duplicated) {\n      track.innerHTML += track.innerHTML;\n      track.dataset.duplicated = \"true\";\n    }\n  });\n});\n<\/script><\/div><\/div><\/div><\/div>\n<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-21 EyeBrow\" style=\"--awb-text-transform:none;\"><p>Approach to our pen tests<\/p>\n<\/div><div class=\"fusion-text fusion-text-22 AvsnittsRubrik\" style=\"--awb-text-transform:none;\"><h2>Different ways to test<\/h2>\n<\/div><div class=\"fusion-text fusion-text-23\" style=\"--awb-text-transform:none;\"><p>Once you have decided which target to penetration test, the next step is to decide how to perform the test. Our service is based on black, gray and white box pentests.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:70px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:50px 50px 0px 0px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-10 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-24 AvsnittsRubrik White\"><p>White Box<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-11 fusion_builder_column_inner_1_2 1_2 fusion-flex-column White\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-25\"><p>We get full access to the software source code and documentation and also have access to the environment.<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:#ffffff;--awb-title-color:var(--awb-color4);--awb-content-color:#000356;--awb-icon-box-color:var(--awb-color1);--awb-toggle-hover-accent-color:var(--awb-color3);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-14059-5\"><div class=\"fusion-panel panel-default panel-cdd709b54b5cf5e63 fusion-toggle-no-divider\" style=\"--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><div class=\"panel-title toggle\" id=\"toggle_cdd709b54b5cf5e63\"><a aria-expanded=\"false\" aria-controls=\"cdd709b54b5cf5e63\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-14059-5\" data-target=\"#cdd709b54b5cf5e63\" href=\"#cdd709b54b5cf5e63\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-minus-circle fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-plus-circle fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Read more<\/span><\/a><\/div><\/div><div id=\"cdd709b54b5cf5e63\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_cdd709b54b5cf5e63\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>This allows the penetration tester to focus on analyzing the system&#8217;s architecture, code structure and design. You could say that a whitebox penetration test tests from the inside out unlike a blackbox which tests from the outside in.<\/p>\n<p>White Box penetration testing identifies potential weaknesses in software and is primarily used as a final step in the development of apps and systems to find and prevent potential vulnerabilities that could lead to data leaks and breaches.<\/p>\n<p><em>Example: The penetration tester has full access to all information and identifies threats and risks by analyzing source code and documentation.<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:70px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color5);--awb-bg-color-hover:var(--awb-color5);--awb-bg-size:cover;--awb-border-radius:50px 50px 0px 0px;--awb-width-large:100%;--awb-margin-top-large:-70px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-12 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-26 AvsnittsRubrik DarkBlue\"><p>Grey Box<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-13 fusion_builder_column_inner_1_2 1_2 fusion-flex-column DarkBlue\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-27\"><p>This is a middle ground between the Black Box and the White Box where we have some information about how the system works.<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color4);--awb-title-color:var(--awb-color4);--awb-content-color:#000356;--awb-icon-box-color:var(--awb-color1);--awb-toggle-hover-accent-color:var(--awb-color2);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-14059-6\"><div class=\"fusion-panel panel-default panel-5e97237dd39c00d7a fusion-toggle-no-divider\" style=\"--awb-title-color:var(--awb-color4);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><div class=\"panel-title toggle\" id=\"toggle_5e97237dd39c00d7a\"><a aria-expanded=\"false\" aria-controls=\"5e97237dd39c00d7a\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-14059-6\" data-target=\"#5e97237dd39c00d7a\" href=\"#5e97237dd39c00d7a\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-minus-circle fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-plus-circle fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Read more<\/span><\/a><\/div><\/div><div id=\"5e97237dd39c00d7a\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_5e97237dd39c00d7a\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>Grey Box simulates an attacker who has already penetrated the external protection and has some form of internal access to the network. This penetration test is more time-efficient as it skips the initial intrusion attempt and instead focuses on detecting errors in a single application or finding vulnerabilities in internal information-sensitive systems to which it is given possible access.<\/p>\n<p><em>Example: The attacker has obtained a user account and tries to use it to escalate his\/her permissions in the system.<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-image:linear-gradient(180deg, var(--awb-custom_color_1) 0%,var(--awb-color5) 100%);--awb-bg-size:cover;--awb-border-radius:50px 50px 0px 0px;--awb-width-large:100%;--awb-margin-top-large:-70px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-14 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-28 AvsnittsRubrik DarkBlue\"><p>Black Box<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-15 fusion_builder_column_inner_1_2 1_2 fusion-flex-column DarkBlue\" style=\"--awb-padding-top:50px;--awb-padding-right:50px;--awb-padding-bottom:50px;--awb-padding-left:50px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-29\"><p>We know nothing about the system or the environment to be attacked and are completely unqualified.<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:var(--awb-color3);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color4);--awb-title-color:var(--awb-color4);--awb-content-color:#000356;--awb-icon-box-color:var(--awb-color1);--awb-toggle-hover-accent-color:var(--awb-color2);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-14059-7\"><div class=\"fusion-panel panel-default panel-651d93445a9997605 fusion-toggle-no-divider\" style=\"--awb-title-color:var(--awb-color4);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><div class=\"panel-title toggle\" id=\"toggle_651d93445a9997605\"><a aria-expanded=\"false\" aria-controls=\"651d93445a9997605\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-14059-7\" data-target=\"#651d93445a9997605\" href=\"#651d93445a9997605\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-minus-circle fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-plus-circle fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Read more<\/span><\/a><\/div><\/div><div id=\"651d93445a9997605\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_651d93445a9997605\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The conditions are the same as for an outside attacker. The focus is mainly on attacking the external protection, but also further into the systems behind it. The black box is time-consuming but also provides a clear overall picture of how well the system is protected in the event of an intrusion attempt.<\/p>\n<p><em>Example: The attacker attacks a web, or IP address to obtain information or cause damage.<\/em><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:160px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-30 EyeBrow\" style=\"--awb-text-transform:none;\"><p>Here&#8217;s how it works<\/p>\n<\/div><div class=\"fusion-text fusion-text-31\" style=\"--awb-text-transform:none;\"><h2>Implementation and process of pentests<\/h2>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-32\" style=\"--awb-text-transform:none;\"><p>The methodology used to conduct pentests varies slightly depending on the scope and external conditions. It often involves four to six steps that can be repeated like a cycle. An example scenario for a Black Box pentest is described below.<\/p>\n<ol>\n<li><strong>Collection of information on the target<\/strong><br \/>\nIn addition to the main objective, are there secondary objectives with lower security? What underlying systems can the target be expected to have. Is there open information about the target, which IP addresses could be targeted and which can be obtained?<\/li>\n<li><strong>Scanning of targets<\/strong><br \/>\nWhat open ports does the target have and what do the vulnerabilities look like in a <a href=\"https:\/\/www.secify.com\/en\/vulnerability-scanning\/\" target=\"_blank\" rel=\"noopener\">vulnerability scan<\/a>?<\/li>\n<li><strong>Attack:<\/strong><br \/>\nExploit the vulnerabilities and try to gain access to systems through, for example, open ports, login fields, system vulnerabilities, and so on.<\/li>\n<li><strong>Conclusion:<\/strong><br \/>\nClosing the attack, gathering evidence, preparing vulnerability report and recommendations<\/li>\n<\/ol>\n<p>As described above, pentesters often use a vulnerability scanning tool to scan the target for potential vulnerabilities in the system. Each vulnerability discovered is then tested to see if it can be used to penetrate the system. Validating that the potential vulnerability can be exploited in practice is the major difference between a vulnerability scan and a penetration test.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-17 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-33\" style=\"--awb-text-transform:none;\"><h2>Questions and answers<\/h2>\n<\/div><div class=\"fusion-text fusion-text-34\" style=\"--awb-text-transform:none;\"><p>Here are answers to the most frequently asked questions about penetration testing. Do you have a question that is not listed? Use the contact form further down the page.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-margin-top:120px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-18 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-color:var(--awb-color2);--awb-bg-color-hover:var(--awb-color2);--awb-bg-size:cover;--awb-border-radius:0px 50px 0px 50px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-16 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-space-between fusion-content-layout-column\"><div class=\"fusion-text fusion-text-35 EyeBrow White\"><p><a id=\"Contact\"><\/a>Get in touch!<\/p>\n<\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-top:60px;width:100%;\"><\/div><div class=\"fusion-text fusion-text-36 BoxText White WhiteLink\"><p>If you want to know more about our Penetration Tests, please contact us. Send a message using the contact function, or pick up the phone and call 020-66 99 00.<\/p>\n<p>If you need further testing, we can also carry out <a href=\"https:\/\/www.secify.com\/en\/phishing-test\/\" target=\"_blank\" rel=\"noopener\">Phishing tests<\/a>, among other things. We can also carry out deeper <a href=\"https:\/\/www.secify.com\/en\/threat-analysis\/\" target=\"_blank\" rel=\"noopener\">threat assessments<\/a> and <a href=\"https:\/\/www.secify.com\/en\/osint\/\" target=\"_blank\" rel=\"noopener\">OSINT projects<\/a>.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-17 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-radius:0px 50px 0px 0px;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\">[gravityform id=\"1\" field_values=\"sa_sida_namn=Penetrationstest\" title=\"false\" ajax=\"true\"]<\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"staatic_meta_publish":"","footnotes":""},"class_list":["post-14059","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages\/14059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/comments?post=14059"}],"version-history":[{"count":0,"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/pages\/14059\/revisions"}],"wp:attachment":[{"href":"https:\/\/cranky-liskov-4cf418.wp.onstaatic.com\/en\/wp-json\/wp\/v2\/media?parent=14059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}